Summary

Review the concepts covered in this chapter.

In this chapter we learned how to:

  • Create a demo application by simply adding Spring Boot’s security starter.
  • Craft a Spring Data repository to delegate user management to a database.
  • Customize our configuration and plug in URL security rules.
  • Leverage method-level security to apply fine-grained access controls.
  • Integrate with Google to shift the need for user management to a third-party.

Get hands-on with 1200+ tech skills courses.