Table of Contents
- Anatomy of an Unsafe Application
- Getting Started with Spring Security
- Custom Authentication
- JDBC-based Authentication
- Authentication with Spring-Data
- LDAP Directory Services
- Remember-me Services
- Client Certificate Authentication with TLS
- Opening up to OpenID
- Single Sign-on with Central Authentication Service
- Fine-grained Access Control
- Access Control Lists
- Custom Authorization
- Session Management
- Additional Spring Security Features
- Microservice security with OAuth2 and JSON Web Tokens
- Migration to Spring Security 4.2

