Spring Security Patterns

Track: Security
Abstract Recording

What architectural patterns does Spring Security follow? This talk starts with an insecure application and secures it from the ground up. It’ll examine patterns that are repeated throughout Spring Security and explain why they are there. Among others, you’ll learn about Spring Security’s filter chain, its authentication manager, and its preference for final classes and private methods.

Josh Cummings

Josh enjoys application security, live hacking, and frosted mini-wheats. He works for VMWare, maintaining Spring Security.