In shiro, users need to provide principles and credentials to shiro so that the application can verify the user's identity:
Principles: identity, that is, the identity attribute of the principal, can be anything, such as user name, mailbox, etc., only. A principal can have multiple principals, but only one primary principal, usual ...
Posted by lopes_andre on Wed, 26 Feb 2020 22:52:49 -0800
1, What is Shiro security framework
shrio is a powerful and flexible open source security framework, which mainly deals with authentication, authorization, session management and encryption.
Authentication: sometimes referred to as "login", i.e. authentication of the user.
Posted by Kev on Mon, 24 Feb 2020 20:55:28 -0800
Apache Shiro is a Java security (permissions) framework.
Shiro can easily develop applications that are good enough not only for JavaSE environments, but also for JavaEE environments.
Shiro can complete authentication, authorization, encryption, session management, Web integration, caching, and more.
Download address: ht ...
Posted by jsim on Thu, 13 Feb 2020 21:10:28 -0800
Security configurations are often used in development, and users who do not have access need to go to the login form page.There are many ways to achieve access control, including through Aop, interceptors, and frameworks (such as Apache Shiro, Spring Security).
We describe how Spring Security is used fo ...
Posted by Nickosssss on Mon, 03 Feb 2020 18:07:37 -0800
Original blog address
This picture is very important!!! Town building
0x001 override SessionManager
shiro provides three default implementations:
DefaultSessionManager: for java se environment
ServletContainerSessionManager: implementation used by default, Servlet container management
Posted by mhoward on Wed, 29 Jan 2020 09:19:02 -0800
Common part code
Master page layout
Left tree menu layout
Background data preparation
Data list (loading data by HTML)
Format departments and pictures
Recycle bin data (loading data through JS)
Add buttons and events
Button add eve ...
Posted by mwkemo on Sat, 25 Jan 2020 07:54:30 -0800
Official Spring Security documentation
Spring Security and Shiro are both security frameworks, which contain a lot of content. This article mainly records the part of authorization and authentication that I understand. I hope it can be expressed as succinctly and completely as possible. Welcome to exchange.
formlogin main process
Among them, t ...
Posted by trrobnett on Mon, 20 Jan 2020 02:40:08 -0800
Shiro function introduction
The following describes the meaning of each function point:
Authentication: authentication / login, to verify whether the user has the corresponding identity;
Authorization: authorization, that is, permission verification, to verify whether an authenticated user has a cert ...
Posted by rednaxel on Tue, 14 Jan 2020 22:12:51 -0800
1. Let's first look at the inheritance relationship of ShiroFilterFactoryBean
public class ShiroFilterFactoryBean implements FactoryBean, BeanPostProcessor
The FactoryBean interface is implemented, which is an important interface in spring, so let's take a look at the interface methods implemented by t ...
Posted by chreez on Tue, 14 Jan 2020 02:04:44 -0800
When using Shiro, the authentication failure is usually to return an error page or login page to the front-end, especially the back-end system. This mode is particularly used. But now more and more projects tend to use the way of front-end and back-end separation for development. At this time, the front-end needs to respond to the ...
Posted by HairyArse on Tue, 07 Jan 2020 07:15:13 -0800