Shiro -- Basic authentication process

Introduction: In shiro, users need to provide principles and credentials to shiro so that the application can verify the user's identity: Principles: identity, that is, the identity attribute of the principal, can be anything, such as user name, mailbox, etc., only. A principal can have multiple principals, but only one primary principal, usual ...

Posted by lopes_andre on Wed, 26 Feb 2020 22:52:49 -0800

Apache Shiro security framework

1, What is Shiro security framework shrio is a powerful and flexible open source security framework, which mainly deals with authentication, authorization, session management and encryption. Authentication: sometimes referred to as "login", i.e. authentication of the user. Authori ...

Posted by Kev on Mon, 24 Feb 2020 20:55:28 -0800

Shiro Simple Use

Shiro 1. Introduction Apache Shiro is a Java security (permissions) framework. Shiro can easily develop applications that are good enough not only for JavaSE environments, but also for JavaEE environments. Shiro can complete authentication, authorization, encryption, session management, Web integration, caching, and more. Download address: ht ...

Posted by jsim on Thu, 13 Feb 2020 21:10:28 -0800

Use Spring Security for security control in Spring Boot learning

Security configurations are often used in development, and users who do not have access need to go to the login form page.There are many ways to achieve access control, including through Aop, interceptors, and frameworks (such as Apache Shiro, Spring Security). We describe how Spring Security is used fo ...

Posted by Nickosssss on Mon, 03 Feb 2020 18:07:37 -0800

Shiro + Redis custom session management

Original blog address This picture is very important!!! Town building 0x001 override SessionManager shiro provides three default implementations: DefaultSessionManager: for java se environment ServletContainerSessionManager: implementation used by default, Servlet container management DefaultWebSe ...

Posted by mhoward on Wed, 29 Jan 2020 09:19:02 -0800

EasyUI - comprehensive case (combined with crud in the background)

Article directory Common part code Header.js Master page layout Left tree menu layout h5: js: Background data preparation Staff management Data list (loading data by HTML) Format departments and pictures Recycle bin data (loading data through JS) Add buttons and events Ready button Button add eve ...

Posted by mwkemo on Sat, 25 Jan 2020 07:54:30 -0800

Learning records of Spring Security authorization and certification

Official Spring Security documentation Spring Security and Shiro are both security frameworks, which contain a lot of content. This article mainly records the part of authorization and authentication that I understand. I hope it can be expressed as succinctly and completely as possible. Welcome to exchange. formlogin main process Among them, t ...

Posted by trrobnett on Mon, 20 Jan 2020 02:40:08 -0800

Analysis of Shiro security framework

Shiro function introduction The following describes the meaning of each function point: Authentication: authentication / login, to verify whether the user has the corresponding identity; Authorization: authorization, that is, permission verification, to verify whether an authenticated user has a cert ...

Posted by rednaxel on Tue, 14 Jan 2020 22:12:51 -0800

ShiroFilterFactoryBean, a key bean for the integration of shrio and spring

1. Let's first look at the inheritance relationship of ShiroFilterFactoryBean public class ShiroFilterFactoryBean implements FactoryBean, BeanPostProcessor The FactoryBean interface is implemented, which is an important interface in spring, so let's take a look at the interface methods implemented by t ...

Posted by chreez on Tue, 14 Jan 2020 02:04:44 -0800

Shiro authority management framework: custom Filter implementation and troubleshooting records

Clear demand When using Shiro, the authentication failure is usually to return an error page or login page to the front-end, especially the back-end system. This mode is particularly used. But now more and more projects tend to use the way of front-end and back-end separation for development. At this time, the front-end needs to respond to the ...

Posted by HairyArse on Tue, 07 Jan 2020 07:15:13 -0800