Now we can start doing something that we really care about - performing security operations.
When protecting our applications, the most relevant questions we may ask ourselves are "Who is the current user" or "Is the current user allowed to do XXX?"
When we write code or design user interfaces, it is common to a ...
Posted by dkode on Tue, 23 Jun 2020 19:00:54 -0700
Shiro and springboot integration
Apache Shiro is a powerful and easy-to-use Java security framework, which performs authentication, authorization, encryption and session management. Using shiro, you can easily complete the development of the project rights management module
Three core compon ...
Posted by imcomguy on Sun, 21 Jun 2020 03:35:26 -0700
Yunqi information:[ Click to see more industry information]Here you can find the first-hand cloud information of different industries. What are you waiting for? Come on!
This paper summarizes the reconstruction of the project from the practice. The original project uses the Springboot+freemarker template. During the development process, t ...
Posted by poirot on Thu, 18 Jun 2020 00:04:07 -0700
>Following the previous article "Apache Shiro takes over the authentication and authorization of Swagger", some enthusiastic netizens said that Apache Shiro seems too simple. In response to this problem, the individual does not make any evaluation (all technologies serve the needs). Today's main share is: how to take over the authe ...
Posted by Chrisinsd on Fri, 22 May 2020 00:13:44 -0700
1, shiro internal structure
1. Components contained in shiro
shiro mainly includes Authenticator, authorizer, session manager, encryption, remember me and cache manager
2. Introduction to components of shiro
Subject: the subject, which can be understood as the user interacting with the application, contains all the information of the us ...
Posted by MrSheen on Fri, 15 May 2020 01:50:42 -0700
At present, most RESTful systems use JWT for authorization verification. In Spring Boot, Shiro and JWT can be used for simple permission and authentication verification. In the process of integration with Spring Boot, there are many holes. Combined with their own and common application scenarios, we developed the simplest in ...
Posted by TronB24 on Wed, 13 May 2020 06:54:44 -0700
Shiro provides a complete enterprise level session management function, independent of the underlying container (such as web container tomcat), which can be used in both Java Se and Java EE environments. It provides session management, session event monitoring, session storage / persistence, container independent clustering, ...
Posted by genics on Sat, 07 Mar 2020 00:46:52 -0800
When integrating Shiro, we first need to determine our steps:
1. Add Shiro's dependency package to implement its own Realm class (by inheriting the AuthorizingRealm class);
2. Implement Shiro's configuration class
3. Implement the front-end login interface and Controller class
Add d ...
Posted by vivianp79 on Mon, 02 Mar 2020 18:37:12 -0800
In shiro, users need to provide principles and credentials to shiro so that the application can verify the user's identity:
Principles: identity, that is, the identity attribute of the principal, can be anything, such as user name, mailbox, etc., only. A principal can have multiple principals, but only one primary principal, usual ...
Posted by lopes_andre on Wed, 26 Feb 2020 22:52:49 -0800
1, What is Shiro security framework
shrio is a powerful and flexible open source security framework, which mainly deals with authentication, authorization, session management and encryption.
Authentication: sometimes referred to as "login", i.e. authentication of the user.
Posted by Kev on Mon, 24 Feb 2020 20:55:28 -0800