Candid institute’s Spring training team provide Spring Security training in Chennai exclusively, learn from the instructor who has real-time working experience in Spring Security flows. As a leading java training provider in Chennai, We have also trained Spring Security training for developers to stay ahead of the position they are in. Our Spring expertise will guide you to move further to updated technologies with commitment how and guide you through how to make use of updated technologies.
Why choose candid for Spring Security training in Chennai:
Permanent trainer for throughout training the period.
Trainer with more than 10 years experience.
Free demo session.
Post training support also provided.
Training based on the updated course syllabus.
Why Learn Spring Security:
Spring Security provides comprehensive security services for J2EE-based enterprise software applications. In Spring Security two major areas of application security are “authentication” and “authorization”. These are the two main areas that Spring Security targets.
For secure your app with help of spring security features. You can specify the users by Authenticate access for your web apps, mobile apps, etc. Spring security also has features like adding role based access to your pages. Spring security feature is quite powerful and easy to use once you’re familiar with it. It is powerful in a way that it provides a lot of features out of the box, but also allows you to customize the features provided by it.
What are the features of Spring Security :
- Authentication and Authorization.
- BASIC, Digest and Form-Based Authentication.
- LDAP Authentication.
- OpenID Authentication.
- SSO (Single Sign-On) Implementation.
- Supports Cross-Site Request Forgery (CSRF) Implementation.
- “Remember-Me” Feature through HTTP Cookies.
- Implementation of ACLs
- “Channel Security” for automatically switching between HTTP and HTTPS.
- I18N (Internationalisation).
- JAAS (Java Authentication and Authorization Service).
- Flow Authorization using Spring Web Flow Framework.
- WS-Security using Spring Web Services.
Spring Security training Course content
I. Getting Started
- 1. Introduction
- 1.1. What is Spring Security?
- 1.2. History
- 1.3. Release Numbering
- 1.4. Getting Spring Security
- 2. Security Namespace Configuration
- 2.1. Introduction
- 2.2. Getting Started with Security Namespace Configuration
- 2.3. Advanced Web Features
- 2.4. Method Security
- 2.5. The Default AccessDecisionManager
- 2.6. The Authentication Manager and the Namespace
- 3. Sample Applications
- 3.1. Tutorial Sample
- 3.2. Contacts
- 3.3. LDAP Sample
- 3.4. CAS Sample
- 3.5. Pre-Authentication Sample
- 4. Spring Security Community
- 4.1. Issue Tracking
- 4.2. Becoming Involved
- 4.3. Further Information
II. Architecture and Implementation
- 5. Technical Overview
- 5.1. Runtime Environment
- 5.2. Core Components
- 5.3. Authentication
- 5.4. Authentication in a Web Application
- 5.5. Access-Control (Authorization) in Spring Security
- 5.6. Localization
- 6. Core Services
- 6.1. The,
AuthenticationManager
ProviderManager
andAuthenticationProvider
s - 6.2.
UserDetailsService
Implementations - 6.3. Password Encoding
III. Web Application Security
- 7. The Security Filter Chain
- 7.1.
DelegatingFilterProxy
- 7.2.
FilterChainProxy
- 7.3. Filter Ordering
- 7.4. Request Matching and
HttpFirewall
- 7.5. Use with other Filter-Based Frameworks
- 8. Core Security Filters
- 8.1.
FilterSecurityInterceptor
- 8.2.
ExceptionTranslationFilter
- 8.3.
SecurityContextPersistenceFilter
- 8.4.
UsernamePasswordAuthenticationFilter
- 9. Basic and Digest Authentication
- 9.1.
BasicAuthenticationFilter
- 9.2.
DigestAuthenticationFilter
- 10. Remember-Me Authentication
- 10.1. Overview
- 10.2. Simple Hash-Based Token Approach
- 10.3. Persistent Token Approach
- 10.4. Remember-Me Interfaces and Implementations
- 11. Session Management
- 11.1. SessionManagementFilter
- 11.2.
SessionAuthenticationStrategy
- 11.3. Concurrency Control
- 12. Anonymous Authentication
- 12.1. Overview
- 12.2. Configuration
- 12.3.
AuthenticationTrustResolver
IV. Authorization
- 13. Authorization Architecture
- 13.1. Authorities
- 13.2. Pre-Invocation Handling
- 13.3. After Invocation Handling
- 14. Secure Object Implementations
- 14.1. AOP Alliance (MethodInvocation) Security Interceptor
- 14.2. AspectJ (JoinPoint) Security Interceptor
- 15. Expression-Based Access Control
- 15.1. Overview
- 15.2. Web Security Expressions
- 15.3. Method Security Expressions
V. Additional Topics
- 16. Domain Object Security (ACLs)
- 16.1. Overview
- 16.2. Key Concepts
- 16.3. Getting Started
- 17. Pre-Authentication Scenarios
- 17.1. Pre-Authentication Framework Classes
- 17.2. Concrete Implementations
- 18. LDAP Authentication
- 18.1. Overview
- 18.2. Using LDAP with Spring Security
- 18.3. Configuring an LDAP Server
- 18.4. Implementation Classes
- 19. JSP Tag Libraries
- 19.1. Declaring the Taglib
- 19.2. The
authorize
Tag - 19.3. The
authentication
Tag - 19.4. The
accesscontrollist
Tag - 20. Java Authentication and Authorization Service (JAAS) Provider
- 20.1. Overview
- 20.2. Configuration
- 21. CAS Authentication
- 21.1. Overview
- 21.2. How CAS Works
- 21.3. Configuration of CAS Client
- 22. X.509 Authentication
- 22.1. Overview
- 22.2. Adding X.509 Authentication to Your Web Application
- 22.3. Setting up SSL in Tomcat
- 23. Run-As Authentication Replacement
- 23.1. Overview
- 23.2. Configuration