© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. Nardone, C. ScarioniPro Spring Securityhttps://doi.org/10.1007/979-8-8688-0035-1_6

6. Configuring Alternative Authentication Providers

Massimo Nardone1   and Carlo Scarioni2
(1)
HELSINKI, Finland
(2)
Surbiton, UK
 

One of Spring Security’s strongest points is that you can plug different authentication mechanisms into the framework. Spring Security was built to create, as much as possible, a pluggable architecture model where different things can be plugged into the framework easily and unobtrusively. In the authentication layer, an abstraction exists that takes care of this part of the security process. This abstraction comes mainly in the form of the AuthenticationProvider ...

Get Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.