3 Comments

  1. Nice writing Panos, gives the in-depth understanding of the basic spring security background process. Is it possible to have two total different security implementation in single application, like JBDC Auth and OAuth?

  2. Thank you, Ramanujam.
    Of course, it is possible to configure the Spring security, in a way to deal with different authentication schemas. Spring and Spring Boot are quite powerful providing different options one can follow to do so (e.g. different SecurityFilterChain beans, different inner classes, custom implementation filters, etc.) I haven’t yet published a specific article about such a case, and maybe I’ll do that in the future. A possible relevance can be found in another post of mine here or here which can be used, to deal with both LDAP and JDBC authentication.
    Thank you again.
    Panos

Leave a Reply to Ramanujam Cancel reply

Your email address will not be published. Required fields are marked *