Spring Security Training

This in-depth course introduces the Java web developer to the Spring Security framework. We start with an overview and practical exercises in basic usage: XML configuration for authentication and URL-based authorization. Then we start to dig into Spring Security as a Java model, and develop advanced techniques including custom user realms, custom authorization constraints, method-based authorization, and instance-based authorization.

We then explore two increasingly popular extensions to Spring Security. We consider the Security Assertions Markup Language, or SAML, and the wide range of identity and security features it offers -- but quickly focus on it's support for single sign-on (SSO), and learn how the Spring Security SAML Extension enables applications to interact with SAML identity providers to implement SSO and single logout. And we look at OAuth for Spring Security, which enables third-party authorization scenarios, and learn how to implement both the server and client sides of the OAuth 2.0 flow.

  1. Configure Spring Security for HTTP BASIC authentication.
  2. Implement form-based authentication.
  3. Configure other authentication features including remember-me, anonymous users, and logout.
  4. Apply authorization constraints to URLs and URL patterns.
  5. Bind authorization roles to user accounts in relational databases.
  6. Plug application-specific user realms into Spring Security by implementing UserDetailsService.
  7. Implement application-specific authorization constraints as AccessDecisionVoters.
  8. Fix authorization constraints over individual methods of service beans, in lieu of URL authorization or in tandem with it.
  9. Express user identity in terms of SAML <Subject>s.
  10. Implement SAML SSO from the service-provider side.
  11. Implement OAuth 2.0 authorization-server and resource-server roles.
  12. Implement an OAuth 2.0 client.
  1. Spring Security
    1. Acquiring and Integrating Spring Security
    2. Relationship to Spring
    3. Relationship to Java EE Standards
    4. Basic Configuration
    5. How It Works
    6. Integration: LDAP, CAS, X.509, OpenID, etc.
    7. Integration: JAAS
  2. Authentication
    1. The <http> Configuration
    2. The <intercept-url> Constraint
    3. The <form-login> Configuration
    4. Login Form Design
    5. "Remember Me"
    6. Anonymous "Authentication"
    7. Logout
    8. The JDBC Authentication Provider
    9. The Authentication/Authorization Schema
    10. Using Hashed Passwords
    11. Why Hashing Isn't Enough
    12. Using Salts
    13. PasswordEncoder and SaltSource
    14. Key Lengthening
    15. Channel Security
    16. Session Management
  3. URL Authorization
    1. URL Authorization
    2. Programmatic Authorization: Servlets
    3. Programmatic Authorization: Spring Security
    4. Role-Based Presentation
    5. The Spring Security Tag Library
  4. Under the Hood: Authentication
    1. The Spring Security API
    2. The Filter Chain
    3. Authentication Manager and Providers
    4. The Security Context
    5. Plug-In Points
    6. Implementing UserDetailsService
    7. Connecting User Details to the Domain Model
  5. Under the Hood: Authorization
    1. Authorization
    2. FilterSecurityInterceptor and Friends
    3. The AccessDecisionManager
    4. Voting
    5. Configuration Attributes
    6. Access-Decision Strategies
    7. Implementing AccessDecisionVoter
    8. The Role Prefix
  6. Method and Instance Authorization
    1. Method Authorization
    2. Using Spring AOP
    3. XML vs. Annotations
    4. @PreAuthorize and @PostAuthorize
    5. Spring EL for Authorization
    6. @PreFilter and @PostFilter
    7. Domain-Object Authorization
    8. The ACL Schema
    9. Interface Model
    10. ACL-Based Presentation
  7. Introduction to SAML
    1. History of SAML
    2. Assertions
    3. Protocol
    4. Bindings
    5. Profiles
    6. Using OpenSAML
  8. SAML Assertions and Protocol
    1. "Vouching for" a User
    2. Assertions and Subjects
    3. NameID Types
    4. Authentication Contexts
    5. Requests, Queries, and Responses
    6. Attribute Queries
    7. SAML and XML Signature
  9. SAML Bindings
    1. Speaking "Through" the Browser
    2. The SOAP Binding
    3. SAML Over HTTP
    4. The Redirect, POST, and Artifact Bindings
    5. The PAOS Binding
    6. The URI Binding
  10. Federated Identity and SSO
    1. SAML 2.0 Federations
    2. Single Sign-On
    3. Account Linking and Persistent Pseudonyms
    4. Transient Pseudonyms
    5. Name ID Mapping
    6. Single Logout
    7. Federation Termination
  11. The Spring Security SAML Extension
    1. The Spring Security SAML Extension
    2. The SAML Entry Point
    3. The SAML Filter Chain
    4. The SSO Processing Filters
    5. IdP Discovery
    6. Login and Logout Handlers
    7. Configuring OpenAM
    8. Configuring an SP
    9. Customization
    10. Combining SSO and Other Authentication Styles
    11. Authorization and Attributes
  12. OAuth for Spring Security
    1. Third-Party Authorization
    2. OAuth
    3. Roles and Initial Flow
    4. Grant Types
    5. Access Tokens
    6. The Google OAuth API
    7. OAuth for Spring Security
    8. Client-Details Services
    9. Token Services
    10. The AuthorizationEndpoint
    11. The TokenEndpoint
    12. The UserApprovalHandler
    13. The Resource-Server Filter
    14. The ScopeVoter
    15. The OAuth-Aware RestTemplate
    16. AccessTokenProviders
    17. The OAuth Redirecting Filter
Class Materials

Each student in our Live Online and our Onsite classes receives a comprehensive set of materials, including course notes and all the class examples.

Class Prerequisites

Experience in the following is required for this Spring class:

  • Java programming:
  • Experience with the Spring framework
  • Basic knowledge of XML:
  • Some servlets and/or JSP experience will be beneficial for purposes of understanding the impact of each security feature that we configure. There is no web-application coding involved in the course.
Preparing for Class

Training for your Team

Length: 4 Days
  • Private Class for your Team
  • Online or On-location
  • Customizable
  • Expert Instructors

Training for Yourself

$2,100.00 or 4 vouchers
  • Live Online Training
  • For Individuals
  • Expert Instructors
  • Guaranteed to Run
  • 100% Free Re-take Option
  • 1-minute Video

What people say about our training

The course material was easy to follow, and the Instructor was excellent. She was easy to understand and went at a pace that I could follow. I really enjoyed the class.
Jackie Cote
ArcelorMittal Dofasco
I was looking for an explanation of how Expression Web worked vs. my current software of Front Page and I got this in spades. PLUS I wanted to be refreshed on how to do CSS and I got that big time. I wanted to have an appraisal of a few of my current web pages I maintain, and I got that as well. Perfection all around.
Bernard Schafer
General Services Administration
I was very pleased with the class. I would highly recommend this to anyone looking for training.
Debra Rogers
Essco Calibration
Really enjoyed the class... from the comfort of my office. The instructor was confident and knowledgeable. Would recommend Webucator to anyone.
Rob Naquin
Kirby Corporation

No cancelation for low enrollment

Certified Microsoft Partner

Registered Education Provider (R.E.P.)

GSA schedule pricing


Students who have taken Instructor-led Training


Organizations who trust Webucator for their Instructor-led training needs


Satisfaction guarantee and retake option


Students rated our trainers 9.28 out of 10 based on 28,140 reviews

Contact Us or call 1-877-932-8228