From the course: Spring 6: Spring Security

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Next steps

Next steps

- [Instructor] So before we end this course, I'd like to talk through a little bit about what might be next in your journey. But before we get there, I want to start with a very simple review of what we've looked at in this course. To start with, we introduced the concept of Spring Security, as well as some general security concepts. We then went about the process of securing a web application through various incantations. We then integrated with an internal LDAP server to show you how to leverage LDAP as an authentication source for those of you working with enterprise-based solutions. We then took a look at OAuth2 as a security methodology for those working in Internet as well as enterprise systems relying on OAuth2 or OIDC Connect in order to connect their web application. And then we took a brief look at reactive programming with security showing the similarities to standard web applications. So the next things for you really are to get involved. I highly recommend that you find a…

Contents