3b5a4189ef
These four items, not three items, constitute the auth process: . A user is prompted to log in with a username and password. . The system (successfully) verifies that the password is correct for the username. . The context information for that user is obtained (their list of roles and so on). . A security context is established for the user |
||
---|---|---|
.. | ||
articles/src/docbook | ||
guides | ||
manual | ||
spring-security-docs.gradle |