You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
These four items, not three items, constitute the auth process:
. A user is prompted to log in with a username and password.
. The system (successfully) verifies that the password is correct for the username.
. The context information for that user is obtained (their list of roles and so on).
. A security context is established for the user
Copy file name to clipboardExpand all lines: docs/manual/src/docs/asciidoc/_includes/servlet/architecture/technical-overview.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -156,7 +156,7 @@ Let's consider a standard authentication scenario that everyone is familiar with
156
156
. The user proceeds, potentially to perform some operation which is potentially protected by an access control mechanism which checks the required permissions for the operation against the current security context information.
157
157
158
158
159
-
The first three items constitute the authentication process so we'll take a look at how these take place within Spring Security.
159
+
The first four items constitute the authentication process so we'll take a look at how these take place within Spring Security.
160
160
161
161
. The username and password are obtained and combined into an instance of `UsernamePasswordAuthenticationToken` (an instance of the `Authentication` interface, which we saw earlier).
162
162
. The token is passed to an instance of `AuthenticationManager` for validation.
0 commit comments