Introduction to custom Realm
In general, custom Realm inherits AuthorizingRealm.
Inheritance of Realm: Authorizing Realm - > Authenticating Realm - > Caching Realm - > Realm.
Create a class that inherits AuthorizingRealm.
Rewrite the authorization method doGetAuthorization Info.
Rewrite the authentication method doGetAuthen ...
Posted on Sat, 12 Oct 2019 08:27:42 -0700 by mysqlnewjack
In the first two articles, we integrated shiro+jwt stateless permission validation, so that only tocken is stored in the front end, and the back end only verifies whether Tocken is legal.
Consider the problem that it's not very friendly and saf ...
Posted on Mon, 16 Sep 2019 19:55:13 -0700 by bijukon
Not long ago, I just learned how to use the permission annotation (), and began to think about it. The initial guess is to annotate @Aspect, which is implemented in a way similar to that shown below (recording audit logs facetly). Later found that this is not the case, so a special analysis of the source code.
Posted on Tue, 20 Aug 2019 03:40:35 -0700 by agent_smith_sp
Shiro Integrates Java EE
Configure Shiro filters and listeners in `web.xml'
Configure interception rules in `shiro.ini'
Implementation Principle of Landing Filter `authc'
Using Shiro tags in jsp
Create a new MAVEN Web project and intro ...
Posted on Mon, 12 Aug 2019 03:43:33 -0700 by alanho
Has Shiro+SMM integrated Maven project gained some results after reading the first (second) chapters? Believe that the whole process is straightened out, understand, then encounter similar project ideas will not be so messy. So if you think that the friends who have mastered the previous conte ...
Posted on Sun, 04 Aug 2019 00:44:26 -0700 by cowfish
Build Springboot+JPA+Swagger 2.0+Logback+Lombok+Redis+Shiro 1.4 Project with IDEA from scratch (7)
Springboot integrates Shiro 1.4
What is Shiro
Add pom.xml dependencies
Configure Shiro related files
ShiroConfig configuration file
Custom Realm File
Exception handling configuration file
Modify the ...
Posted on Thu, 01 Aug 2019 00:45:17 -0700 by fer0an
This blog is the sixth in the "Java Secondary Kill System Actual Series Articles". In this blog we will enter the code development of the core function module of the whole Secondary Kill System, that is, the code actual operation of the "Commodity Secondary Kill" function module.
The Commodity Secondary Ki ...
Posted on Mon, 22 Jul 2019 14:13:31 -0700 by fazzfarrell
ShiroFilter is the entry point for the entire Shiro and is used to intercept requests that require security control for processing.
shiro encapsulates a number of interceptors for detailed descriptions which can be referenced in the blog
Chapter VIII Interceptor Mechanism - Learn Shiro from Me: http://jinnianshilongnian.iteye.com/blog/2025656 ...
Posted on Tue, 02 Jul 2019 09:51:53 -0700 by Kisses
We use spring mvc as MVC framework and shiro as permission control framework in our project. In the process of using this framework, the following doubts slowly arise. This article will slowly parse the shiro source code with doubts, so as to solve the little bug in our happiness.
(1) What is the difference in request in spring con ...
Posted on Fri, 21 Jun 2019 13:04:04 -0700 by diegueins
In the last part Shiro Authentication Principle Finally, we introduce how IniRealm authenticates. In this article, we will introduce several concepts in Shiro authorization process and Shiro programmable authorization operation, and deepen our understanding of the authorization process through common user, role and authorization mode.
1. Three ...
Posted on Tue, 11 Jun 2019 12:49:48 -0700 by nut legend