Security
parent
6e6ca79ae0
commit
137bff9515
6
Home.md
6
Home.md
@ -305,7 +305,9 @@ The HTTP request parameters is used to transfer values that is used to configure
|
|||||||
4. …in descending order (highest balance first)
|
4. …in descending order (highest balance first)
|
||||||
/cashcards?page=1&size=3&sort=amount**,desc**
|
/cashcards?page=1&size=3&sort=amount**,desc**
|
||||||
|
|
||||||
# Spring Security
|
# Security
|
||||||
|
|
||||||
|
Detailed implementation of features provided by Spring Security can be seen in [[Security]] page.
|
||||||
|
|
||||||
## Authentication
|
## Authentication
|
||||||
|
|
||||||
@ -348,7 +350,7 @@ One type of vulnerability is a [**Cross-Site Request Forgery](https://en.wikiped
|
|||||||
|
|
||||||
To protect against CSRF attacks, you can use a **CSRF Token**. A CSRF Token is different from an Auth Token because a unique token is generated on each request. This makes it harder for an outside actor to insert itself into the “conversation” between the client and the server.
|
To protect against CSRF attacks, you can use a **CSRF Token**. A CSRF Token is different from an Auth Token because a unique token is generated on each request. This makes it harder for an outside actor to insert itself into the “conversation” between the client and the server.
|
||||||
|
|
||||||
Thankfully, Spring Security has built-in support for CSRF tokens which is enabled by default. You’ll learn more about this in the upcoming [[lab]].
|
Thankfully, Spring Security has built-in support for CSRF tokens which is enabled by default.
|
||||||
|
|
||||||
### Cross-Site Scripting
|
### Cross-Site Scripting
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user