Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

(Java) Spring Security ... just utter confusion.?

My question simply is, who can I talk to to get help with spring security? Is there like a live chat developers help somewhere?

But let me vent so you understand what I mean a little more.

I've got a project set up where I'm running a spring web app, with jboss, and hibernate to a mysql server. I'm doing most of the configuration using annotations. @requestmapping @entity @service ..yaddi yadda. All that's working great.

I've got to the point now where I want to have user logins to my app, users may have roles (basic, admin, etc. ) I'd like to approach this in a professional way instead of some adhoc user managment solution. So I check out spring-security.

Holy cow what a cluster ---- of disorganized garbage. I can get it working, I just have no idea how or why.

I've been working with java professionally for 5 years. I'm no genius, but I'm usually competent. I've been reading through the 20+ chapters of spring-security docs for the last 2 days but whoever wrote it seems to have actively decided to leave out any useful concrete examples of how to do anything.

I've been doing my due diligence trying to google things that confuse me. Yet all I can find is everyone saying the same stupid things "do this and this and it works" "put this string here to make this happen" with no explanations. Magic.

I will gladly stroke your ego for access to your sage wisdom.

2 Answers

Relevance
  • 7 years ago
    Favorite Answer

    No silver bullet - no magic. Only first-hand experience from a fellow Java programmer who has done the same as you: gotten lost in the basic questions: What is the problem? What Input is necessary? What is not?

    You need to do 2 things to get more done: 1) Scale down your program so that it meets the very essential questions. You have not, from your explanation, developed a potential strategy from the requirements. What are those requirements and what do they really mean? Three books you MUST read are the following bibles:

    1) Transaction Processing: Concepts and Techniques. Gray, J. and Reuter, A. Morgan-Kauffman Publishing.

    2) Mastering the Requirements Process: Robertson, S. and Robertson, J. Addison Wesley

    3) Fundamentals of Software Engineering: Ghezzi, C., Mehdi, J. and Mandrioli, D. Pearson Educational.

    ALL professional programmers should have these on their shelves. After you have looked at these bibles, you then should be ready to tackle your problem. I don't have any code in front of me, but using annotations (except @Override and @See) are merely bogging down your code. Using search engines will only get you to specific work-arounds and not to the problem. You will not like this answer. My goal is to give you a path to move forward, not to answer any specific question. Good Luck!

  • 5 years ago

    2

    Source(s): The Best Antivirus Software - http://moveantivirus.com/?UnPi
Still have questions? Get your answers by asking now.