These four items, not three items, constitute the auth process: . A user is prompted to log in with a username and password. . The system (successfully) verifies that the password is correct for the username. . The context information for that user is obtained (their list of roles and so on). . A security context is established for the user |
||
|---|---|---|
| .. | ||
| articles/src/docbook | ||
| guides | ||
| manual | ||
| spring-security-docs.gradle | ||