You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -83,7 +84,8 @@ Specifically, any user can access a request if the URL starts with "/resources/"
83
84
You will notice that since we are invoking the `hasRole` method we do not need to specify the "ROLE_" prefix.
84
85
<4> Any URL that starts with "/db/" requires the user to have both "ROLE_ADMIN" and "ROLE_DBA".
85
86
You will notice that since we are using the `hasRole` expression we do not need to specify the "ROLE_" prefix.
86
-
<5> Any URL that has not already been matched on is denied access.
87
+
<5> The same rule from 4, could be written by combining multiple `AuthorizationManager`.
88
+
<6> Any URL that has not already been matched on is denied access.
87
89
This is a good strategy if you do not want to accidentally forget to update your authorization rules.
88
90
89
91
You can take a bean-based approach by constructing your own xref:servlet/authorization/architecture.adoc#authz-delegate-authorization-manager[`RequestMatcherDelegatingAuthorizationManager`] like so:
0 commit comments