In my first post regarding Regular Expressions (regex), we discussed the basic syntax of regex, its importance and how they are used along with a few examples. I strongly recommend reading that post first if you are completely unfamiliar with regex. Otherwise, lets move on.
This tutorial will not cover what regex are, what are their benefits and the basic syntax. For that refer to my previous post. But this tutorial will
A regular expression defines a search pattern for strings. This pattern may match one or several times or not at all for a given string. The abbreviation for regular expression is regex.
Regular expressions can helps in
- Searching and pattern matching
- Text replacement
- Collecting information ( word count, no. of spaces, no. of lines)
- Many default operating system programs support regex ( grep, windows search). Some other programs like syntax highlighters and Eclipse Search also use regex power.
Continue reading Regular Expressions For Beginners: Lesson 1
This is the last part of SpringSecurity: Authenticating & Authorizing AJAX Requests. In first part, we discussed some background theory. In second part, we went through server-side implementation. Now in this post, we will go through client-side implementation. This implementation will be based upon jQuery, but I hope you can easily translate it in your favorite framework.
Continue reading SpringSecurity: Authenticating & Authorizing AJAX Requests (Client-Side Implementation)
In my previous post, we discussed a bit of theory related to authentication and authorization of AJAX requests. We also defined the desired behavior that we would like to achieve as a result of this process. In this post, I will share the server-side code that you will need to achieve that behavior.
Continue reading SpringSecurity: Authenticating & Authorizing AJAX Requests (Server-Side Implementation)
This is my second post on Spring Security (first being this) and I will try to be more detailed here. Please keep sharing your feedback with me so that I could improve myself.
After all of the lengthy setups, primary value that we get from Spring Security (or any other security framework) is the ability to authenticate and authorize each request that application receives. First I will try to explain a bit the processes of authentication and authorization.
Continue reading SpringSecurity: Authenticating & Authorizing AJAX Requests