question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

How configuration matches CustomCasSecurityConfiguration HttpSecurity

See original GitHub issue
public class CasConfiguration extends CasSecurityConfigurerAdapter {
       @Override
	public void configure(HttpSecurity http) throws Exception {
		http.authorizeRequests().antMatchers("/testServide/**").permitAll()
               .anyRequest().authenticated();
	}
}

With this configuration, it still requires testService authentication. Am I implementing correctly? I want this service not to require authentication.

Issue Analytics

  • State:closed
  • Created 5 years ago
  • Comments:5 (1 by maintainers)

github_iconTop GitHub Comments

1reaction
gouldnercommented, Aug 31, 2018

Do you have a typo ? “/testServide/**”) doesn’t match testService

0reactions
rafaelcastrocunhacommented, Sep 18, 2018

Thank you @gouldner

Read more comments on GitHub >

github_iconTop Results From Across the Web

Spring Security Reference
Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based ...
Read more >
"HttpSecurity" URL patterns should be correctly ordered
URL patterns configured on a HttpSecurity.authorizeRequests() method are considered in the order they were declared. It's easy to make a mistake and declare ......
Read more >
Spring boot security configuration ignoring permitted endpoints
Enable logging for Spring Security, it shows exactly what paths are matched when requesting that endpoint. For your second question no it is...
Read more >
Building Layers of Defense with Spring Security
Spring Security Configuration. Steps to add Spring Security support: 1. Configure dependency and servlet filter chain. 2. Centrally configure authentication.
Read more >
Configuring Security Policies | Junos OS - Juniper Networks
Junos OS allows you to configure security policies. ... If the SRX Series receives a packet that matches those specifications, it performs the...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found