M
Michael Jacobs
Guest
The example I showed you applied to the URL access control used by the server's REST data services called by some device/browser. It would not be used to control UI functionality. If you were a writing JSP UI then the code fragment you supplied would contain the Spring Security tags to do direct control over the UI's operation. It would not be used to control access to the application data. Two different uses supported by a common Spring Security framework. Mike J.
Continue reading...
Continue reading...