@yogeshsaidani1607

This guy is just amazing. The way of topic explanation is just next level and easy to understand. Really enjoying this playlist.

@biswajeet9826

This really is getting better and better!!
I might finish it today!!

@Devivl

That's a great lesson. Thanks for trying. You're doing a great job. With small steps we are making big strides.

@biswajeet9826

SecurityFilterChain: The central concept. It's a chain of Filter objects, each responsible for a specific aspect of security (authentication, authorization, etc.). The order of these filters is crucial.

@biswajeet9826

PasswordEncoder: Responsible for encoding and verifying passwords. Spring Security provides several implementations, including BCryptPasswordEncoder and Pbkdf2PasswordEncoder.

@biswajeet9826

You can add your own custom Filter implementations to the SecurityFilterChain to perform specific security-related tasks, such as:

Logging access attempts

Implementing custom authentication schemes

Adding security headers

Modifying requests or responses

@BonoloSolomon-ek6yr

Thank you for this video Navin, it was very helpful.

@pushpak6523

Navin sir, I am really thankful to learn spring security from you. But I also want to learn how you approach these technologies that you want to learn(Talking as a beginner point of view).

@buddy_made_easy

great video again 👍👍

@fatimapereira838

Again excellent!

@manishkeshari5096

sir please continue this series of Spring Security With JWT

@techterror

Thank you sir... latest and upto the market needs

@pankajzurange4385

Great tutorial❤

@biswajeet9826

WebSecurityConfigurerAdapter (Deprecated, but still widely used): A base class for configuring Spring Security. Override its methods to customize the SecurityFilterChain. Recommendation: Prefer Component-based Configuration (using @Configuration and @Bean) for newer projects, as WebSecurityConfigurerAdapter is deprecated and may be removed in future versions.

@biswajeet9826

UserDetailsService: An interface used by Spring Security to load user information from a data source (e.g., a database). You implement this interface to provide your own user retrieval logic.

@KiddosMastiTime

That was great 👍

@biswajeet9826

Component-based Configuration: A more modern approach using @Configuration and @Bean to define security configuration components.

@shivarajme

super Naveen!!!

@velank7181

the Custom Configuration settings methods are too large it's confusing and how to store this all syntax and methods in the human brain....?

@AlthafAz

Great explainations