The advanced authorization capabilities within Spring Security represent one of the most compelling reasons for its popularity. Irrespective of how you choose to authenticate - whether using a Spring Security-provided mechanism and provider, or integrating with a container or other non-Spring Security authentication authority - you will find the authorization services can be used within your application in a consistent and simple way.
In this part we'll explore the different
AbstractSecurityInterceptor implementations, which
were introduced in Part I. We then move on to explore how to fine-tune
authorization through use of domain access control lists.