"Charting the Course ...

... to Your Success!"

Spring Framework II

Course Summary

Description

This course is the next step in using the many features the has to offer. In depth Web topics covering Web Flow and MVC address the powerful features for building popular workflow structures in applications. Spring Security will be applied to all areas including the Method level. will be used to build entire applications, including Spring MVC. Web Services for SOAP and RESTful are included to complete the Web Tier.

Objectives

At the end of this course, students will be able to:

 Design, create and debug complex Spring MVC applications.  Understand Web Flow and where it can be used.  Create, monitor, and test Spring Web Services.  Apply Security to all levels of Spring Framework applications, including methods.  Use Spring Roo to create Spring Framework applications.  Configure Spring Framework using Java Classes and eliminate Web.XML configuration.  Incorporate JQuery and JavaServer Faces.

Topics

 Web Development  Spring Roo  Web Services  What’s Next in Spring III  Security

Audience

This course is designed for Developers who have attended the “Spring Framework I” class or equivalent experience in developing or maintaining Spring Framework Web applications.

Prerequisites

Spring programming experience, a basic knowledge of configuration, familiarity with the Spring Framework dependency injection, and Aspect oriented programming.

Duration

Five Days

Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically

PT0137_SPRINGFRAMEWORKII.DOC

"Charting the Course ...

... to Your Success!"

Spring Framework II

Course Outline

VI. RESTful Web Service I. The Web Module and Spring MFC A. Dependencies A. The MVC Pattern B. Exposing the Service B. The Front Controller Pattern C. RESTTemplate C. DispatcherServlet D. JSR 303 Considerations D. Why Spring MVC? E. Application Configuration VII. The Scope of Security F. Spring Handler Mapping A. The Network Security Layer G. spring-servlet.xml B. The Operating System Layer H. Adding the Services Layer C. The Application Layer I. JQuery Considerations D. Authentication and Authorization: General J. Transaction Considerations Concepts E. What to Secure II. Controllers and Commands F. More Security Concerns A. Overview of the Spring MVC Controllers G. Java Options for Security B. ParameterizableViewControllers C. SimpleFormControllers VIII. Introducing Spring Security D. Inserting Spring Custom Form Tags A. What is Spring Security? E. Binding Data B. Where does Spring Security fit in? F. Incorporating MultiActionControllers C. Spring Security and Spring D. Spring Framework: A Quick Overview III. Binding and Validation E. An Initial Spring Security Secured Application A. Adding Validators F. Understanding the Simple Application B. Creating a Model Validator C. Working with Message Properties Files IX. Web Security D. Using Annotations A. Introducing the simple example application E. The @Controller Annotation B. The Special URLs F. The @RequestMapping Annotation C. Custom Login Form G. Other Handler Annotations D. Basic HTTP Authentication E. Digest Authentication IV. Working with Spring Web Flow F. Beyond Simple User Roles: Using Spring A. Installing Spring Web Flow Expression Language to Secure the Web Layer B. The components of a flow G. Extend with Custom Expressions C. Putting it all together in an application D. Securing web flows X. Securing the Service Layer A. The Limitations of Web-Level Security V. SOAP Web Services B. What Is Business Service-Level Security? A. Setup C. How the Described Actions Happen Under the B. Tools Hood C. WSDL D. Creating a Business Layer in an Application D. Testing E. @RolesAllowed Annotation F. Securing the Application Using SpEL Expressions

Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically

PT0137_SPRINGFRAMEWORKII.DOC

"Charting the Course ...

... to Your Success!"

Spring Framework II

Course Outline (con’t)

G. Securing the Data Returned from a Method H. Using AspectJ AOP instead of Spring AOP

XI. Customizing and Extending Spring Security A. Spring Security Extension Points B. Plug into the Spring Security Event System C. Custom AuthenticationProvider and UserDetailsService D. Password Encryption E. Custom Security Filter F. Handling Errors and Entry Points G. Changing the Security Interceptor H. Spring Security Extensions Project

Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically

PT0137_SPRINGFRAMEWORKII.DOC