Spring Security — In Action Second Edition
With sessions disabled, every request must carry its own proof of identity. Here is a simplified implementation of a JWT service as described in the book:
To go stateless, we need to disable session creation entirely: spring security in action second edition
"The best session is no session at all." — A mantra for modern Spring Security developers. With sessions disabled, every request must carry its
The most critical piece from the second edition is the custom filter. It intercepts every request, grabs the Authorization: Bearer header, and populates the SecurityContextHolder for that request only (because there is no session to carry it forward). With sessions disabled
