We will create a security model with Jmix and demonstrate all opportunities of the Jmix security subsystem
Security is the primary step of every product. Creating an easily configurable access control mechanism for your application is extremely important. The Jmix security subsystem, which is based on Spring Security, allows you to do this quickly, reliably, and flexibly.
During the workshop, you will learn the main elements of the Jmix security subsystem and the rules for building a role model that provides access to the data and functionality.
Also, we will answer the questions you have always wanted to ask:
- What is the basis of Jmix Security, and why is Spring Security?
- How can I quickly develop a security model?
- What are roles and scopes?
- Can I create one role for everything? (The answer is yes, but you shouldn't)
In the practical session, we will create and test a set of roles and restrictions for an application.
Viktor Fadeev,
Product Manager, Jmix
Dmitriy Vaschenko,
Lead Trainer, Haulmont