Month: April 2016

New recipe: Spring REST endpoint to impersonate

Learn how to use Spring security’s impersonate feature adapted to your own security constraints and as a REST endpoint here.

Advertisements