March 8, 2023, 12:15 p.m. | Semyon Kirekov

DEV Community dev.to

That's a small addition to my previous post "Spring Security and Non-flat Roles Inheritance Architecture". In this article, I'm telling you:



  1. How to generate documentation for Spring Security authorization rules directly from code?

  2. How to host the result HTML page on GitHub Pages?


Such documentation is useful for a variety of specialists. System and business analysts want to understand the logic behind request processing. While quality engineers check that endpoints validate the access as described in the task. …

addition analysts architecture article authorization business check code docs documentation endpoints engineers github host html java logic non programming quality request result roles rules security spring spring security system tutorial understand

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA