Spring Security

LicenseApache 2.0
CategoriesEncryption Libraries
Tagssecuritycryptographyspringcryptoframeworkencryption
Organization spring.io
HomePage https://spring.io/spring-security 🔍 Inspect URL
DateMar 20, 2023
Filespom (2 KB)  jar (78 KB)  View All
RepositoriesCentral
Ranking#691 in MvnRepository (See Top Artifacts)
#5 in Encryption Libraries
Used By895 artifacts
VulnerabilitiesDirect vulnerabilities:
CVE-2025-22228

Vulnerabilities from dependencies:
CVE-2025-8916
CVE-2020-15250

Note: There is a new version for this artifact

New Version7.0.0-RC3

Scope:
Scope:
Format:
Scope:
Scope:
Scope:
Scope:
Scope:
Scope:

Compile Dependencies (2)

Category/License Group / ArtifactVersionUpdates
Encryption Lib
BouncyCastle
org.bouncycastle » bcpkix-jdk15on (optional) 1 vulnerability 1.661.82
Logging Bridge
Apache 2.0
org.springframework » spring-jcl (optional) 5.2.19.RELEASE6.2.13

Test Dependencies (4)

Licenses

LicenseURL
The Apache Software License, Version 2.0 https://www.apache.org/licenses/LICENSE-2.0.txt

Developers

NameEmailDev IdRolesOrganization
Rob Winchrwinch<at>pivotal.iorwinch
Joe Grandjajgrandja<at>pivotal.iojgrandja

Related Books

Practical Microservices Architectural Patterns: Build Highly Scalable Distributed Applications with Spring Boot 3 and Spring CloudPractical Microservices Architectural Patterns: Build Highly Scalable Distributed Applications with Spring Boot 3 and Spring Cloud (2025)
by Christudas, Binildas, Telang, Tarun
Software Architecture with Spring: Design scalable and high-performance Java applications with SpringSoftware Architecture with Spring: Design scalable and high-performance Java applications with Spring (2025)
by Xesquevixos, Wanderson
Spring System Design in Practice: Build scalable web applications using microservices and design patterns in Spring and Spring BootSpring System Design in Practice: Build scalable web applications using microservices and design patterns in Spring and Spring Boot (2025)
by Santiago, Rodrigo, Goyal, Shalini
Spring Security 6 Recipes: Essential Techniques for Quick and Secure Java Applications (Apress Pocket Guides)Spring Security 6 Recipes: Essential Techniques for Quick and Secure Java Applications (Apress Pocket Guides) (2025)
by Nardone, Massimo
Spring Framework Mastery: Build Enterprise-Grade Java Applications with Spring Boot and MicroservicesSpring Framework Mastery: Build Enterprise-Grade Java Applications with Spring Boot and Microservices (2025)
by Rambert, Dennis
Modern Security with Spring: Best Practices for Securing APIs and MicroservicesModern Security with Spring: Best Practices for Securing APIs and Microservices (2025)
by Joshi, Aarav
Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
Cryptography (The MIT Press Essential Knowledge series)Cryptography (The MIT Press Essential Knowledge series) (2024)
by Louridas, Panos
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern EncryptionSerious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption (2024)
by Aumasson, Jean-Philippe
In-Depth Exploration of Spring Security: Mastering Authentication and AuthorizationIn-Depth Exploration of Spring Security: Mastering Authentication and Authorization (2024)
by Jones, Adam
Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum CryptographyCryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography (2024)
by Bertaccini, Massimo
Spring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architecturesSpring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures (2024)
by Nasslahsen, Badr
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum AlgorithmsUnderstanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (2024)
by Paar, Christof, Pelzl, Jan, Güneysu, Tim
Spring Security in Action, Second EditionSpring Security in Action, Second Edition (2024)
by Spilca, Laurentiu
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java ApplicationsPro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications (2023)
by Nardone, Massimo, Scarioni, Carlo
Spring Boot 3 and Spring Framework 6: Build Scalable, Modern Java Applications with Spring and Spring Boot—From Fundamentals to Advanced Techniques (Rheinwerk Computing)Spring Boot 3 and Spring Framework 6: Build Scalable, Modern Java Applications with Spring and Spring Boot—From Fundamentals to Advanced Techniques (Rheinwerk Computing) (2023)
by Ullenboom, Christian
Pro Spring 6 with Kotlin: An In-depth Guide to Using Kotlin APIs in Spring Framework 6Pro Spring 6 with Kotlin: An In-depth Guide to Using Kotlin APIs in Spring Framework 6 (2023)
by Späth, Peter, Cosmina, Iuliana, Harrop, Rob, Schaefer, Chris
Pro Spring 6: An In-Depth Guide to the Spring FrameworkPro Spring 6: An In-Depth Guide to the Spring Framework (2023)
by Cosmina, Iuliana, Harrop, Rob, Schaefer, Chris, Ho, Clarence
Pro Spring 6: An In-Depth Guide to the Spring FrameworkPro Spring 6: An In-Depth Guide to the Spring Framework (2023)
by Cosmina, Iuliana, Harrop, Rob, Schaefer, Chris, Ho, Clarence
Spring 6 Recipes: A Problem-Solution Approach to Spring FrameworkSpring 6 Recipes: A Problem-Solution Approach to Spring Framework (2023)
by Deinum, Marten, Rubio, Daniel, Long, Josh
Simplifying Spring SecuritySimplifying Spring Security (2022)
by Mali, Yogesh
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
Spring in Action, Sixth EditionSpring in Action, Sixth Edition (2022)
by Walls, Craig
Real-World CryptographyReal-World Cryptography (2021)
by Wong, David
Spring Boot: Up and Running: Building Cloud Native Java and Kotlin ApplicationsSpring Boot: Up and Running: Building Cloud Native Java and Kotlin Applications (2021)
by Heckler, Mark
Spring Security in ActionSpring Security in Action (2020)
by Spilca, Laurentiu
Spring Security in ActionSpring Security in Action (2020)
by Spilca, Laurentiu
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java ApplicationsPro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications (2019)
by Scarioni, Carlo, Nardone, Massimo
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionThe Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (2018)
by Holden, Joshua
Spring Security: Secure your web applications, RESTful services, and microservice architecturesSpring Security: Secure your web applications, RESTful services, and microservice architectures (2017)
by Knutson, Mick, Winch, Robert, Mularien, Peter
Serious Cryptography: A Practical Introduction to Modern EncryptionSerious Cryptography: A Practical Introduction to Modern Encryption (2017)
by Aumasson, Jean-Philippe
Spring 5 Recipes: A Problem-Solution ApproachSpring 5 Recipes: A Problem-Solution Approach (2017)
by Deinum, Marten, Rubio, Daniel, Long, Josh
Beginning Spring Boot 2: Applications and Microservices with the Spring FrameworkBeginning Spring Boot 2: Applications and Microservices with the Spring Framework (2017)
by Prasad Reddy, K. Siva
Getting started with Spring Framework: a hands-on guide to begin developing applications using Spring FrameworkGetting started with Spring Framework: a hands-on guide to begin developing applications using Spring Framework (2016)
by Sharma, J, Sarin, Ashish
Spring Security EssentialsSpring Security Essentials (2016)
by Nachimuthu, Nanda
Understanding Cryptography: A Textbook for Students and PractitionersUnderstanding Cryptography: A Textbook for Students and Practitioners (2014)
by Paar, Christof, Pelzl, Jan, Preneel, Bart
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) (2014)
by Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Getting started with Spring Framework: a hands-on guide to begin developing applications using Spring FrameworkGetting started with Spring Framework: a hands-on guide to begin developing applications using Spring Framework (2014)
by Sharma, J, Sarin, Ashish
Introducing Spring Framework: A PrimerIntroducing Spring Framework: A Primer (2013)
by Gutierrez, Felipe
Spring Security 3.x CookbookSpring Security 3.x Cookbook (2013)
by Mankale, Anjana
Instant Spring Security StarterInstant Spring Security Starter (2013)
by Jagielski, Piotr, Nabrdalik, Jakub
Break the Code: Cryptography for Beginners (Dover Kids Activity Books)Break the Code: Cryptography for Beginners (Dover Kids Activity Books) (2013)
by Johnson, Bud
Pro Spring SecurityPro Spring Security (2013)
by Scarioni, Carlo
Spring Framework: A Step by Step Approach for Learning Spring FrameworkSpring Framework: A Step by Step Approach for Learning Spring Framework (2013)
by Mudunuri, Srinivas
Spring Security 3.1Spring Security 3.1 (2012)
by Robert Winch, Peter Mularien
Getting started with Spring FrameworkGetting started with Spring Framework (2012)
by Sharma, J, Sarin, Ashish
Just Spring: A Lightweight Introduction to the Spring FrameworkJust Spring: A Lightweight Introduction to the Spring Framework (2011)
by Konda, Madhusudhan
Spring Security 3Spring Security 3 (2010)
by Mularien, Peter
Pro Java EE Spring Patterns: Best Practices and Design Strategies Implementing Java EE Patterns with the Spring Framework (Expert's Voice in Open Source)Pro Java EE Spring Patterns: Best Practices and Design Strategies Implementing Java EE Patterns with the Spring Framework (Expert's Voice in Open Source) (2008)
by Kayal, Dhrubojyoti