TagSpring Security

Java Spring Jongo Spring Boot Spring Security Authentication Authorization Denormalization

Authentication & authorization with Spring Boot & MongoDB

Posted on .

Abstract: What should we denormalize and what should we not? How many times have you heard this question in the context of MongoDB? As a follow up of this question there is often a counter example of how we used to do it with a relational database. In this art…