@@ -331,12 +331,10 @@ public void init(final WebSecurity web) throws Exception {
331
331
* Override this method to configure {@link WebSecurity}. For example, if you wish to
332
332
* ignore certain requests.
333
333
*
334
- * Endpoint used in this method ignores the
335
- * spring security filters, headers, csrf etc. see
336
- * {@link org.springframework.security.config.annotation.web.configurers.HeadersConfigurer} and
337
- * {@link org.springframework.security.config.annotation.web.configurers.CsrfConfigurer }
334
+ * Endpoints specified in this method will be ignored by Spring Security, meaning it
335
+ * will not protect them from CSRF, XSS, Clickjacking, and so on.
338
336
*
339
- * Instead, if you want to protect public endpoints against common vulnerabilities, then see
337
+ * Instead, if you want to protect endpoints against common vulnerabilities, then see
340
338
* {@link #configure(HttpSecurity)} and the {@link HttpSecurity#authorizeRequests}
341
339
* configuration method.
342
340
*/
@@ -352,9 +350,9 @@ public void configure(WebSecurity web) throws Exception {
352
350
* http.authorizeRequests().anyRequest().authenticated().and().formLogin().and().httpBasic();
353
351
* </pre>
354
352
*
355
- * Public endpoints that require defense against common vulnerabilities can be specified here.
353
+ * Any endpoint that requires defense against common vulnerabilities can be specified here, including public ones .
356
354
* See {@link HttpSecurity#authorizeRequests} and the `permitAll()` authorization rule
357
- * for more details.
355
+ * for more details on public endpoints .
358
356
*
359
357
* @param http the {@link HttpSecurity} to modify
360
358
* @throws Exception if an error occurs
0 commit comments