
1. Authorities2. Invocation HandlingThe AuthorizationManagerDelegate-based AuthorizationManager Implementations3. Adapting AccessDecisionManager and AccessDecisionVoters4. Hierarchical Roles5. Legacy Authorization ComponentsThe AccessDecisionManagerVoting-Based AccessDecisionManager Implementations 출처Spring Security - Authorization