Exploring Preauthorization Techniques in Spring Security