有 Java 编程相关的问题?

你可以在下面搜索框中键入要查询的问题!

java Spring安全性和密钥斗篷使用自定义身份验证提供程序失败

我们已经在Spring Security(Spring Boot 2)中使用KeyClope有一段时间了,现在我们正在尝试添加一个自定义API密钥身份验证机制,其中我们检查名为api-key的头并将该值发送到远程服务进行验证,如果该值有效,则完全跳过KeyClope检查。这适用于所有请求和端点

我有自己的AuthenticationProviderAbstractAuthenticationProcessingFilter,但是现在对服务器的所有请求都会抛出403,甚至是有效的keydape请求。奇怪的是,我的新代码甚至都没有被执行,因为没有日志记录或断点命中的迹象。我已经阅读了多重身份验证documentationreviewed{a3}SO posts,但仍然无法使其工作

以下是我的定制AuthenticationProvider

public class ApiKeyAuthenticationProvider implements AuthenticationProvider {

    @Override
    public Authentication authenticate(Authentication authentication) throws AuthenticationException {

        log.info("API-KEY: Provider.authenticate()");

        ApiKeyAuthenticationToken auth = (ApiKeyAuthenticationToken) authentication;

        String apiKey = auth.getCredentials().toString();

        // Always returns TRUE at the moment to test bypassing Keycloak
        boolean isApiKeyValid = RemoteApiKeyService.verify(apiKey);

        if (isApiKeyValid) {
            log.info("API-KEY: auth successful");
            auth.setAuthenticated(true);
        } else {
            log.warn("API-KEY: auth failed");
            throw new BadCredentialsException("Api-Key Authentication Failed");
        }

        return auth;
    }

    @Override
    public boolean supports(Class<?> authentication) {
        log.info("API-KEY: Provider.supports(): " + authentication.getSimpleName());
        return authentication.isAssignableFrom(ApiKeyAuthenticationToken.class);
    }
}

我的代币:

public class ApiKeyAuthenticationToken extends AbstractAuthenticationToken {

    private final String token;

    public ApiKeyAuthenticationToken(String token) {
        super(null);
        this.token = token;
    }

    @Override
    public Object getCredentials() {
        return token;
    }

    @Override
    public Object getPrincipal() {
        return null;
    }
}

以下是过滤器:

public class ApiKeyFilter extends AbstractAuthenticationProcessingFilter {

    public ApiKeyFilter() {
        super("/*");
        log.info("API-KEY filter.init()");
    }

    @Override
    public Authentication attemptAuthentication(HttpServletRequest request,
                                                HttpServletResponse response) throws AuthenticationException, IOException, ServletException {
        log.info("API-KEY filter.attemptAuthentication()");
        String apiKeyHeader = request.getHeader("api-key");
        if (apiKeyHeader != null) {
            return new ApiKeyAuthenticationToken(apiKeyHeader);
        }

        return null;
    }
}

最后,我如何使用多个提供程序将所有内容与安全配置结合在一起:

@Slf4j
@Configuration
@EnableWebSecurity
@SuppressWarnings("SpringJavaInjectionPointsAutowiringInspection")
public class SecurityConf {

  @Configuration
  @Order(1) //Order is 1 -> First the special case
  public static class ApiKeySecurityConfig extends WebSecurityConfigurerAdapter {

    @Override
    protected void configure(HttpSecurity http) throws Exception
    {
      http.csrf().disable().authorizeRequests()
              .antMatchers("/**").authenticated();
    }

    @Autowired
    public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception {
      // our custom authentication provider
      auth.authenticationProvider(new ApiKeyAuthenticationProvider());
    }
  }

  @Configuration
  @Order(2) // processed after our API Key bean config
  public static class KeycloakSecurityConfig extends KeycloakWebSecurityConfigurerAdapter {

    @Autowired
    public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception {
      KeycloakAuthenticationProvider provider = keycloakAuthenticationProvider();
      provider.setGrantedAuthoritiesMapper(new SimpleAuthorityMapper());
      auth.authenticationProvider(provider);
    }

    @Bean
    @Override
    protected SessionAuthenticationStrategy sessionAuthenticationStrategy() {
      return new RegisterSessionAuthenticationStrategy(new SessionRegistryImpl());
    }

    @Override
    protected void configure(HttpSecurity http) throws Exception {
      super.configure(http);

      http.csrf().disable().authorizeRequests();
      http.headers().frameOptions().disable();
    }

    // necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
    @Bean
    public FilterRegistrationBean keycloakAuthenticationProcessingFilterRegistrationBean(KeycloakAuthenticationProcessingFilter filter) {
      FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
      registrationBean.setEnabled(false);
      return registrationBean;
    }

    // necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
    @Bean
    public FilterRegistrationBean keycloakPreAuthActionsFilterRegistrationBean(KeycloakPreAuthActionsFilter filter) {
      FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
      registrationBean.setEnabled(false);
      return registrationBean;
    }

    // necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
    @Bean
    public FilterRegistrationBean keycloakAuthenticatedActionsFilterBean(
            KeycloakAuthenticatedActionsFilter filter) {
      FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
      registrationBean.setEnabled(false);
      return registrationBean;
    }

    // necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
    @Bean
    public FilterRegistrationBean keycloakSecurityContextRequestFilterBean(
            KeycloakSecurityContextRequestFilter filter) {
      FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
      registrationBean.setEnabled(false);
      return registrationBean;
    }


    @Bean
    @Scope(value = "singleton")
    public KeycloakSpringBootConfigResolver keycloakConfigResolver() {

      final KeycloakDeployment keycloakDeployment = KeycloakDeploymentBuilder.build(
              KeycloakClient.default_client.toAdapterConfig()
      );

      return new KeycloakSpringBootConfigResolver() {

        @Override
        public KeycloakDeployment resolve(HttpFacade.Request request) {
          return keycloakDeployment;
        }

      };
    }
  }
}

知道什么被误解了吗?有趣的是,我的代码甚至都没有运行过,但却破坏了KeyClope


共 (1) 个答案

  1. # 1 楼答案

    以此为例,在代码中进行相应的尝试

    @Override
        protected void configure(HttpSecurity http) throws Exception {
            AuthenticationProvider rememberMeAuthenticationProvider = rememberMeAuthenticationProvider();
            TokenBasedRememberMeServices tokenBasedRememberMeServices = tokenBasedRememberMeServices();
    
            List<AuthenticationProvider> authenticationProviders = new ArrayList<AuthenticationProvider>(2);
            authenticationProviders.add(rememberMeAuthenticationProvider);
            authenticationProviders.add(customAuthenticationProvider);
            AuthenticationManager authenticationManager = authenticationManager(authenticationProviders);
    
            http
                    .csrf().disable()
                    .headers().disable()
                    .addFilter(new RememberMeAuthenticationFilter(authenticationManager, tokenBasedRememberMeServices))
                    .rememberMe().rememberMeServices(tokenBasedRememberMeServices)
                    .and()
                    .authorizeRequests()
                    .antMatchers("/js/**", "/css/**", "/img/**", "/login", "/processLogin").permitAll()
                    .antMatchers("/index.jsp", "/index.html", "/index").hasRole("USER")
                    .antMatchers("/admin", "/admin.html", "/admin.jsp", "/js/saic/jswe/admin/**").hasRole("ADMIN")
                    .and()
                    .formLogin().loginProcessingUrl("/processLogin").loginPage("/login").usernameParameter("username").passwordParameter("password").permitAll()
                    .and()
                    .exceptionHandling().accessDeniedPage("/login")
                    .and()
                    .logout().permitAll();
        }
    

    注意:这里的关键点是如上所述在配置文件中添加令牌和过滤器。 很抱歉没有发布直接的答案,因为我已经有了这个答案,它将为您提供一个广泛的工作领域,或者提供一个让代码正常运行的想法