java Spring安全性和密钥斗篷使用自定义身份验证提供程序失败
我们已经在Spring Security(Spring Boot 2)中使用KeyClope有一段时间了,现在我们正在尝试添加一个自定义API密钥身份验证机制,其中我们检查名为api-key
的头并将该值发送到远程服务进行验证,如果该值有效,则完全跳过KeyClope检查。这适用于所有请求和端点
我有自己的AuthenticationProvider
和AbstractAuthenticationProcessingFilter
,但是现在对服务器的所有请求都会抛出403,甚至是有效的keydape请求。奇怪的是,我的新代码甚至都没有被执行,因为没有日志记录或断点命中的迹象。我已经阅读了多重身份验证documentation和reviewed{a3}SO posts,但仍然无法使其工作
以下是我的定制AuthenticationProvider
:
public class ApiKeyAuthenticationProvider implements AuthenticationProvider {
@Override
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
log.info("API-KEY: Provider.authenticate()");
ApiKeyAuthenticationToken auth = (ApiKeyAuthenticationToken) authentication;
String apiKey = auth.getCredentials().toString();
// Always returns TRUE at the moment to test bypassing Keycloak
boolean isApiKeyValid = RemoteApiKeyService.verify(apiKey);
if (isApiKeyValid) {
log.info("API-KEY: auth successful");
auth.setAuthenticated(true);
} else {
log.warn("API-KEY: auth failed");
throw new BadCredentialsException("Api-Key Authentication Failed");
}
return auth;
}
@Override
public boolean supports(Class<?> authentication) {
log.info("API-KEY: Provider.supports(): " + authentication.getSimpleName());
return authentication.isAssignableFrom(ApiKeyAuthenticationToken.class);
}
}
我的代币:
public class ApiKeyAuthenticationToken extends AbstractAuthenticationToken {
private final String token;
public ApiKeyAuthenticationToken(String token) {
super(null);
this.token = token;
}
@Override
public Object getCredentials() {
return token;
}
@Override
public Object getPrincipal() {
return null;
}
}
以下是过滤器:
public class ApiKeyFilter extends AbstractAuthenticationProcessingFilter {
public ApiKeyFilter() {
super("/*");
log.info("API-KEY filter.init()");
}
@Override
public Authentication attemptAuthentication(HttpServletRequest request,
HttpServletResponse response) throws AuthenticationException, IOException, ServletException {
log.info("API-KEY filter.attemptAuthentication()");
String apiKeyHeader = request.getHeader("api-key");
if (apiKeyHeader != null) {
return new ApiKeyAuthenticationToken(apiKeyHeader);
}
return null;
}
}
最后,我如何使用多个提供程序将所有内容与安全配置结合在一起:
@Slf4j
@Configuration
@EnableWebSecurity
@SuppressWarnings("SpringJavaInjectionPointsAutowiringInspection")
public class SecurityConf {
@Configuration
@Order(1) //Order is 1 -> First the special case
public static class ApiKeySecurityConfig extends WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception
{
http.csrf().disable().authorizeRequests()
.antMatchers("/**").authenticated();
}
@Autowired
public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception {
// our custom authentication provider
auth.authenticationProvider(new ApiKeyAuthenticationProvider());
}
}
@Configuration
@Order(2) // processed after our API Key bean config
public static class KeycloakSecurityConfig extends KeycloakWebSecurityConfigurerAdapter {
@Autowired
public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception {
KeycloakAuthenticationProvider provider = keycloakAuthenticationProvider();
provider.setGrantedAuthoritiesMapper(new SimpleAuthorityMapper());
auth.authenticationProvider(provider);
}
@Bean
@Override
protected SessionAuthenticationStrategy sessionAuthenticationStrategy() {
return new RegisterSessionAuthenticationStrategy(new SessionRegistryImpl());
}
@Override
protected void configure(HttpSecurity http) throws Exception {
super.configure(http);
http.csrf().disable().authorizeRequests();
http.headers().frameOptions().disable();
}
// necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
@Bean
public FilterRegistrationBean keycloakAuthenticationProcessingFilterRegistrationBean(KeycloakAuthenticationProcessingFilter filter) {
FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
registrationBean.setEnabled(false);
return registrationBean;
}
// necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
@Bean
public FilterRegistrationBean keycloakPreAuthActionsFilterRegistrationBean(KeycloakPreAuthActionsFilter filter) {
FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
registrationBean.setEnabled(false);
return registrationBean;
}
// necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
@Bean
public FilterRegistrationBean keycloakAuthenticatedActionsFilterBean(
KeycloakAuthenticatedActionsFilter filter) {
FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
registrationBean.setEnabled(false);
return registrationBean;
}
// necessary due to http://www.keycloak.org/docs/latest/securing_apps/index.html#avoid-double-filter-bean-registration
@Bean
public FilterRegistrationBean keycloakSecurityContextRequestFilterBean(
KeycloakSecurityContextRequestFilter filter) {
FilterRegistrationBean registrationBean = new FilterRegistrationBean(filter);
registrationBean.setEnabled(false);
return registrationBean;
}
@Bean
@Scope(value = "singleton")
public KeycloakSpringBootConfigResolver keycloakConfigResolver() {
final KeycloakDeployment keycloakDeployment = KeycloakDeploymentBuilder.build(
KeycloakClient.default_client.toAdapterConfig()
);
return new KeycloakSpringBootConfigResolver() {
@Override
public KeycloakDeployment resolve(HttpFacade.Request request) {
return keycloakDeployment;
}
};
}
}
}
知道什么被误解了吗?有趣的是,我的代码甚至都没有运行过,但却破坏了KeyClope
# 1 楼答案
以此为例,在代码中进行相应的尝试
注意:这里的关键点是如上所述在配置文件中添加令牌和过滤器。 很抱歉没有发布直接的答案,因为我已经有了这个答案,它将为您提供一个广泛的工作领域,或者提供一个让代码正常运行的想法