OAuth 2.0 持有者令牌
持有者令牌解析
預設情況下,資源伺服器在 Authorization 頭中查詢持有者令牌。但是,這可以透過多種方式進行自定義。
從自定義頭中讀取持有者令牌
例如,您可能需要從自定義頭中讀取持有者令牌。為了實現這一點,您可以將 DefaultBearerTokenResolver 作為 Bean 公開,或者將其例項注入到 DSL 中,如以下示例所示
-
Java
-
Kotlin
-
Xml
@Bean
BearerTokenResolver bearerTokenResolver() {
DefaultBearerTokenResolver bearerTokenResolver = new DefaultBearerTokenResolver();
bearerTokenResolver.setBearerTokenHeaderName(HttpHeaders.PROXY_AUTHORIZATION);
return bearerTokenResolver;
}
@Bean
fun bearerTokenResolver(): BearerTokenResolver {
val bearerTokenResolver = DefaultBearerTokenResolver()
bearerTokenResolver.setBearerTokenHeaderName(HttpHeaders.PROXY_AUTHORIZATION)
return bearerTokenResolver
}
<http>
<oauth2-resource-server bearer-token-resolver-ref="bearerTokenResolver"/>
</http>
<bean id="bearerTokenResolver"
class="org.springframework.security.oauth2.server.resource.web.DefaultBearerTokenResolver">
<property name="bearerTokenHeaderName" value="Proxy-Authorization"/>
</bean>
或者,在提供者同時使用自定義頭和值的情況下,您可以使用 HeaderBearerTokenResolver 代替。
從表單引數中讀取持有者令牌
或者,您可能希望從表單引數中讀取令牌,這可以透過配置 DefaultBearerTokenResolver 來實現,如下所示
-
Java
-
Kotlin
-
Xml
DefaultBearerTokenResolver resolver = new DefaultBearerTokenResolver();
resolver.setAllowFormEncodedBodyParameter(true);
http
.oauth2ResourceServer((oauth2) -> oauth2
.bearerTokenResolver(resolver)
);
val resolver = DefaultBearerTokenResolver()
resolver.setAllowFormEncodedBodyParameter(true)
http {
oauth2ResourceServer {
bearerTokenResolver = resolver
}
}
<http>
<oauth2-resource-server bearer-token-resolver-ref="bearerTokenResolver"/>
</http>
<bean id="bearerTokenResolver"
class="org.springframework.security.oauth2.server.resource.web.HeaderBearerTokenResolver">
<property name="allowFormEncodedBodyParameter" value="true"/>
</bean>
持有者令牌傳播
現在您的資源伺服器已經驗證了令牌,將其傳遞給下游服務可能會很方便。使用 ServletBearerExchangeFilterFunction 可以非常簡單地實現,如以下示例所示
-
Java
-
Kotlin
@Bean
public WebClient rest() {
return WebClient.builder()
.filter(new ServletBearerExchangeFilterFunction())
.build();
}
@Bean
fun rest(): WebClient {
return WebClient.builder()
.filter(ServletBearerExchangeFilterFunction())
.build()
}
當上述 WebClient 用於執行請求時,Spring Security 將查詢當前的 Authentication 並提取任何 AbstractOAuth2Token 憑據。然後,它將在 Authorization 頭中傳播該令牌。
例如:
-
Java
-
Kotlin
this.rest.get()
.uri("https://other-service.example.com/endpoint")
.retrieve()
.bodyToMono(String.class)
.block()
this.rest.get()
.uri("https://other-service.example.com/endpoint")
.retrieve()
.bodyToMono<String>()
.block()
將呼叫 other-service.example.com/endpoint,為您新增持有者令牌 Authorization 頭。
在需要覆蓋此行為的地方,只需自己提供頭即可,如下所示
-
Java
-
Kotlin
this.rest.get()
.uri("https://other-service.example.com/endpoint")
.headers((headers) -> headers.setBearerAuth(overridingToken))
.retrieve()
.bodyToMono(String.class)
.block()
this.rest.get()
.uri("https://other-service.example.com/endpoint")
.headers{ headers -> headers.setBearerAuth(overridingToken)}
.retrieve()
.bodyToMono<String>()
.block()
在這種情況下,過濾器將回退並簡單地將請求轉發到Web過濾鏈的其餘部分。
| 與 OAuth 2.0 客戶端過濾器函式 不同,此過濾器函式不嘗試在令牌過期時續訂。要獲得此級別的支援,請使用 OAuth 2.0 客戶端過濾器。 |
RestTemplate 支援
目前沒有與 ServletBearerExchangeFilterFunction 等效的 RestTemplate,但是您可以使用自己的攔截器非常簡單地傳播請求的持有者令牌
-
Java
-
Kotlin
@Bean
RestTemplate rest() {
RestTemplate rest = new RestTemplate();
rest.getInterceptors().add((request, body, execution) -> {
Authentication authentication = SecurityContextHolder.getContext().getAuthentication();
if (authentication == null) {
return execution.execute(request, body);
}
if (!(authentication.getCredentials() instanceof AbstractOAuth2Token)) {
return execution.execute(request, body);
}
AbstractOAuth2Token token = (AbstractOAuth2Token) authentication.getCredentials();
request.getHeaders().setBearerAuth(token.getTokenValue());
return execution.execute(request, body);
});
return rest;
}
@Bean
fun rest(): RestTemplate {
val rest = RestTemplate()
rest.interceptors.add(ClientHttpRequestInterceptor { request, body, execution ->
val authentication: Authentication? = SecurityContextHolder.getContext().authentication
if (authentication == null) {
return execution.execute(request, body)
}
if (authentication.credentials !is AbstractOAuth2Token) {
return execution.execute(request, body)
}
request.headers.setBearerAuth(authentication.credentials.tokenValue)
execution.execute(request, body)
})
return rest
}
| 與 OAuth 2.0 授權客戶端管理器 不同,此過濾器攔截器不嘗試在令牌過期時續訂。要獲得此級別的支援,請使用 OAuth 2.0 授權客戶端管理器 建立攔截器。 |
持有者令牌失敗
持有者令牌可能因多種原因而無效。例如,令牌可能不再有效。
在這種情況下,資源伺服器會丟擲 InvalidBearerTokenException。與其他異常一樣,這會導致 OAuth 2.0 持有者令牌錯誤響應
HTTP/1.1 401 Unauthorized
WWW-Authenticate: Bearer error_code="invalid_token", error_description="Unsupported algorithm of none", error_uri="https://tools.ietf.org/html/rfc6750#section-3.1"
此外,它會作為 AuthenticationFailureBadCredentialsEvent 釋出,您可以在 您的應用程式中監聽,如下所示
-
Java
-
Kotlin
@Component
public class FailureEvents {
@EventListener
public void onFailure(AuthenticationFailureBadCredentialsEvent badCredentials) {
if (badCredentials.getAuthentication() instanceof BearerTokenAuthenticationToken) {
// ... handle
}
}
}
@Component
class FailureEvents {
@EventListener
fun onFailure(badCredentials: AuthenticationFailureBadCredentialsEvent) {
if (badCredentials.authentication is BearerTokenAuthenticationToken) {
// ... handle
}
}
}