Spring Security Java Config Preview: Web Security

Update

Users should refer to the Spring Security Reference which contains more up to date information.

Original Blog Post

In my previous post , I introduced Spring Security Java configuration and discussed some of the logistics of the project. In this post, we will start off by walking through a very simple web security configuration. We will then spice things up a bit with configuration that has been customized some.

Hello Web Security

In this section we go through the most basic configuration for web based security. It can be broken into four steps:

  • Updating your dependencies - we demonstrated this using Maven in our previous blog post
  • Provide the Spring Security configuration - in our example this is done with a WebSecurityConfigurerAdapter
  • Ensure the Spring Security configuration is loaded - in our example this is done with AbstractAnnotationConfigDispatcherServletInitializer
  • Configure the springSecurityFilterChain - in our example this is done with AbstractSecurityWebApplicationInitializer
  • WebSecurityConfigurerAdapter

    The @EnableWebSecurity annotation and WebSecurityConfigurerAdapter work together to provide web based security. By extending WebSecurityConfigurerAdapter and only a few lines of code we are able to do the following:

  • Require the user to be authenticated prior to accessing any URL within our application
  • Create a user with the username "user", password "password", and role of "ROLE_USER"
  • Enables HTTP Basic and Form based authentication
  • Spring Security will automatically render a login page and logout success page for you
  • @Configuration @EnableWebSecurity public class HelloWebSecurityConfiguration extends WebSecurityConfigurerAdapter { @Autowired public void configureGlobal(AuthenticationManagerBuilder auth) { .inMemoryAuthentication() .withUser("user").password("password").roles("USER");

    For your reference, this is similar to the following XML configuration with a few exceptions:

  • Spring Security will render the login, authentication failure url, and logout success URLs
  • The login-processing-url will only be processed for HTTP POST
  • The login-page will only be processed for HTTP GET
  • <http use-expressions="true"> <intercept-url pattern="/**" access="authenticated"/> <logout logout-success-url="/login?logout" logout-url="/logout" <form-login authentication-failure-url="/login?error" login-page="/login" login-processing-url="/login" password-parameter="password" username-parameter="username" </http> <authentication-manager> <authentication-provider> <user-service> <user name="user" password="password" authorities="ROLE_USER"/> </user-service> </authentication-provider> </authentication-manager>

    AbstractAnnotationConfigDispatcherServletInitializer

    The next step is to ensure that the root ApplicationContext includes the HelloWebSecurityConfiguration we just specified . There are many different ways we could do this, but if you are using Spring's AbstractAnnotationConfigDispatcherServletInitializer it might look something like this:

    public class SpringWebMvcInitializer extends AbstractAnnotationConfigDispatcherServletInitializer { @Override protected Class<?>[] getRootConfigClasses() { return new Class[] { HelloWebSecurityConfiguration.class };

    To put this in perspective, Spring Security was traditionally initialized using something similar to the following lines within the web.xml:

    <!-- Creates the Spring Container shared by all Servlets and Filters --> <listener> <listener-class> org.springframework.web.context.ContextLoaderListener </listener-class> </listener> <!-- Load all Spring XML configuration including our security.xml file --> <context-param> <param-name>contextConfigLocation</param-name> <param-value>/WEB-INF/spring/*.xml</param-value> </context-param>

    [callout title="Ordering of WebApplicationInitializer"] If any servlet Filter mappings are added after AbstractSecurityWebApplicationInitializer is invoked, they might be accidentally added before springSecurityFilterChain. Unless an application contains Filter instances that do not need to be secured, springSecurityFilterChain should be before any other Filter mappings. The @Order annotation can be used to help ensure that any WebApplicationInitializer is loaded in a deterministic order.[/callout]

    AbstractSecurity WebApplicationInitializer

    The last step is we need to map the springSecurityFilterChain . We can easily do this by extending AbstractSecurityWebApplicationInitializer and optionally overriding methods to customize the mapping.

    The most basic example below accepts the default mapping and adds springSecurityFilterChain with the following characteristics:

  • springSecurityFilterChain is mapped to "/*"
  • springSecurityFilterChain uses the dispatch types of ERROR and REQUEST
  • The springSecurityFilterChain mapping is inserted before any servlet Filter mappings that have already been configured
  • public class SecurityWebApplicationInitializer extends AbstractSecurityWebApplicationInitializer {

    The above code is the equivalent of the following lines within the web.xml:

    <filter> <filter-name>springSecurityFilterChain</filter-name> <filter-class> org.springframework.web.filter.DelegatingFilterProxy </filter-class> </filter> <filter-mapping> <filter-name>springSecurityFilterChain</filter-name> <url-pattern>/*</url-pattern> <dispatcher>ERROR</dispatcher> <dispatcher>REQUEST</dispatcher> </filter-mapping>

    CustomWebSecurityConfigurerAdapter

    Our HelloWebSecurityConfiguration sample, demonstrates that Spring Security Java configuration can provide some very nice defaults for us. Let's take a look at some basic customization.

    @EnableWebSecurity @Configuration public class CustomWebSecurityConfigurerAdapter extends WebSecurityConfigurerAdapter { @Autowired public void configureGlobal(AuthenticationManagerBuilder auth) { .inMemoryAuthentication() .withUser("user") // #1 .password("password") .roles("USER") .and() .withUser("admin") // #2 .password("password") .roles("ADMIN","USER"); @Override public void configure(WebSecurity web) throws Exception { .ignoring() .antMatchers("/resources/**"); // #3 @Override protected void configure(HttpSecurity http) throws Exception { .authorizeUrls() .antMatchers("/signup","/about").permitAll() // #4 .antMatchers("/admin/**").hasRole("ADMIN") // #6 .anyRequest().authenticated() // 7 .and() .formLogin() // #8 .loginUrl("/login") // #9 .permitAll(); // #5

    Assuming that we adjust AbstractAnnotationConfigDispatcherServletInitializer to load our new configuration, our CustomWebSecurityConfigurerAdapter will do the following:

  • Allow in memory authentication with a user named "user"
  • Allow in memory authentication with an administrative user named "admin"
  • Ignore any request that starts with "/resources/". This is similar to configuring http@security=none when using the XML namespace configuration.
  • Allow anyone (including unauthenticated users) to access to the URLs "/signup" and "/about"
  • * Allow anyone (including unauthenticated users) to access to the URLs "/login" and "/login?error". The permitAll() in this case means, allow access to any URL that formLogin() uses. * Any URL that starts with "/admin/" must be an administrative user. For our example, that would be the user "admin". * All remaining URLs require that the user be successfully authenticated * Setup form based authentication using the Java configuration defaults. Authentication is performed when a POST is submitted to the URL "/login" with the parameters "username" and "password". * Explicitly state the login page, which means the developer is required to render the login page when GET /login is requested.

    For those that are familiar with the XML based configuration, the configuration above is very similar to the following XML configuration:

    <http security="none" pattern="/resources/**"/> <http use-expressions="true"> <intercept-url pattern="/logout" access="permitAll"/> <intercept-url pattern="/login" access="permitAll"/> <intercept-url pattern="/signup" access="permitAll"/> <intercept-url pattern="/about" access="permitAll"/> <intercept-url pattern="/**" access="hasRole('ROLE_USER')"/> <logout logout-success-url="/login?logout" logout-url="/logout" <form-login authentication-failure-url="/login?error" login-page="/login" login-processing-url="/login" password-parameter="password" username-parameter="username" </http> <authentication-manager> <authentication-provider> <user-service> <user name="user" password="password" authorities="ROLE_USER"/> <user name="admin" password="password" authorities="ROLE_USER,ROLE_ADMIN"/> </user-service> </authentication-provider> </authentication-manager>

    Similarities to the XML Namespace

    After looking at our slightly more complicated example, you might be able to find some similarities between the XML namespace and the Java configuration. Here are some of the more useful points:

  • HttpSecurity is quite similar to the http namespace element. It allows configuring web based security for a certain selection (in this case all) requests.
  • WebSecurity is quite similar to any Security namespace elements that are for the web and that do not require a parent (i.e. security=none, debug, etc). It allows configuring things that impact all of web security.
  • WebSecurityConfigurerAdapter is a convenience class that allows customization to both WebSecurity and HttpSecurity. We can extend WebSecurityConfigurerAdapter multiple times (in distinct objects) to replicate the behavior of having multiple http elements.
  • By formatting our Java configuration code it is much easier to read. It can be read similar to the XML namespace equivalent where "and()" represents optionally closing an XML element.
  • Differences to the XML Namespace

    You will notice that there are some important differences between the XML and Java configuration too.

  • When creating our users in #1 and #2 , we do not specify "ROLE_" as we would with the XML configuration. Since this convention is so common, the "roles" method automatically adds "ROLE_" for you. If you did not want "ROLE_" added you could use the authorities method instead.
  • Java configuration has different defaults URLs and parameters. Keep this in mind when creating custom login pages. The result is that our URLs are more RESTful. Additionally, it is not quite so obvious we are using Spring Security which helps to prevent information leaks . For example:
  • GET /login renders the login page instead of /spring_security_login
  • POST /login authenticates the user instead of /j_spring_security_check
  • The username parameter defaults to username instead of j_username
  • The password parameter defaults to password instead of j_password
  • Java configuration can easily map multiple request matchers to the same roles. This is apparent in #4 where we map two URLs to be accessible to anyone
  • Java configuration tries to remove redundant code. For example, instead of repeating our /login URL in the form-login element and the intercept-url element as we did with the XML, we can simply declare that users should have access to any URL related to formLogin() as shown with #5
  • When mapping HTTP requests using the hasRole method as we did in #6 , we do not need to specify "ROLE_" as we would in XML. Again, this is so common of a convention that the hasRole method automatically adds "ROLE_" for you. If you did not want to automatically prefix with "ROLE_", you could use the "access" method.
  • Additional Web Samples

    Sample Compatibility Since the code was merged into Spring Security 3.2 M2 with no changes, the samples will be compatible with either the stand alone module or spring-security-config-3.2.0.M2+

    We have given a few examples of how the Spring Security Java configuration can be used to secure your web application in order to wet your appetite. Below you can find a number of resources with additional samples.

  • There are plenty of samples in the HttpSecurity Javadoc . Be sure to check out the Javadoc on individual methods which gives examples for how to do things like openid , remember me , etc.
  • Web Samples
  • XML namespace to Java Config

    If you are having trouble converting from the XML namespace to the Java configuration, you can refer to the tests. The convention is that the test for a given XML element will start with "Namespace", contain the XML element name, and end with "Tests". For example, to learn how the http element maps to Java configuration, you would refer to the NamespaceHttpTests . Another example, is that you can figure out how the remember-me namespace maps to Java configuration in the NamespaceRememberMeTests .

    Feedback Please