mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-05-29 08:12:14 +00:00
Use Imperative in Headers
Issue gh-12224
This commit is contained in:
parent
7675874137
commit
63aec87c61
@ -171,7 +171,7 @@ http {
|
||||
|
||||
To opt-out of the 6.0 defaults and instead continue to pass `AuthenticationServiceException` on to ``ServerAuthenticationEntryPoint``s, you can follow the same steps as above, except set `rethrowAuthenticationServiceException` to false.
|
||||
|
||||
== Deprecations in OAuth2 Client
|
||||
== Address OAuth2 Client Deprecations
|
||||
|
||||
=== `ServerOAuth2AuthorizedClientExchangeFilterFunction`
|
||||
|
||||
|
@ -114,7 +114,7 @@ open fun springSecurity(http: HttpSecurity): SecurityFilterChain {
|
||||
----
|
||||
====
|
||||
|
||||
== CSRF BREACH Protection
|
||||
== Protect against CSRF BREACH
|
||||
|
||||
If the steps for <<Defer Loading CsrfToken>> work for you, then you can also opt into Spring Security 6's default support for BREACH protection of the `CsrfToken` using the following configuration:
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
The following steps relate to changes around how to configure OAuth 2.0.
|
||||
|
||||
== Default authorities for oauth2Login()
|
||||
== Change Default `oauth2Login()` Authorities
|
||||
|
||||
In Spring Security 5, the default `GrantedAuthority` given to a user that authenticates with an OAuth2 or OpenID Connect 1.0 provider (via `oauth2Login()`) is `ROLE_USER`.
|
||||
|
||||
@ -192,7 +192,7 @@ private fun grantedAuthoritiesMapper(): GrantedAuthoritiesMapper {
|
||||
----
|
||||
====
|
||||
|
||||
== Deprecations in OAuth2 Client
|
||||
== Address OAuth2 Client Deprecations
|
||||
|
||||
In Spring Security 6, deprecated classes and methods were removed from xref:servlet/oauth2/client/index.adoc[OAuth2 Client].
|
||||
Each deprecation is listed below, along with a direct replacement.
|
||||
@ -313,12 +313,7 @@ The static method `implicit()` has no direct replacement.
|
||||
Use of the `implicit` grant type is not recommended and all related support is removed in Spring Security 6.
|
||||
====
|
||||
|
||||
== Deprecations in OAuth2 Resource Server
|
||||
|
||||
In Spring Security 6, deprecated classes and methods were removed from xref:servlet/oauth2/resource-server/index.adoc[OAuth2 Resource Server].
|
||||
Each deprecation is listed below, along with a direct replacement.
|
||||
|
||||
=== `JwtAuthenticationConverter`
|
||||
== Address `JwtAuthenticationConverter` Deprecation
|
||||
|
||||
The method `extractAuthorities(...)` can be replaced with `JwtGrantedAuthoritiesConverter#convert(...)`.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
= Session Management Migrations
|
||||
|
||||
== Explicit Save SecurityContextRepository
|
||||
== Require Explicit Saving of SecurityContextRepository
|
||||
|
||||
In Spring Security 5, the default behavior is for the xref:servlet/authentication/architecture.adoc#servlet-authentication-securitycontext[`SecurityContext`] to automatically be saved to the xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] using the xref:servlet/authentication/persistence.adoc#securitycontextpersistencefilter[`SecurityContextPersistenceFilter`].
|
||||
Saving must be done just prior to the `HttpServletResponse` being committed and just before `SecurityContextPersistenceFilter`.
|
||||
@ -15,7 +15,7 @@ To opt into the new Spring Security 6 default, the following configuration can b
|
||||
|
||||
include::partial$servlet/architecture/security-context-explicit.adoc[]
|
||||
|
||||
== Multiple SecurityContextRepository
|
||||
== Change `HttpSessionSecurityContextRepository` to `DelegatingSecurityContextRepository`
|
||||
|
||||
In Spring Security 5, the default xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] is `HttpSessionSecurityContextRepository`.
|
||||
|
||||
@ -82,7 +82,7 @@ fun securityFilterChain(http: HttpSecurity): SecurityFilterChain {
|
||||
If you are already using an implementation other than `HttpSessionSecurityContextRepository`, you should replace it with your chosen implementation in the example above to ensure that it is used along with `RequestAttributeSecurityContextRepository`.
|
||||
====
|
||||
|
||||
== Deprecation in SecurityContextRepository
|
||||
== Address `SecurityContextRepository` Deprecations
|
||||
|
||||
In Spring Security 5.7, a new method was added to xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] with the signature:
|
||||
|
||||
@ -170,7 +170,7 @@ If you are not overriding the defaults (i.e. using `NullRequestCache`), then the
|
||||
|
||||
include::partial$servlet/architecture/request-cache-continue.adoc[]
|
||||
|
||||
== Explicit SessionAuthenticationStrategy
|
||||
== Require Explicit Invocation of SessionAuthenticationStrategy
|
||||
|
||||
In Spring Security 5, the default configuration relies on `SessionManagementFilter` to detect if a user just authenticated and invoke the `SessionAuthenticationStrategy`.
|
||||
The problem with this is that it means that in a typical setup, the `HttpSession` must be read for every request.
|
||||
|
Loading…
x
Reference in New Issue
Block a user