diff --git a/docs/modules/ROOT/pages/servlet/authorization/architecture.adoc b/docs/modules/ROOT/pages/servlet/authorization/architecture.adoc index 6e65ea0553..490a4c0616 100644 --- a/docs/modules/ROOT/pages/servlet/authorization/architecture.adoc +++ b/docs/modules/ROOT/pages/servlet/authorization/architecture.adoc @@ -241,8 +241,8 @@ Alternatively, you can modify every access constraint which requires the "user" This can get quite complicated if you have a lot of different roles in your application. The use of a role-hierarchy allows you to configure which roles (or authorities) should include others. -An extended version of Spring Security's `RoleVoter`, `RoleHierarchyVoter`, is configured with a `RoleHierarchy`, from which it obtains all the "reachable authorities" which the user is assigned. -A typical configuration might look like this: +This is supported for filter-based authorization in `HttpSecurity#authorizeHttpRequests` and for method-based authorization through `DefaultMethodSecurityExpressionHandler` for pre-post annotations, `SecuredAuthorizationManager` for `@Secured`, and `Jsr250AuthorizationManager` for JSR-250 annotations. +You can configure the behavior for all of them at once in the following way: .Hierarchical Roles Configuration [tabs] @@ -260,7 +260,7 @@ static RoleHierarchy roleHierarchy() { .build(); } -// and, if using method security also add +// and, if using pre-post method security also add @Bean static MethodSecurityExpressionHandler methodSecurityExpressionHandler(RoleHierarchy roleHierarchy) { DefaultMethodSecurityExpressionHandler expressionHandler = new DefaultMethodSecurityExpressionHandler(); @@ -292,13 +292,10 @@ Xml:: ---- ====== -[NOTE] -`RoleHierarchy` bean configuration is not yet ported over to `@EnableMethodSecurity`. -As such this example is using `AccessDecisionVoter`. -If you need `RoleHierarchy` support for method security, please continue using `@EnableGlobalMethodSecurity` until https://github.com/spring-projects/spring-security/issues/12783 is complete. - Here we have four roles in a hierarchy `ROLE_ADMIN => ROLE_STAFF => ROLE_USER => ROLE_GUEST`. -A user who is authenticated with `ROLE_ADMIN`, will behave as if they have all four roles when security constraints are evaluated against an `AuthorizationManager` adapted to call the above `RoleHierarchyVoter`. +A user who is authenticated with `ROLE_ADMIN`, will behave as if they have all four roles when security constraints are evaluated against any filter- or method-based rules. + +[TIP] The `>` symbol can be thought of as meaning "includes". Role hierarchies offer a convenient means of simplifying the access-control configuration data for your application and/or reducing the number of authorities which you need to assign to a user.