mirror of
				https://github.com/spring-projects/spring-security.git
				synced 2025-11-03 16:18:48 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			103 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			103 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
[[reactive-x509]]
 | 
						|
= Reactive X.509 Authentication
 | 
						|
 | 
						|
Similar to xref:servlet/authentication/x509.adoc#servlet-x509[Servlet X.509 authentication], the reactive x509 authentication filter allows extracting an authentication token from a certificate provided by a client.
 | 
						|
 | 
						|
The following example shows a reactive x509 security configuration:
 | 
						|
 | 
						|
[tabs]
 | 
						|
======
 | 
						|
Java::
 | 
						|
+
 | 
						|
[source,java,role="primary"]
 | 
						|
----
 | 
						|
@Bean
 | 
						|
public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
 | 
						|
	http
 | 
						|
		.x509(withDefaults())
 | 
						|
		.authorizeExchange(exchanges -> exchanges
 | 
						|
		    .anyExchange().permitAll()
 | 
						|
		);
 | 
						|
	return http.build();
 | 
						|
}
 | 
						|
----
 | 
						|
 | 
						|
Kotlin::
 | 
						|
+
 | 
						|
[source,kotlin,role="secondary"]
 | 
						|
----
 | 
						|
@Bean
 | 
						|
fun securityWebFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
 | 
						|
    return http {
 | 
						|
        x509 { }
 | 
						|
        authorizeExchange {
 | 
						|
            authorize(anyExchange, authenticated)
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 | 
						|
----
 | 
						|
======
 | 
						|
 | 
						|
In the preceding configuration, when neither `principalExtractor` nor `authenticationManager` is provided, defaults are used. The default principal extractor is `SubjectDnX509PrincipalExtractor`, which extracts the CN (common name) field from a certificate provided by a client. The default authentication manager is `ReactivePreAuthenticatedAuthenticationManager`, which performs user account validation, checking that a user account with a name extracted by `principalExtractor` exists and that it is not locked, disabled, or expired.
 | 
						|
 | 
						|
The following example demonstrates how these defaults can be overridden:
 | 
						|
 | 
						|
[tabs]
 | 
						|
======
 | 
						|
Java::
 | 
						|
+
 | 
						|
[source,java,role="primary"]
 | 
						|
----
 | 
						|
@Bean
 | 
						|
public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
 | 
						|
	SubjectDnX509PrincipalExtractor principalExtractor =
 | 
						|
	        new SubjectDnX509PrincipalExtractor();
 | 
						|
 | 
						|
	principalExtractor.setSubjectDnRegex("OU=(.*?)(?:,|$)");
 | 
						|
 | 
						|
	ReactiveAuthenticationManager authenticationManager = authentication -> {
 | 
						|
		authentication.setAuthenticated("Trusted Org Unit".equals(authentication.getName()));
 | 
						|
		return Mono.just(authentication);
 | 
						|
	};
 | 
						|
 | 
						|
	http
 | 
						|
		.x509(x509 -> x509
 | 
						|
		    .principalExtractor(principalExtractor)
 | 
						|
		    .authenticationManager(authenticationManager)
 | 
						|
		)
 | 
						|
		.authorizeExchange(exchanges -> exchanges
 | 
						|
		    .anyExchange().authenticated()
 | 
						|
		);
 | 
						|
	return http.build();
 | 
						|
}
 | 
						|
----
 | 
						|
 | 
						|
Kotlin::
 | 
						|
+
 | 
						|
[source,kotlin,role="secondary"]
 | 
						|
----
 | 
						|
@Bean
 | 
						|
fun securityWebFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain? {
 | 
						|
    val customPrincipalExtractor = SubjectDnX509PrincipalExtractor()
 | 
						|
    customPrincipalExtractor.setSubjectDnRegex("OU=(.*?)(?:,|$)")
 | 
						|
    val customAuthenticationManager = ReactiveAuthenticationManager { authentication: Authentication ->
 | 
						|
        authentication.isAuthenticated = "Trusted Org Unit" == authentication.name
 | 
						|
        Mono.just(authentication)
 | 
						|
    }
 | 
						|
    return http {
 | 
						|
        x509 {
 | 
						|
            principalExtractor = customPrincipalExtractor
 | 
						|
            authenticationManager = customAuthenticationManager
 | 
						|
        }
 | 
						|
        authorizeExchange {
 | 
						|
            authorize(anyExchange, authenticated)
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 | 
						|
----
 | 
						|
======
 | 
						|
 | 
						|
In the previous example, a username is extracted from the OU field of a client certificate instead of CN, and account lookup using `ReactiveUserDetailsService` is not performed at all. Instead, if the provided certificate issued to an OU named "`Trusted Org Unit`", a request is authenticated.
 | 
						|
 | 
						|
For an example of configuring Netty and `WebClient` or `curl` command-line tool to use mutual TLS and enable X.509 authentication, see https://github.com/spring-projects/spring-security-samples/tree/main/servlet/java-configuration/authentication/x509.
 |