mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-03-03 11:59:08 +00:00
292 lines
9.1 KiB
Plaintext
292 lines
9.1 KiB
Plaintext
[[oauth2Client-client-auth-support]]
|
|
= Client Authentication Support
|
|
|
|
[[oauth2Client-client-credentials-auth]]
|
|
== Client Credentials
|
|
|
|
=== Authenticate using `client_secret_basic`
|
|
|
|
Client Authentication with HTTP Basic is supported out of the box and no customization is necessary to enable it.
|
|
The default implementation is provided by `DefaultOAuth2TokenRequestHeadersConverter`.
|
|
|
|
Given the following Spring Boot properties for an OAuth 2.0 client registration:
|
|
|
|
[source,yaml]
|
|
----
|
|
spring:
|
|
security:
|
|
oauth2:
|
|
client:
|
|
registration:
|
|
okta:
|
|
client-id: client-id
|
|
client-secret: client-secret
|
|
client-authentication-method: client_secret_basic
|
|
authorization-grant-type: authorization_code
|
|
...
|
|
----
|
|
|
|
The following example shows how to configure `WebClientReactiveAuthorizationCodeTokenResponseClient` to disable URL encoding of the client credentials:
|
|
|
|
[tabs]
|
|
======
|
|
Java::
|
|
+
|
|
[source,java,role="primary"]
|
|
----
|
|
DefaultOAuth2TokenRequestHeadersConverter<OAuth2AuthorizationCodeGrantRequest> headersConverter =
|
|
new DefaultOAuth2TokenRequestHeadersConverter<>();
|
|
headersConverter.setEncodeClientCredentials(false);
|
|
|
|
WebClientReactiveAuthorizationCodeTokenResponseClient tokenResponseClient =
|
|
new WebClientReactiveAuthorizationCodeTokenResponseClient();
|
|
tokenResponseClient.setHeadersConverter(headersConverter);
|
|
----
|
|
|
|
Kotlin::
|
|
+
|
|
[source,kotlin,role="secondary"]
|
|
----
|
|
val headersConverter = DefaultOAuth2TokenRequestHeadersConverter<OAuth2AuthorizationCodeGrantRequest>()
|
|
headersConverter.setEncodeClientCredentials(false)
|
|
|
|
val tokenResponseClient = WebClientReactiveAuthorizationCodeTokenResponseClient()
|
|
tokenResponseClient.setHeadersConverter(headersConverter)
|
|
----
|
|
======
|
|
|
|
=== Authenticate using `client_secret_post`
|
|
|
|
Client Authentication with client credentials included in the request-body is supported out of the box and no customization is necessary to enable it.
|
|
|
|
The following Spring Boot properties for an OAuth 2.0 client registration demonstrate the configuration:
|
|
|
|
[source,yaml]
|
|
----
|
|
spring:
|
|
security:
|
|
oauth2:
|
|
client:
|
|
registration:
|
|
okta:
|
|
client-id: client-id
|
|
client-secret: client-secret
|
|
client-authentication-method: client_secret_post
|
|
authorization-grant-type: authorization_code
|
|
...
|
|
----
|
|
|
|
[[oauth2Client-jwt-bearer-auth]]
|
|
== JWT Bearer
|
|
|
|
[NOTE]
|
|
Please refer to JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants for further details on https://datatracker.ietf.org/doc/html/rfc7523#section-2.2[JWT Bearer] Client Authentication.
|
|
|
|
The default implementation for JWT Bearer Client Authentication is `NimbusJwtClientAuthenticationParametersConverter`,
|
|
which is a `Converter` that customizes the Token Request parameters by adding
|
|
a signed JSON Web Token (JWS) in the `client_assertion` parameter.
|
|
|
|
The `java.security.PrivateKey` or `javax.crypto.SecretKey` used for signing the JWS
|
|
is supplied by the `com.nimbusds.jose.jwk.JWK` resolver associated with `NimbusJwtClientAuthenticationParametersConverter`.
|
|
|
|
|
|
=== Authenticate using `private_key_jwt`
|
|
|
|
Given the following Spring Boot properties for an OAuth 2.0 Client registration:
|
|
|
|
[source,yaml]
|
|
----
|
|
spring:
|
|
security:
|
|
oauth2:
|
|
client:
|
|
registration:
|
|
okta:
|
|
client-id: okta-client-id
|
|
client-authentication-method: private_key_jwt
|
|
authorization-grant-type: authorization_code
|
|
...
|
|
----
|
|
|
|
The following example shows how to configure `WebClientReactiveAuthorizationCodeTokenResponseClient`:
|
|
|
|
[tabs]
|
|
======
|
|
Java::
|
|
+
|
|
[source,java,role="primary"]
|
|
----
|
|
Function<ClientRegistration, JWK> jwkResolver = (clientRegistration) -> {
|
|
if (clientRegistration.getClientAuthenticationMethod().equals(ClientAuthenticationMethod.PRIVATE_KEY_JWT)) {
|
|
// Assuming RSA key type
|
|
RSAPublicKey publicKey = ...
|
|
RSAPrivateKey privateKey = ...
|
|
return new RSAKey.Builder(publicKey)
|
|
.privateKey(privateKey)
|
|
.keyID(UUID.randomUUID().toString())
|
|
.build();
|
|
}
|
|
return null;
|
|
};
|
|
|
|
WebClientReactiveAuthorizationCodeTokenResponseClient tokenResponseClient =
|
|
new WebClientReactiveAuthorizationCodeTokenResponseClient();
|
|
tokenResponseClient.addParametersConverter(
|
|
new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver));
|
|
----
|
|
|
|
Kotlin::
|
|
+
|
|
[source,kotlin,role="secondary"]
|
|
----
|
|
val jwkResolver: Function<ClientRegistration, JWK> =
|
|
Function<ClientRegistration, JWK> { clientRegistration ->
|
|
if (clientRegistration.clientAuthenticationMethod.equals(ClientAuthenticationMethod.PRIVATE_KEY_JWT)) {
|
|
// Assuming RSA key type
|
|
var publicKey: RSAPublicKey = ...
|
|
var privateKey: RSAPrivateKey = ...
|
|
RSAKey.Builder(publicKey)
|
|
.privateKey(privateKey)
|
|
.keyID(UUID.randomUUID().toString())
|
|
.build()
|
|
}
|
|
null
|
|
}
|
|
|
|
val tokenResponseClient = WebClientReactiveAuthorizationCodeTokenResponseClient()
|
|
tokenResponseClient.addParametersConverter(
|
|
NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
|
|
)
|
|
----
|
|
======
|
|
|
|
|
|
=== Authenticate using `client_secret_jwt`
|
|
|
|
Given the following Spring Boot properties for an OAuth 2.0 Client registration:
|
|
|
|
[source,yaml]
|
|
----
|
|
spring:
|
|
security:
|
|
oauth2:
|
|
client:
|
|
registration:
|
|
okta:
|
|
client-id: okta-client-id
|
|
client-secret: okta-client-secret
|
|
client-authentication-method: client_secret_jwt
|
|
authorization-grant-type: client_credentials
|
|
...
|
|
----
|
|
|
|
The following example shows how to configure `WebClientReactiveClientCredentialsTokenResponseClient`:
|
|
|
|
[tabs]
|
|
======
|
|
Java::
|
|
+
|
|
[source,java,role="primary"]
|
|
----
|
|
Function<ClientRegistration, JWK> jwkResolver = (clientRegistration) -> {
|
|
if (clientRegistration.getClientAuthenticationMethod().equals(ClientAuthenticationMethod.CLIENT_SECRET_JWT)) {
|
|
SecretKeySpec secretKey = new SecretKeySpec(
|
|
clientRegistration.getClientSecret().getBytes(StandardCharsets.UTF_8),
|
|
"HmacSHA256");
|
|
return new OctetSequenceKey.Builder(secretKey)
|
|
.keyID(UUID.randomUUID().toString())
|
|
.build();
|
|
}
|
|
return null;
|
|
};
|
|
|
|
WebClientReactiveClientCredentialsTokenResponseClient tokenResponseClient =
|
|
new WebClientReactiveClientCredentialsTokenResponseClient();
|
|
tokenResponseClient.addParametersConverter(
|
|
new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver));
|
|
----
|
|
|
|
Kotlin::
|
|
+
|
|
[source,kotlin,role="secondary"]
|
|
----
|
|
val jwkResolver = Function<ClientRegistration, JWK?> { clientRegistration: ClientRegistration ->
|
|
if (clientRegistration.clientAuthenticationMethod == ClientAuthenticationMethod.CLIENT_SECRET_JWT) {
|
|
val secretKey = SecretKeySpec(
|
|
clientRegistration.clientSecret.toByteArray(StandardCharsets.UTF_8),
|
|
"HmacSHA256"
|
|
)
|
|
OctetSequenceKey.Builder(secretKey)
|
|
.keyID(UUID.randomUUID().toString())
|
|
.build()
|
|
}
|
|
null
|
|
}
|
|
|
|
val tokenResponseClient = WebClientReactiveClientCredentialsTokenResponseClient()
|
|
tokenResponseClient.addParametersConverter(
|
|
NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
|
|
)
|
|
----
|
|
======
|
|
|
|
=== Customizing the JWT assertion
|
|
|
|
The JWT produced by `NimbusJwtClientAuthenticationParametersConverter` contains the `iss`, `sub`, `aud`, `jti`, `iat` and `exp` claims by default. You can customize the headers and/or claims by providing a `Consumer<NimbusJwtClientAuthenticationParametersConverter.JwtClientAuthenticationContext<T>>` to `setJwtClientAssertionCustomizer()`. The following example shows how to customize claims of the JWT:
|
|
|
|
[tabs]
|
|
======
|
|
Java::
|
|
+
|
|
[source,java,role="primary"]
|
|
----
|
|
Function<ClientRegistration, JWK> jwkResolver = ...
|
|
|
|
NimbusJwtClientAuthenticationParametersConverter<OAuth2ClientCredentialsGrantRequest> converter =
|
|
new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver);
|
|
converter.setJwtClientAssertionCustomizer((context) -> {
|
|
context.getHeaders().header("custom-header", "header-value");
|
|
context.getClaims().claim("custom-claim", "claim-value");
|
|
});
|
|
----
|
|
|
|
Kotlin::
|
|
+
|
|
[source,kotlin,role="secondary"]
|
|
----
|
|
val jwkResolver = ...
|
|
|
|
val converter: NimbusJwtClientAuthenticationParametersConverter<OAuth2ClientCredentialsGrantRequest> =
|
|
NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
|
|
converter.setJwtClientAssertionCustomizer { context ->
|
|
context.headers.header("custom-header", "header-value")
|
|
context.claims.claim("custom-claim", "claim-value")
|
|
}
|
|
----
|
|
======
|
|
|
|
[[oauth2Client-public-auth]]
|
|
== Public Authentication
|
|
|
|
Public Client Authentication is supported out of the box and no customization is necessary to enable it.
|
|
|
|
The following Spring Boot properties for an OAuth 2.0 client registration demonstrate the configuration:
|
|
|
|
[source,yaml]
|
|
----
|
|
spring:
|
|
security:
|
|
oauth2:
|
|
client:
|
|
registration:
|
|
okta:
|
|
client-id: client-id
|
|
client-authentication-method: none
|
|
authorization-grant-type: authorization_code
|
|
...
|
|
----
|
|
|
|
[NOTE]
|
|
Public Clients are supported using https://tools.ietf.org/html/rfc7636[Proof Key for Code Exchange] (PKCE).
|
|
PKCE will automatically be used when `client-authentication-method` is set to "none" (`ClientAuthenticationMethod.NONE`).
|