mirror of
				https://github.com/spring-projects/spring-security.git
				synced 2025-11-04 08:39:05 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			292 lines
		
	
	
		
			9.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			292 lines
		
	
	
		
			9.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
[[oauth2Client-client-auth-support]]
 | 
						|
= Client Authentication Support
 | 
						|
 | 
						|
[[oauth2Client-client-credentials-auth]]
 | 
						|
== Client Credentials
 | 
						|
 | 
						|
=== Authenticate using `client_secret_basic`
 | 
						|
 | 
						|
Client Authentication with HTTP Basic is supported out of the box and no customization is necessary to enable it.
 | 
						|
The default implementation is provided by `DefaultOAuth2TokenRequestHeadersConverter`.
 | 
						|
 | 
						|
Given the following Spring Boot properties for an OAuth 2.0 client registration:
 | 
						|
 | 
						|
[source,yaml]
 | 
						|
----
 | 
						|
spring:
 | 
						|
  security:
 | 
						|
    oauth2:
 | 
						|
      client:
 | 
						|
        registration:
 | 
						|
          okta:
 | 
						|
            client-id: client-id
 | 
						|
            client-secret: client-secret
 | 
						|
            client-authentication-method: client_secret_basic
 | 
						|
            authorization-grant-type: authorization_code
 | 
						|
            ...
 | 
						|
----
 | 
						|
 | 
						|
The following example shows how to configure `WebClientReactiveAuthorizationCodeTokenResponseClient` to disable URL encoding of the client credentials:
 | 
						|
 | 
						|
[tabs]
 | 
						|
======
 | 
						|
Java::
 | 
						|
+
 | 
						|
[source,java,role="primary"]
 | 
						|
----
 | 
						|
DefaultOAuth2TokenRequestHeadersConverter<OAuth2AuthorizationCodeGrantRequest> headersConverter =
 | 
						|
		new DefaultOAuth2TokenRequestHeadersConverter<>();
 | 
						|
headersConverter.setEncodeClientCredentials(false);
 | 
						|
 | 
						|
WebClientReactiveAuthorizationCodeTokenResponseClient tokenResponseClient =
 | 
						|
		new WebClientReactiveAuthorizationCodeTokenResponseClient();
 | 
						|
tokenResponseClient.setHeadersConverter(headersConverter);
 | 
						|
----
 | 
						|
 | 
						|
Kotlin::
 | 
						|
+
 | 
						|
[source,kotlin,role="secondary"]
 | 
						|
----
 | 
						|
val headersConverter = DefaultOAuth2TokenRequestHeadersConverter<OAuth2AuthorizationCodeGrantRequest>()
 | 
						|
headersConverter.setEncodeClientCredentials(false)
 | 
						|
 | 
						|
val tokenResponseClient = WebClientReactiveAuthorizationCodeTokenResponseClient()
 | 
						|
tokenResponseClient.setHeadersConverter(headersConverter)
 | 
						|
----
 | 
						|
======
 | 
						|
 | 
						|
=== Authenticate using `client_secret_post`
 | 
						|
 | 
						|
Client Authentication with client credentials included in the request-body is supported out of the box and no customization is necessary to enable it.
 | 
						|
 | 
						|
The following Spring Boot properties for an OAuth 2.0 client registration demonstrate the configuration:
 | 
						|
 | 
						|
[source,yaml]
 | 
						|
----
 | 
						|
spring:
 | 
						|
  security:
 | 
						|
    oauth2:
 | 
						|
      client:
 | 
						|
        registration:
 | 
						|
          okta:
 | 
						|
            client-id: client-id
 | 
						|
            client-secret: client-secret
 | 
						|
            client-authentication-method: client_secret_post
 | 
						|
            authorization-grant-type: authorization_code
 | 
						|
            ...
 | 
						|
----
 | 
						|
 | 
						|
[[oauth2Client-jwt-bearer-auth]]
 | 
						|
== JWT Bearer
 | 
						|
 | 
						|
[NOTE]
 | 
						|
Please refer to JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants for further details on https://datatracker.ietf.org/doc/html/rfc7523#section-2.2[JWT Bearer] Client Authentication.
 | 
						|
 | 
						|
The default implementation for JWT Bearer Client Authentication is `NimbusJwtClientAuthenticationParametersConverter`,
 | 
						|
which is a `Converter` that customizes the Token Request parameters by adding
 | 
						|
a signed JSON Web Token (JWS) in the `client_assertion` parameter.
 | 
						|
 | 
						|
The `java.security.PrivateKey` or `javax.crypto.SecretKey` used for signing the JWS
 | 
						|
is supplied by the `com.nimbusds.jose.jwk.JWK` resolver associated with `NimbusJwtClientAuthenticationParametersConverter`.
 | 
						|
 | 
						|
 | 
						|
=== Authenticate using `private_key_jwt`
 | 
						|
 | 
						|
Given the following Spring Boot properties for an OAuth 2.0 Client registration:
 | 
						|
 | 
						|
[source,yaml]
 | 
						|
----
 | 
						|
spring:
 | 
						|
  security:
 | 
						|
    oauth2:
 | 
						|
      client:
 | 
						|
        registration:
 | 
						|
          okta:
 | 
						|
            client-id: okta-client-id
 | 
						|
            client-authentication-method: private_key_jwt
 | 
						|
            authorization-grant-type: authorization_code
 | 
						|
            ...
 | 
						|
----
 | 
						|
 | 
						|
The following example shows how to configure `WebClientReactiveAuthorizationCodeTokenResponseClient`:
 | 
						|
 | 
						|
[tabs]
 | 
						|
======
 | 
						|
Java::
 | 
						|
+
 | 
						|
[source,java,role="primary"]
 | 
						|
----
 | 
						|
Function<ClientRegistration, JWK> jwkResolver = (clientRegistration) -> {
 | 
						|
	if (clientRegistration.getClientAuthenticationMethod().equals(ClientAuthenticationMethod.PRIVATE_KEY_JWT)) {
 | 
						|
		// Assuming RSA key type
 | 
						|
		RSAPublicKey publicKey = ...
 | 
						|
		RSAPrivateKey privateKey = ...
 | 
						|
		return new RSAKey.Builder(publicKey)
 | 
						|
				.privateKey(privateKey)
 | 
						|
				.keyID(UUID.randomUUID().toString())
 | 
						|
				.build();
 | 
						|
	}
 | 
						|
	return null;
 | 
						|
};
 | 
						|
 | 
						|
WebClientReactiveAuthorizationCodeTokenResponseClient tokenResponseClient =
 | 
						|
		new WebClientReactiveAuthorizationCodeTokenResponseClient();
 | 
						|
tokenResponseClient.addParametersConverter(
 | 
						|
		new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver));
 | 
						|
----
 | 
						|
 | 
						|
Kotlin::
 | 
						|
+
 | 
						|
[source,kotlin,role="secondary"]
 | 
						|
----
 | 
						|
val jwkResolver: Function<ClientRegistration, JWK> =
 | 
						|
    Function<ClientRegistration, JWK> { clientRegistration ->
 | 
						|
        if (clientRegistration.clientAuthenticationMethod.equals(ClientAuthenticationMethod.PRIVATE_KEY_JWT)) {
 | 
						|
            // Assuming RSA key type
 | 
						|
            var publicKey: RSAPublicKey = ...
 | 
						|
            var privateKey: RSAPrivateKey = ...
 | 
						|
            RSAKey.Builder(publicKey)
 | 
						|
                    .privateKey(privateKey)
 | 
						|
                    .keyID(UUID.randomUUID().toString())
 | 
						|
                .build()
 | 
						|
        }
 | 
						|
        null
 | 
						|
    }
 | 
						|
 | 
						|
val tokenResponseClient = WebClientReactiveAuthorizationCodeTokenResponseClient()
 | 
						|
tokenResponseClient.addParametersConverter(
 | 
						|
    NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
 | 
						|
)
 | 
						|
----
 | 
						|
======
 | 
						|
 | 
						|
 | 
						|
=== Authenticate using `client_secret_jwt`
 | 
						|
 | 
						|
Given the following Spring Boot properties for an OAuth 2.0 Client registration:
 | 
						|
 | 
						|
[source,yaml]
 | 
						|
----
 | 
						|
spring:
 | 
						|
  security:
 | 
						|
    oauth2:
 | 
						|
      client:
 | 
						|
        registration:
 | 
						|
          okta:
 | 
						|
            client-id: okta-client-id
 | 
						|
            client-secret: okta-client-secret
 | 
						|
            client-authentication-method: client_secret_jwt
 | 
						|
            authorization-grant-type: client_credentials
 | 
						|
            ...
 | 
						|
----
 | 
						|
 | 
						|
The following example shows how to configure `WebClientReactiveClientCredentialsTokenResponseClient`:
 | 
						|
 | 
						|
[tabs]
 | 
						|
======
 | 
						|
Java::
 | 
						|
+
 | 
						|
[source,java,role="primary"]
 | 
						|
----
 | 
						|
Function<ClientRegistration, JWK> jwkResolver = (clientRegistration) -> {
 | 
						|
	if (clientRegistration.getClientAuthenticationMethod().equals(ClientAuthenticationMethod.CLIENT_SECRET_JWT)) {
 | 
						|
		SecretKeySpec secretKey = new SecretKeySpec(
 | 
						|
				clientRegistration.getClientSecret().getBytes(StandardCharsets.UTF_8),
 | 
						|
				"HmacSHA256");
 | 
						|
		return new OctetSequenceKey.Builder(secretKey)
 | 
						|
				.keyID(UUID.randomUUID().toString())
 | 
						|
				.build();
 | 
						|
	}
 | 
						|
	return null;
 | 
						|
};
 | 
						|
 | 
						|
WebClientReactiveClientCredentialsTokenResponseClient tokenResponseClient =
 | 
						|
		new WebClientReactiveClientCredentialsTokenResponseClient();
 | 
						|
tokenResponseClient.addParametersConverter(
 | 
						|
		new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver));
 | 
						|
----
 | 
						|
 | 
						|
Kotlin::
 | 
						|
+
 | 
						|
[source,kotlin,role="secondary"]
 | 
						|
----
 | 
						|
val jwkResolver = Function<ClientRegistration, JWK?> { clientRegistration: ClientRegistration ->
 | 
						|
    if (clientRegistration.clientAuthenticationMethod == ClientAuthenticationMethod.CLIENT_SECRET_JWT) {
 | 
						|
        val secretKey = SecretKeySpec(
 | 
						|
            clientRegistration.clientSecret.toByteArray(StandardCharsets.UTF_8),
 | 
						|
            "HmacSHA256"
 | 
						|
        )
 | 
						|
        OctetSequenceKey.Builder(secretKey)
 | 
						|
            .keyID(UUID.randomUUID().toString())
 | 
						|
            .build()
 | 
						|
    }
 | 
						|
    null
 | 
						|
}
 | 
						|
 | 
						|
val tokenResponseClient = WebClientReactiveClientCredentialsTokenResponseClient()
 | 
						|
tokenResponseClient.addParametersConverter(
 | 
						|
    NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
 | 
						|
)
 | 
						|
----
 | 
						|
======
 | 
						|
 | 
						|
=== Customizing the JWT assertion
 | 
						|
 | 
						|
The JWT produced by `NimbusJwtClientAuthenticationParametersConverter` contains the `iss`, `sub`, `aud`, `jti`, `iat` and `exp` claims by default. You can customize the headers and/or claims by providing a `Consumer<NimbusJwtClientAuthenticationParametersConverter.JwtClientAuthenticationContext<T>>` to `setJwtClientAssertionCustomizer()`. The following example shows how to customize claims of the JWT:
 | 
						|
 | 
						|
[tabs]
 | 
						|
======
 | 
						|
Java::
 | 
						|
+
 | 
						|
[source,java,role="primary"]
 | 
						|
----
 | 
						|
Function<ClientRegistration, JWK> jwkResolver = ...
 | 
						|
 | 
						|
NimbusJwtClientAuthenticationParametersConverter<OAuth2ClientCredentialsGrantRequest> converter =
 | 
						|
		new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver);
 | 
						|
converter.setJwtClientAssertionCustomizer((context) -> {
 | 
						|
	context.getHeaders().header("custom-header", "header-value");
 | 
						|
	context.getClaims().claim("custom-claim", "claim-value");
 | 
						|
});
 | 
						|
----
 | 
						|
 | 
						|
Kotlin::
 | 
						|
+
 | 
						|
[source,kotlin,role="secondary"]
 | 
						|
----
 | 
						|
val jwkResolver = ...
 | 
						|
 | 
						|
val converter: NimbusJwtClientAuthenticationParametersConverter<OAuth2ClientCredentialsGrantRequest> =
 | 
						|
    NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
 | 
						|
converter.setJwtClientAssertionCustomizer { context ->
 | 
						|
    context.headers.header("custom-header", "header-value")
 | 
						|
    context.claims.claim("custom-claim", "claim-value")
 | 
						|
}
 | 
						|
----
 | 
						|
======
 | 
						|
 | 
						|
[[oauth2Client-public-auth]]
 | 
						|
== Public Authentication
 | 
						|
 | 
						|
Public Client Authentication is supported out of the box and no customization is necessary to enable it.
 | 
						|
 | 
						|
The following Spring Boot properties for an OAuth 2.0 client registration demonstrate the configuration:
 | 
						|
 | 
						|
[source,yaml]
 | 
						|
----
 | 
						|
spring:
 | 
						|
  security:
 | 
						|
    oauth2:
 | 
						|
      client:
 | 
						|
        registration:
 | 
						|
          okta:
 | 
						|
            client-id: client-id
 | 
						|
            client-authentication-method: none
 | 
						|
            authorization-grant-type: authorization_code
 | 
						|
            ...
 | 
						|
----
 | 
						|
 | 
						|
[NOTE]
 | 
						|
Public Clients are supported using https://tools.ietf.org/html/rfc7636[Proof Key for Code Exchange] (PKCE).
 | 
						|
PKCE will automatically be used when `client-authentication-method` is set to "none" (`ClientAuthenticationMethod.NONE`).
 |