mirror of
				https://github.com/spring-projects/spring-security.git
				synced 2025-10-31 06:38:42 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			96 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			96 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| [[servlet-authentication-basic]]
 | |
| = Basic Authentication
 | |
| :figures: servlet/authentication/unpwd
 | |
| 
 | |
| This section provides details on how Spring Security provides support for https://tools.ietf.org/html/rfc7617[Basic HTTP Authentication] for servlet based applications.
 | |
| // FIXME: describe authenticationentrypoint, authenticationfailurehandler, authenticationsuccesshandler
 | |
| 
 | |
| Let's take a look at how HTTP Basic Authentication works within Spring Security.
 | |
| First, we see the https://tools.ietf.org/html/rfc7235#section-4.1[WWW-Authenticate] header is sent back to an unauthenticated client.
 | |
| 
 | |
| .Sending WWW-Authenticate Header
 | |
| image::{figures}/basicauthenticationentrypoint.png[]
 | |
| 
 | |
| The figure builds off our xref:servlet/architecture.adoc#servlet-securityfilterchain[`SecurityFilterChain`] diagram.
 | |
| 
 | |
| image:{icondir}/number_1.png[] First, a user makes an unauthenticated request to the resource `/private` for which it is not authorized.
 | |
| 
 | |
| image:{icondir}/number_2.png[] Spring Security's xref:servlet/authorization/authorize-requests.adoc#servlet-authorization-filtersecurityinterceptor[`FilterSecurityInterceptor`] indicates that the unauthenticated request is __Denied__ by throwing an `AccessDeniedException`.
 | |
| 
 | |
| image:{icondir}/number_3.png[] Since the user is not authenticated, xref:servlet/architecture.adoc#servlet-exceptiontranslationfilter[`ExceptionTranslationFilter`] initiates __Start Authentication__.
 | |
| The configured xref:servlet/authentication/architecture.adoc#servlet-authentication-authenticationentrypoint[`AuthenticationEntryPoint`] is an instance of {security-api-url}org/springframework/security/web/authentication/www/BasicAuthenticationEntryPoint.html[`BasicAuthenticationEntryPoint`] which sends a WWW-Authenticate header.
 | |
| The `RequestCache` is typically a `NullRequestCache` that does not save the request since the client is capable of replaying the requests it originally requested.
 | |
| 
 | |
| When a client receives the WWW-Authenticate header it knows it should retry with a username and password.
 | |
| Below is the flow for the username and password being processed.
 | |
| 
 | |
| [[servlet-authentication-basicauthenticationfilter]]
 | |
| .Authenticating Username and Password
 | |
| image::{figures}/basicauthenticationfilter.png[]
 | |
| 
 | |
| The figure builds off our xref:servlet/architecture.adoc#servlet-securityfilterchain[`SecurityFilterChain`] diagram.
 | |
| 
 | |
| 
 | |
| image:{icondir}/number_1.png[] When the user submits their username and password, the `BasicAuthenticationFilter` creates a `UsernamePasswordAuthenticationToken` which is a type of xref:servlet/authentication/architecture.adoc#servlet-authentication-authentication[`Authentication`] by extracting the username and password from the `HttpServletRequest`.
 | |
| 
 | |
| image:{icondir}/number_2.png[] Next, the `UsernamePasswordAuthenticationToken` is passed into the `AuthenticationManager` to be authenticated.
 | |
| The details of what `AuthenticationManager` looks like depend on how the xref:servlet/authentication/passwords/index.adoc#servlet-authentication-unpwd-storage[user information is stored].
 | |
| 
 | |
| image:{icondir}/number_3.png[] If authentication fails, then __Failure__
 | |
| 
 | |
| * The xref:servlet/authentication/architecture.adoc#servlet-authentication-securitycontextholder[SecurityContextHolder] is cleared out.
 | |
| * `RememberMeServices.loginFail` is invoked.
 | |
| If remember me is not configured, this is a no-op.
 | |
| // FIXME: link to rememberme
 | |
| * `AuthenticationEntryPoint` is invoked to trigger the WWW-Authenticate to be sent again.
 | |
| 
 | |
| image:{icondir}/number_4.png[] If authentication is successful, then __Success__.
 | |
| 
 | |
| * The xref:servlet/authentication/architecture.adoc#servlet-authentication-authentication[Authentication] is set on the xref:servlet/authentication/architecture.adoc#servlet-authentication-securitycontextholder[SecurityContextHolder].
 | |
| * `RememberMeServices.loginSuccess` is invoked.
 | |
| If remember me is not configured, this is a no-op.
 | |
| // FIXME: link to rememberme
 | |
| * The `BasicAuthenticationFilter` invokes `FilterChain.doFilter(request,response)` to continue with the rest of the application logic.
 | |
| 
 | |
| Spring Security's HTTP Basic Authentication support in is enabled by default.
 | |
| However, as soon as any servlet based configuration is provided, HTTP Basic must be explicitly provided.
 | |
| 
 | |
| A minimal, explicit configuration can be found below:
 | |
| 
 | |
| .Explicit HTTP Basic Configuration
 | |
| ====
 | |
| [source,java,role="primary"]
 | |
| .Java
 | |
| ----
 | |
| @Bean
 | |
| public SecurityFilterChain filterChain(HttpSecurity http) {
 | |
| 	http
 | |
| 		// ...
 | |
| 		.httpBasic(withDefaults());
 | |
| 	return http.build();
 | |
| }
 | |
| ----
 | |
| 
 | |
| [source,xml,role="secondary"]
 | |
| .XML
 | |
| ----
 | |
| <http>
 | |
| 	<!-- ... -->
 | |
| 	<http-basic />
 | |
| </http>
 | |
| ----
 | |
| 
 | |
| [source,kotlin,role="secondary"]
 | |
| .Kotlin
 | |
| ----
 | |
| @Bean
 | |
| open fun filterChain(http: HttpSecurity): SecurityFilterChain {
 | |
| 	http {
 | |
| 		// ...
 | |
| 		httpBasic { }
 | |
| 	}
 | |
| 	return http.build()
 | |
| }
 | |
| ----
 | |
| ====
 |