此版本仍在开发中,尚未被视为稳定版本。如需最新稳定版本,请使用 Spring Security 7.0.4spring-doc.cadn.net.cn

OAuth 2.0 资源服务器不透明Tokens

用于内省的极简依赖

JWT 的最小依赖 所述,大多数资源服务器支持都收集在 spring-security-oauth2-resource-server 中。 然而,除非您提供自定义的 ReactiveOpaqueTokenIntrospector,否则资源服务器将回退到 SpringReactiveOpaqueTokenIntrospector。 这意味着只需 spring-security-oauth2-resource-server 即可构建一个支持不透明 Bearer Tokens的最小可用资源服务器。spring-doc.cadn.net.cn

内省的最小配置

通常,您可以使用授权服务器提供的OAuth 2.0 内省端点验证不透明Tokens。 这在撤销是必要条件时非常有用。spring-doc.cadn.net.cn

使用Spring Boot配置一个作为资源服务器的应用程序并使用introspection进行配置包括两个步骤:spring-doc.cadn.net.cn

  1. 包含所需的依赖项。spring-doc.cadn.net.cn

  2. 指示反向解析端点详情。spring-doc.cadn.net.cn

指定授权服务器

您可以指定元信息端点的位置:spring-doc.cadn.net.cn

spring:
  security:
    oauth2:
      resourceserver:
        opaquetoken:
          introspection-uri: https://idp.example.com/introspect
          client-id: client
          client-secret: secret

其中 idp.example.com/introspect 是由您的授权服务器托管的Tokens自省端点,而 client-idclient-secret 是访问该端点所需的凭据。spring-doc.cadn.net.cn

资源服务器使用这些属性进一步进行自我配置,并随后验证传入的JWT。spring-doc.cadn.net.cn

若授权服务器响应该Tokens有效,则它是有效的。spring-doc.cadn.net.cn

启动预期

当使用此属性及其依赖项时,资源服务器会自动配置以验证透明授权Tokens。spring-doc.cadn.net.cn

此启动过程比JWT的启动过程要简单得多,因为不需要发现任何端点,并且不会增加额外的验证规则。spring-doc.cadn.net.cn

运行时期望

应用启动后,资源服务器会尝试处理包含 Authorization: Bearer 头的任何请求:spring-doc.cadn.net.cn

GET / HTTP/1.1
Authorization: Bearer some-token-value # Resource Server will process this

只要指定了此方案,资源服务器就会根据Bearer Token规范来处理请求。spring-doc.cadn.net.cn

给定一个不透明Tokens,资源服务器:spring-doc.cadn.net.cn

  1. 使用提供的凭据和Tokens查询提供的反向解析端点。spring-doc.cadn.net.cn

  2. 检查响应是否包含 { 'active' : true } 属性。spring-doc.cadn.net.cn

  3. 将每个作用域映射到一个以SCOPE_为前缀的权限。spring-doc.cadn.net.cn

默认情况下,生成的 Authentication#getPrincipal 是一个 Spring Security OAuth2AuthenticatedPrincipal 对象,并且 Authentication#getName 映射到Tokens的 sub 属性(如果存在的话)。spring-doc.cadn.net.cn

从这里,您可能想要跳转到:spring-doc.cadn.net.cn

认证后查找属性

一旦Tokens通过认证,BearerTokenAuthentication 的一个实例就会被设置到 SecurityContext 中。spring-doc.cadn.net.cn

这表示在您使用@Controller配置时,它可以在@EnableWebFlux方法中使用:spring-doc.cadn.net.cn

@GetMapping("/foo")
public Mono<String> foo(BearerTokenAuthentication authentication) {
    return Mono.just(authentication.getTokenAttributes().get("sub") + " is the subject");
}
@GetMapping("/foo")
fun foo(authentication: BearerTokenAuthentication): Mono<String> {
    return Mono.just(authentication.tokenAttributes["sub"].toString() + " is the subject")
}

由于 BearerTokenAuthentication 持有一个 OAuth2AuthenticatedPrincipal,这意味着它也可以在控制器方法中使用:spring-doc.cadn.net.cn

@GetMapping("/foo")
public Mono<String> foo(@AuthenticationPrincipal OAuth2AuthenticatedPrincipal principal) {
    return Mono.just(principal.getAttribute("sub") + " is the subject");
}
@GetMapping("/foo")
fun foo(@AuthenticationPrincipal principal: OAuth2AuthenticatedPrincipal): Mono<String> {
    return Mono.just(principal.getAttribute<Any>("sub").toString() + " is the subject")
}

使用 SpEL 查找属性

您可以使用Spring表达式语言(SpEL)访问属性。spring-doc.cadn.net.cn

例如,如果你使用了@EnableReactiveMethodSecurity以便可以使用@PreAuthorize注解,你可以这样做:spring-doc.cadn.net.cn

@PreAuthorize("principal?.attributes['sub'] = 'foo'")
public Mono<String> forFoosEyesOnly() {
    return Mono.just("foo");
}
@PreAuthorize("principal.attributes['sub'] = 'foo'")
fun forFoosEyesOnly(): Mono<String> {
    return Mono.just("foo")
}

覆盖或替换 Boot 自动配置

Spring Boot 为资源服务器生成两个 @Bean 实例。spring-doc.cadn.net.cn

The first is a SecurityWebFilterChain 配置应用程序为资源服务器。 当您使用不透明Tokens时,这个 SecurityWebFilterChain 看起来像这样:spring-doc.cadn.net.cn

@Bean
SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) {
	http
		.authorizeExchange((authorize) -> authorize
			.anyExchange().authenticated()
		)
		.oauth2ResourceServer(ServerHttpSecurity.OAuth2ResourceServerSpec::opaqueToken)
	return http.build();
}
@Bean
fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
    return http {
        authorizeExchange {
            authorize(anyExchange, authenticated)
        }
        oauth2ResourceServer {
            opaqueToken { }
        }
    }
}

如果应用程序未暴露一个SecurityWebFilterChain Bean,Spring Boot 将暴露默认的 Bean(如前一个列表所示)。spring-doc.cadn.net.cn

您可以将其替换为在应用程序中暴露bean:spring-doc.cadn.net.cn

替换 SecurityWebFilterChain
import static org.springframework.security.oauth2.core.authorization.OAuth2ReactiveAuthorizationManagers.hasScope;

@Configuration
@EnableWebFluxSecurity
public class MyCustomSecurityConfiguration {
    @Bean
    SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) {
        http
            .authorizeExchange((authorize) -> authorize
                .pathMatchers("/messages/**").access(hasScope("message:read"))
                .anyExchange().authenticated()
            )
            .oauth2ResourceServer((oauth2) -> oauth2
                .opaqueToken((opaqueToken) -> opaqueToken
                    .introspector(myIntrospector())
                )
            );
        return http.build();
    }
}
import org.springframework.security.oauth2.core.authorization.OAuth2ReactiveAuthorizationManagers.hasScope

@Bean
fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
    return http {
        authorizeExchange {
            authorize("/messages/**", hasScope("message:read"))
            authorize(anyExchange, authenticated)
        }
        oauth2ResourceServer {
            opaqueToken {
                introspector = myIntrospector()
            }
        }
    }
}

该示例需要针对任何以message:read开头的URL,设置/messages/的作用域。spring-doc.cadn.net.cn

oauth2ResourceServer DSL上的方法也会覆盖或替换自动配置。spring-doc.cadn.net.cn

例如,Spring Boot 创建的第二个 @Bean 是一个 ReactiveOpaqueTokenIntrospector,它将 String Tokens解码为有效的 OAuth2AuthenticatedPrincipal 实例:spring-doc.cadn.net.cn

@Bean
public ReactiveOpaqueTokenIntrospector introspector() {
    return SpringReactiveOpaqueTokenIntrospector.withIntrospectionUri(introspectionUri)
        .clientId(clientId).clientSecret(clientSecret).build();
}
@Bean
fun introspector(): ReactiveOpaqueTokenIntrospector {
    return SpringReactiveOpaqueTokenIntrospector.withIntrospectionUri(introspectionUri)
        .clientId(clientId).clientSecret(clientSecret).build()
}

如果应用程序未暴露一个 ReactiveOpaqueTokenIntrospector 颗粒度,Spring Boot 将暴露默认的一个(如前一个列表所示)。spring-doc.cadn.net.cn

您可以通过使用introspectionUri()introspectionClientCredentials()来覆盖其配置,或者通过使用introspector()来替换它。spring-doc.cadn.net.cn

使用introspectionUri()

您可以将授权服务器的内省URI配置为配置属性,或者在DSL中提供:spring-doc.cadn.net.cn

@Configuration
@EnableWebFluxSecurity
public class DirectlyConfiguredIntrospectionUri {
    @Bean
    SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) {
        http
            .authorizeExchange((authorize) -> authorize
                .anyExchange().authenticated()
            )
            .oauth2ResourceServer((oauth2) -> oauth2
                .opaqueToken((opaqueToken) -> opaqueToken
                    .introspectionUri("https://idp.example.com/introspect")
                    .introspectionClientCredentials("client", "secret")
                )
            );
        return http.build();
    }
}
@Bean
fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
    return http {
        authorizeExchange {
            authorize(anyExchange, authenticated)
        }
        oauth2ResourceServer {
            opaqueToken {
                introspectionUri = "https://idp.example.com/introspect"
                introspectionClientCredentials("client", "secret")
            }
        }
    }
}

使用 introspectionUri() 优先于任何配置属性。spring-doc.cadn.net.cn

使用introspector()

introspector()introspectionUri() 更强大。它完全取代了 Boot 对 ReactiveOpaqueTokenIntrospector 的任何自动配置:spring-doc.cadn.net.cn

@Configuration
@EnableWebFluxSecurity
public class DirectlyConfiguredIntrospector {
    @Bean
    SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) {
        http
            .authorizeExchange((authorize) -> authorize
                .anyExchange().authenticated()
            )
            .oauth2ResourceServer((oauth2) -> oauth2
                .opaqueToken((opaqueToken) -> opaqueToken
                    .introspector(myCustomIntrospector())
                )
            );
        return http.build();
    }
}
@Bean
fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
    return http {
        authorizeExchange {
            authorize(anyExchange, authenticated)
        }
        oauth2ResourceServer {
            opaqueToken {
                introspector = myCustomIntrospector()
            }
        }
    }
}

这在需要更深入的配置时非常有用,例如权限映射JWT撤销spring-doc.cadn.net.cn

公开一个ReactiveOpaqueTokenIntrospector @Bean

或,暴露一个ReactiveOpaqueTokenIntrospector @Bean 具有与introspector()相同的效果:spring-doc.cadn.net.cn

@Bean
public ReactiveOpaqueTokenIntrospector introspector() {
    return SpringReactiveOpaqueTokenIntrospector.withIntrospectionUri(introspectionUri)
        .clientId(clientId).clientSecret(clientSecret).build()
}
@Bean
fun introspector(): ReactiveOpaqueTokenIntrospector {
    return SpringReactiveOpaqueTokenIntrospector.withIntrospectionUri(introspectionUri)
        .clientId(clientId).clientSecret(clientSecret).build()
}

配置授权

OAuth 2.0 Introspection 终端点通常会返回一个 scope 属性,指示它被授予了哪些范围(或权限)——例如:spring-doc.cadn.net.cn

{ ..., "scope" : "messages contacts"}

当这种情况发生时,资源服务器会尝试将这些范围转换为受权列表,并在每个范围内前加上一个字符串:SCOPE_spring-doc.cadn.net.cn

这表示,要保护一个基于Opaque Token派生出的范围的端点或方法时,相应的表达式应包含以下前缀:spring-doc.cadn.net.cn

import static org.springframework.security.oauth2.core.authorization.OAuth2ReactiveAuthorizationManagers.hasScope;

@Configuration
@EnableWebFluxSecurity
public class MappedAuthorities {
    @Bean
    SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) {
        http
            .authorizeExchange((authorize) -> authorize
                .pathMatchers("/contacts/**").access(hasScope("contacts"))
                .pathMatchers("/messages/**").access(hasScope("messages"))
                .anyExchange().authenticated()
            )
            .oauth2ResourceServer(ServerHttpSecurity.OAuth2ResourceServerSpec::opaqueToken);
        return http.build();
    }
}
import org.springframework.security.oauth2.core.authorization.OAuth2ReactiveAuthorizationManagers.hasScope

@Bean
fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
    return http {
        authorizeExchange {
            authorize("/contacts/**", hasScope("contacts"))
            authorize("/messages/**", hasScope("messages"))
            authorize(anyExchange, authenticated)
        }
        oauth2ResourceServer {
            opaqueToken { }
        }
    }
}

您可以使用方法安全实现类似的操作:spring-doc.cadn.net.cn

@PreAuthorize("hasAuthority('SCOPE_messages')")
public Flux<Message> getMessages(...) {}
@PreAuthorize("hasAuthority('SCOPE_messages')")
fun getMessages(): Flux<Message> { }

手动提取权限

默认情况下,Opaque Token 支持会从内省响应中提取 scope 索引项,并将其解析为单独的GrantedAuthority实例。spring-doc.cadn.net.cn

考虑以下示例:spring-doc.cadn.net.cn

{
    "active" : true,
    "scope" : "message:read message:write"
}

如果元数据响应如上述示例所示,资源服务器将生成一个包含两个权限的Authentication,一个是message:read,另一个是message:writespring-doc.cadn.net.cn

您可以使用自定义的ReactiveOpaqueTokenIntrospector来自定义行为,该自定义类会查看属性集并以自己的方式转换:spring-doc.cadn.net.cn

public class CustomAuthoritiesOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospector {
    private ReactiveOpaqueTokenIntrospector delegate = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build();

    public Mono<OAuth2AuthenticatedPrincipal> introspect(String token) {
        return this.delegate.introspect(token)
                .map((principal) -> principal DefaultOAuth2AuthenticatedPrincipal(
                        principal.getName(), principal.getAttributes(), extractAuthorities(principal)));
    }

    private Collection<GrantedAuthority> extractAuthorities(OAuth2AuthenticatedPrincipal principal) {
        List<String> scopes = principal.getAttribute(OAuth2IntrospectionClaimNames.SCOPE);
        return scopes.stream()
                .map(SimpleGrantedAuthority::new)
                .collect(Collectors.toList());
    }
}
class CustomAuthoritiesOpaqueTokenIntrospector : ReactiveOpaqueTokenIntrospector {
    private val delegate: ReactiveOpaqueTokenIntrospector = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build()
    override fun introspect(token: String): Mono<OAuth2AuthenticatedPrincipal> {
        return delegate.introspect(token)
                .map { principal: OAuth2AuthenticatedPrincipal ->
                    DefaultOAuth2AuthenticatedPrincipal(
                            principal.name, principal.attributes, extractAuthorities(principal))
                }
    }

    private fun extractAuthorities(principal: OAuth2AuthenticatedPrincipal): Collection<GrantedAuthority> {
        val scopes = principal.getAttribute<List<String>>(OAuth2IntrospectionClaimNames.SCOPE)
        return scopes
                .map { SimpleGrantedAuthority(it) }
    }
}

此后,您可以通过将其暴露为一个@Bean来配置此自定义反查器:spring-doc.cadn.net.cn

@Bean
public ReactiveOpaqueTokenIntrospector introspector() {
    return new CustomAuthoritiesOpaqueTokenIntrospector();
}
@Bean
fun introspector(): ReactiveOpaqueTokenIntrospector {
    return CustomAuthoritiesOpaqueTokenIntrospector()
}

使用内省(Introspection)处理 JWT

一个常见的问题是内省是否与JWT兼容。 Spring Security的Opaque Token支持设计为不关心Tokens的格式。它乐意将任何Tokens传递给提供的内省端点。spring-doc.cadn.net.cn

所以,假设你需要在每次请求时都与授权服务器进行检查,以确认JWT是否已被撤销。spring-doc.cadn.net.cn

即使您使用的是JWT格式的Tokens,验证方法也是introspection,这意味着您需要执行以下操作:spring-doc.cadn.net.cn

spring:
  security:
    oauth2:
      resourceserver:
        opaquetoken:
          introspection-uri: https://idp.example.org/introspection
          client-id: client
          client-secret: secret

在这种情况下,生成的 Authentication 将是 BearerTokenAuthentication。 相应 OAuth2AuthenticatedPrincipal 中的任何属性都将是由Tokens自省(introspection)端点返回的内容。spring-doc.cadn.net.cn

然而,假设出于某种原因,反向查找端点只能返回Tokens是否有效。 现在该怎么办?spring-doc.cadn.net.cn

在这种情况下,您可以创建一个自定义的ReactiveOpaqueTokenIntrospector,该类仍然会调用端点,但随后会更新返回的身份主体,使其包含JWT声明作为属性:spring-doc.cadn.net.cn

public class JwtOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospector {
	private ReactiveOpaqueTokenIntrospector delegate = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build();
	private ReactiveJwtDecoder jwtDecoder = new NimbusReactiveJwtDecoder(new ParseOnlyJWTProcessor());

	public Mono<OAuth2AuthenticatedPrincipal> introspect(String token) {
		return this.delegate.introspect(token)
				.flatMap((principal) -> principal.jwtDecoder.decode(token))
				.map((jwt) -> jwt DefaultOAuth2AuthenticatedPrincipal(jwt.getClaims(), NO_AUTHORITIES));
	}

	private static class ParseOnlyJWTProcessor implements Converter<JWT, Mono<JWTClaimsSet>> {
		public Mono<JWTClaimsSet> convert(JWT jwt) {
			try {
				return Mono.just(jwt.getJWTClaimsSet());
			} catch (Exception ex) {
				return Mono.error(ex);
			}
		}
	}
}
class JwtOpaqueTokenIntrospector : ReactiveOpaqueTokenIntrospector {
    private val delegate: ReactiveOpaqueTokenIntrospector = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build()
    private val jwtDecoder: ReactiveJwtDecoder = NimbusReactiveJwtDecoder(ParseOnlyJWTProcessor())
    override fun introspect(token: String): Mono<OAuth2AuthenticatedPrincipal> {
        return delegate.introspect(token)
                .flatMap { jwtDecoder.decode(token) }
                .map { jwt: Jwt -> DefaultOAuth2AuthenticatedPrincipal(jwt.claims, NO_AUTHORITIES) }
    }

    private class ParseOnlyJWTProcessor : Converter<JWT, Mono<JWTClaimsSet>> {
        override fun convert(jwt: JWT): Mono<JWTClaimsSet> {
            return try {
                Mono.just(jwt.jwtClaimsSet)
            } catch (e: Exception) {
                Mono.error(e)
            }
        }
    }
}

此后,您可以通过将其暴露为一个@Bean来配置此自定义反查器:spring-doc.cadn.net.cn

@Bean
public ReactiveOpaqueTokenIntrospector introspector() {
    return new JwtOpaqueTokenIntropsector();
}
@Bean
fun introspector(): ReactiveOpaqueTokenIntrospector {
    return JwtOpaqueTokenIntrospector()
}

调用/userinfo端点

一般而言,资源服务器并不关心底层用户是谁,而是关心被授予的权限。spring-doc.cadn.net.cn

话虽如此,有时将授权声明与用户关联起来也是很有价值的。spring-doc.cadn.net.cn

如果应用程序还使用了spring-security-oauth2-client,并且已经设置了适当的ClientRegistrationRepository,那么您可以使用自定义的OpaqueTokenIntrospector来实现这一点。下一个列表中的实现做了三件事:spring-doc.cadn.net.cn

public class UserInfoOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospector {
	private final ReactiveOpaqueTokenIntrospector delegate = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build();
	private final ReactiveOAuth2UserService<OAuth2UserRequest, OAuth2User> oauth2UserService =
			new DefaultReactiveOAuth2UserService();

	private final ReactiveClientRegistrationRepository repository;

	// ... constructor

	@Override
	public Mono<OAuth2AuthenticatedPrincipal> introspect(String token) {
		return Mono.zip(this.delegate.introspect(token), this.repository.findByRegistrationId("registration-id"))
				.map(t -> {
					OAuth2AuthenticatedPrincipal authorized = t.getT1();
					ClientRegistration clientRegistration = t.getT2();
					Instant issuedAt = authorized.getAttribute(ISSUED_AT);
					Instant expiresAt = authorized.getAttribute(OAuth2IntrospectionClaimNames.EXPIRES_AT);
					OAuth2AccessToken accessToken = new OAuth2AccessToken(BEARER, token, issuedAt, expiresAt);
					return new OAuth2UserRequest(clientRegistration, accessToken);
				})
				.flatMap(this.oauth2UserService::loadUser);
	}
}
class UserInfoOpaqueTokenIntrospector : ReactiveOpaqueTokenIntrospector {
    private val delegate: ReactiveOpaqueTokenIntrospector = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build()
    private val oauth2UserService: ReactiveOAuth2UserService<OAuth2UserRequest, OAuth2User> = DefaultReactiveOAuth2UserService()
    private val repository: ReactiveClientRegistrationRepository? = null

    // ... constructor
    override fun introspect(token: String?): Mono<OAuth2AuthenticatedPrincipal> {
        return Mono.zip<OAuth2AuthenticatedPrincipal, ClientRegistration>(delegate.introspect(token), repository!!.findByRegistrationId("registration-id"))
                .map<OAuth2UserRequest> { t: Tuple2<OAuth2AuthenticatedPrincipal, ClientRegistration> ->
                    val authorized = t.t1
                    val clientRegistration = t.t2
                    val issuedAt: Instant? = authorized.getAttribute(ISSUED_AT)
                    val expiresAt: Instant? = authorized.getAttribute(OAuth2IntrospectionClaimNames.EXPIRES_AT)
                    val accessToken = OAuth2AccessToken(BEARER, token, issuedAt, expiresAt)
                    OAuth2UserRequest(clientRegistration, accessToken)
                }
                .flatMap { userRequest: OAuth2UserRequest -> oauth2UserService.loadUser(userRequest) }
    }
}

如果你没有使用 spring-security-oauth2-client,操作仍然非常简单。 你只需使用自己的 /userinfo 实例调用 WebClient 即可:spring-doc.cadn.net.cn

public class UserInfoOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospector {
    private final ReactiveOpaqueTokenIntrospector delegate = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build();
    private final WebClient rest = WebClient.create();

    @Override
    public Mono<OAuth2AuthenticatedPrincipal> introspect(String token) {
        return this.delegate.introspect(token)
		        .map(this::makeUserInfoRequest);
    }
}
class UserInfoOpaqueTokenIntrospector : ReactiveOpaqueTokenIntrospector {
    private val delegate: ReactiveOpaqueTokenIntrospector = SpringReactiveOpaqueTokenIntrospector
            .withIntrospectionUri("https://idp.example.org/introspect")
            .clientId("client").clientSecret("secret").build()
    private val rest: WebClient = WebClient.create()

    override fun introspect(token: String): Mono<OAuth2AuthenticatedPrincipal> {
        return delegate.introspect(token)
                .map(this::makeUserInfoRequest)
    }
}

无论哪种方式,一旦您创建了ReactiveOpaqueTokenIntrospector,您应该将其发布为一个@Bean以覆盖默认设置:spring-doc.cadn.net.cn

@Bean
ReactiveOpaqueTokenIntrospector introspector() {
    return new UserInfoOpaqueTokenIntrospector();
}
@Bean
fun introspector(): ReactiveOpaqueTokenIntrospector {
    return UserInfoOpaqueTokenIntrospector()
}