此版本仍在开发中,尚未被视为稳定版本。如需最新稳定版本,请使用 Spring Security 7.0.4spring-doc.cadn.net.cn

核心接口/类

客户端注册

ClientRegistration 表示在 OAuth 2.0 或 OpenID Connect 1.0 提供商处注册的客户端。spring-doc.cadn.net.cn

客户端注册包含诸如客户端ID、客户端密钥、授权grant类型、重定向URI、范围、授权URI、TokensURI以及其他详情等信息。spring-doc.cadn.net.cn

ClientRegistration 及其属性定义如下:spring-doc.cadn.net.cn

public final class ClientRegistration {
	private String registrationId;	(1)
	private String clientId;	(2)
	private String clientSecret;	(3)
	private ClientAuthenticationMethod clientAuthenticationMethod;	(4)
	private AuthorizationGrantType authorizationGrantType;	(5)
	private String redirectUri;	(6)
	private Set<String> scopes;	(7)
	private ProviderDetails providerDetails;
	private String clientName;	(8)

	public class ProviderDetails {
		private String authorizationUri;	(9)
		private String tokenUri;	(10)
		private UserInfoEndpoint userInfoEndpoint;
		private String jwkSetUri;	(11)
		private String issuerUri;	(12)
		private Map<String, Object> configurationMetadata;  (13)

		public class UserInfoEndpoint {
			private String uri;	(14)
			private AuthenticationMethod authenticationMethod;  (15)
			private String userNameAttributeName;	(16)

		}
	}

	public static final class ClientSettings {
		private boolean requireProofKey; (17)
	}
}
1 registrationId:唯一标识 ClientRegistration 的 ID。
2 clientId:客户端标识符。
3 clientSecret:客户端密钥。
4 clientAuthenticationMethod:用于客户端向提供方进行身份验证的方法。 支持的值包括 client_secret_basicclient_secret_postprivate_key_jwtclient_secret_jwtnone (公共客户端)
5 authorizationGrantType:OAuth 2.0 授权框架定义了四种授权许可(Authorization Grant)类型。 支持的值包括 authorization_codeclient_credentials,以及扩展许可类型 urn:ietf:params:oauth:grant-type:jwt-bearer
6 redirectUri:客户端注册的重定向 URI,授权服务器在最终用户完成身份验证并授权客户端访问后,将最终用户的用户代理重定向到该 URI。
7 scopes:客户端在授权请求流程中所请求的范围(scope),例如 openid、email 或 profile。
8 clientName:用于客户端的描述性名称。 该名称可能在某些场景中使用,例如在自动生成的登录页面中显示客户端的名称。
9 authorizationUri:授权服务器的授权端点 URI。
10 tokenUri:授权服务器的Tokens端点 URI。
11 jwkSetUri: 用于从授权服务器检索包含用于验证IDTokens和可选的用户信息响应的JSON网络签名(JWS)中的加密密钥(JWK)集的URI。
12 issuerUri:返回 OpenID Connect 1.0 提供商或 OAuth 2.0 授权服务器的颁发者标识符 URI。
13 configurationMetadata: The OpenID Provider Configuration Information. 此信息仅在配置了 Spring Boot 属性 spring.security.oauth2.client.provider.[providerId].issuerUri 之后才可用。
14 (userInfoEndpoint)uri: 用于访问已认证终端用户声明/属性的UserInfo端点URI。
15 (userInfoEndpoint)authenticationMethod: 当向用户信息端点发送访问Tokens时使用的认证方法。支持的值包括 header, formquery
16 userNameAttributeName:在 UserInfo 响应中返回的属性名称,该属性引用最终用户的名称或标识符。
17 requireProofKey: If true或者clientAuthenticationMethod is none,则 PKCE 将被启用。默认值为true对于authorization_code授权类型和false适用于其他授权类型。

A ClientRegistration 可以通过发现 OpenID Connect Provider 的 配置端点 或者 Authorization Server 的 元数据端点 初始配置。spring-doc.cadn.net.cn

ClientRegistrations 提供了配置一个 ClientRegistration 的便利方法,如以下示例所示:spring-doc.cadn.net.cn

ClientRegistration clientRegistration =
	ClientRegistrations.fromIssuerLocation("https://idp.example.com/issuer").build();
val clientRegistration = ClientRegistrations.fromIssuerLocation("https://idp.example.com/issuer").build()

可以作为替代方案,你可以使用ClientRegistrations.fromOidcIssuerLocation()来仅查询OpenID Connect提供者的配置端点。spring-doc.cadn.net.cn

响应式客户端注册存储库

ReactiveClientRegistrationRepository 用作 OAuth 2.0 / OpenID Connect 1.0 ClientRegistration(客户端注册信息)的存储库。spring-doc.cadn.net.cn

客户端注册信息最终由关联的授权服务器存储和拥有。 此仓库提供了检索存储在授权服务器中的主要客户端注册信息子集的能力。spring-doc.cadn.net.cn

Spring Boot 自动配置将 spring.security.oauth2.client.registration.[registrationId] 下的每个属性绑定到一个 ClientRegistration 实例,然后将每个 ClientRegistration 实例组合到一个 ReactiveClientRegistrationRepository 中。spring-doc.cadn.net.cn

ReactiveClientRegistrationRepository 的默认实现是 InMemoryReactiveClientRegistrationRepositoryspring-doc.cadn.net.cn

自动配置还会将ReactiveClientRegistrationRepository注册为@BeanApplicationContext中,以便在应用程序需要进行依赖注入时可用。spring-doc.cadn.net.cn

以下列表展示了一个示例:spring-doc.cadn.net.cn

@Controller
public class OAuth2ClientController {

	@Autowired
	private ReactiveClientRegistrationRepository clientRegistrationRepository;

	@GetMapping("/")
	public Mono<String> index() {
		return this.clientRegistrationRepository.findByRegistrationId("okta")
				...
				.thenReturn("index");
	}
}
@Controller
class OAuth2ClientController {

    @Autowired
    private lateinit var clientRegistrationRepository: ReactiveClientRegistrationRepository

    @GetMapping("/")
    fun index(): Mono<String> {
        return this.clientRegistrationRepository.findByRegistrationId("okta")
            ...
            .thenReturn("index")
    }
}

OAuth2 授权客户端

OAuth2AuthorizedClient 是授权客户端的表示形式。 一个客户端被认为是经过授权的,当终端用户(资源所有者)已经授予该客户端访问其受保护资源的权限时。spring-doc.cadn.net.cn

OAuth2AuthorizedClient 用于将一个 OAuth2AccessToken(以及可选的 OAuth2RefreshToken)与一个 ClientRegistration(客户端)和资源所有者关联起来,该资源所有者是授予授权的 Principal 最终用户。spring-doc.cadn.net.cn

ServerOAuth2AuthorizedClientRepository / ReactiveOAuth2AuthorizedClientService

ServerOAuth2AuthorizedClientRepository 负责在 web 请求之间保存 OAuth2AuthorizedClient(s)。 而 ReactiveOAuth2AuthorizedClientService 的主要作用是在应用层面管理 OAuth2AuthorizedClient(s)。spring-doc.cadn.net.cn

从开发者的角度来看,ServerOAuth2AuthorizedClientRepositoryReactiveOAuth2AuthorizedClientService 提供了查找与客户端关联的OAuth2AccessToken的能力,以便使用该Tokens发起受保护资源请求。spring-doc.cadn.net.cn

以下列表展示了一个示例:spring-doc.cadn.net.cn

@Controller
public class OAuth2ClientController {

	@Autowired
	private ReactiveOAuth2AuthorizedClientService authorizedClientService;

	@GetMapping("/")
	public Mono<String> index(Authentication authentication) {
		return this.authorizedClientService.loadAuthorizedClient("okta", authentication.getName())
				.map(OAuth2AuthorizedClient::getAccessToken)
				...
				.thenReturn("index");
	}
}
@Controller
class OAuth2ClientController {

    @Autowired
    private lateinit var authorizedClientService: ReactiveOAuth2AuthorizedClientService

    @GetMapping("/")
    fun index(authentication: Authentication): Mono<String> {
        return this.authorizedClientService.loadAuthorizedClient<OAuth2AuthorizedClient>("okta", authentication.name)
            .map { it.accessToken }
            ...
            .thenReturn("index")
    }
}

Spring Boot 自动配置会注册一个 ServerOAuth2AuthorizedClientRepository 和/或 ReactiveOAuth2AuthorizedClientService@BeanApplicationContext 中。 然而,应用程序可以选择覆盖并注册自定义的 ServerOAuth2AuthorizedClientRepositoryReactiveOAuth2AuthorizedClientService@Beanspring-doc.cadn.net.cn

默认实现的ReactiveOAuth2AuthorizedClientServiceInMemoryReactiveOAuth2AuthorizedClientService,它将在内存中存储OAuth2AuthorizedClient(s)。spring-doc.cadn.net.cn

alternatively, the R2DBC implementation R2dbcReactiveOAuth2AuthorizedClientService 可能会被配置为将OAuth2AuthorizedClient(s) 存储在数据库中。spring-doc.cadn.net.cn

R2dbcReactiveOAuth2AuthorizedClientService 依赖于OAuth 2.0 客户端模式中描述的表定义。spring-doc.cadn.net.cn

响应式 OAuth2 授权客户端管理器 / 响应式 OAuth2 授权客户端提供者

ReactiveOAuth2AuthorizedClientManager 负责对 OAuth2AuthorizedClient(们)进行整体管理。spring-doc.cadn.net.cn

主要职责包括:spring-doc.cadn.net.cn

  • 使用ReactiveOAuth2AuthorizedClientProvider进行授权(或重新授权)一个 OAuth 2.0 客户端。spring-doc.cadn.net.cn

  • OAuth2AuthorizedClient的持久化委派出去,通常使用ReactiveOAuth2AuthorizedClientServiceServerOAuth2AuthorizedClientRepositoryspring-doc.cadn.net.cn

  • 当OAuth 2.0客户端已成功授权(或重新授权)时,委托给ReactiveOAuth2AuthorizationSuccessHandlerspring-doc.cadn.net.cn

  • 当OAuth 2.0 客户端授权失败(或重新授权失败)时,委托给一个ReactiveOAuth2AuthorizationFailureHandlerspring-doc.cadn.net.cn

一个ReactiveOAuth2AuthorizedClientProvider 实现了授权(或重新授权)OAuth 2.0 客户端的策略。 实现将通常会实现一种授权凭据类型,例如 authorization_code, client_credentials 等。spring-doc.cadn.net.cn

默认实现的ReactiveOAuth2AuthorizedClientManagerDefaultReactiveOAuth2AuthorizedClientManager,它与一个ReactiveOAuth2AuthorizedClientProvider相关联,该提供者可能支持多种授权授予类型,并使用基于委托的组合。 ReactiveOAuth2AuthorizedClientProviderBuilder可以用来配置并构建基于委托的组合。spring-doc.cadn.net.cn

以下代码示例展示了如何配置并构建一个`ReactiveOAuth2AuthorizedClientProvider`复合体,该复合体支持`authorization_code`、`refresh_token`和`client_credentials`授权 Grant 类型的认证:spring-doc.cadn.net.cn

@Bean
public ReactiveOAuth2AuthorizedClientManager authorizedClientManager(
		ReactiveClientRegistrationRepository clientRegistrationRepository,
		ServerOAuth2AuthorizedClientRepository authorizedClientRepository) {

	ReactiveOAuth2AuthorizedClientProvider authorizedClientProvider =
			ReactiveOAuth2AuthorizedClientProviderBuilder.builder()
					.authorizationCode()
					.refreshToken()
					.clientCredentials()
					.build();

	DefaultReactiveOAuth2AuthorizedClientManager authorizedClientManager =
			new DefaultReactiveOAuth2AuthorizedClientManager(
					clientRegistrationRepository, authorizedClientRepository);
	authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider);

	return authorizedClientManager;
}
@Bean
fun authorizedClientManager(
        clientRegistrationRepository: ReactiveClientRegistrationRepository,
        authorizedClientRepository: ServerOAuth2AuthorizedClientRepository): ReactiveOAuth2AuthorizedClientManager {
    val authorizedClientProvider: ReactiveOAuth2AuthorizedClientProvider = ReactiveOAuth2AuthorizedClientProviderBuilder.builder()
            .authorizationCode()
            .refreshToken()
            .clientCredentials()
            .build()
    val authorizedClientManager = DefaultReactiveOAuth2AuthorizedClientManager(
            clientRegistrationRepository, authorizedClientRepository)
    authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider)
    return authorizedClientManager
}

当授权尝试成功时,DefaultReactiveOAuth2AuthorizedClientManager 将委托给 ReactiveOAuth2AuthorizationSuccessHandler,该组件(默认情况下)将通过 ServerOAuth2AuthorizedClientRepository 保存 OAuth2AuthorizedClient。 在重新授权失败的情况下,例如刷新Tokens不再有效,之前保存的 OAuth2AuthorizedClient 将通过 RemoveAuthorizedClientReactiveOAuth2AuthorizationFailureHandlerServerOAuth2AuthorizedClientRepository 中移除。 默认行为可以通过 setAuthorizationSuccessHandler(ReactiveOAuth2AuthorizationSuccessHandler)setAuthorizationFailureHandler(ReactiveOAuth2AuthorizationFailureHandler) 进行自定义。spring-doc.cadn.net.cn

DefaultReactiveOAuth2AuthorizedClientManager 还关联了一个类型为 contextAttributesMapperFunction<OAuth2AuthorizeRequest, Mono<Map<String, Object>>>,它负责将 OAuth2AuthorizeRequest 中的属性映射到一个与 Map 关联的 OAuth2AuthorizationContext 中。 这在需要向 ReactiveOAuth2AuthorizedClientProvider 供应必需(受支持)的属性时非常有用。spring-doc.cadn.net.cn

以下代码展示了 contextAttributesMapper 的一个示例:spring-doc.cadn.net.cn

@Bean
public ReactiveOAuth2AuthorizedClientManager authorizedClientManager(
		ReactiveClientRegistrationRepository clientRegistrationRepository,
		ServerOAuth2AuthorizedClientRepository authorizedClientRepository) {

	ReactiveOAuth2AuthorizedClientProvider authorizedClientProvider =
			ReactiveOAuth2AuthorizedClientProviderBuilder.builder()
					.authorizationCode()
					.refreshToken()
					.build();

	DefaultReactiveOAuth2AuthorizedClientManager authorizedClientManager =
			new DefaultReactiveOAuth2AuthorizedClientManager(
					clientRegistrationRepository, authorizedClientRepository);
	authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider);

	// Assuming the attributes are supplied as `ServerHttpRequest` parameters,
	// map the `ServerHttpRequest` parameters to `OAuth2AuthorizationContext.getAttributes()`
	authorizedClientManager.setContextAttributesMapper(contextAttributesMapper());

	return authorizedClientManager;
}

private Function<OAuth2AuthorizeRequest, Mono<Map<String, Object>>> contextAttributesMapper() {
	return authorizeRequest -> {
		Map<String, Object> contextAttributes = Collections.emptyMap();
		ServerWebExchange exchange = authorizeRequest.getAttribute(ServerWebExchange.class.getName());
		ServerHttpRequest request = exchange.getRequest();
		String param1 = request.getQueryParams().getFirst("param1");
		String param2 = request.getQueryParams().getFirst("param2");
		if (StringUtils.hasText(param1) && StringUtils.hasText(param2)) {
			contextAttributes = new HashMap<>();
			contextAttributes.put("param1", param1);
			contextAttributes.put("param2", param2);
		}
		return Mono.just(contextAttributes);
	};
}
@Bean
fun authorizedClientManager(
        clientRegistrationRepository: ReactiveClientRegistrationRepository,
        authorizedClientRepository: ServerOAuth2AuthorizedClientRepository): ReactiveOAuth2AuthorizedClientManager {
    val authorizedClientProvider: ReactiveOAuth2AuthorizedClientProvider = ReactiveOAuth2AuthorizedClientProviderBuilder.builder()
            .authorizationCode()
            .refreshToken()
            .build()
    val authorizedClientManager = DefaultReactiveOAuth2AuthorizedClientManager(
            clientRegistrationRepository, authorizedClientRepository)
    authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider)

	// Assuming the attributes are supplied as `ServerHttpRequest` parameters,
	// map the `ServerHttpRequest` parameters to `OAuth2AuthorizationContext.getAttributes()`
    authorizedClientManager.setContextAttributesMapper(contextAttributesMapper())
    return authorizedClientManager
}

private fun contextAttributesMapper(): Function<OAuth2AuthorizeRequest, Mono<MutableMap<String, Any>>> {
    return Function { authorizeRequest ->
        var contextAttributes: MutableMap<String, Any> = mutableMapOf()
        val exchange: ServerWebExchange = authorizeRequest.getAttribute(ServerWebExchange::class.java.name)!!
        val request: ServerHttpRequest = exchange.request
        val param1: String? = request.queryParams.getFirst("param1")
        val param2: String? = request.queryParams.getFirst("param2")
        if (StringUtils.hasText(param1) && StringUtils.hasText(param2)) {
            contextAttributes = hashMapOf()
            contextAttributes["param1"] = param1!!
            contextAttributes["param2"] = param2!!
        }
        Mono.just(contextAttributes)
    }
}

DefaultReactiveOAuth2AuthorizedClientManager 是为了在 ServerWebExchange 的上下文中使用而设计的。 当不在 ServerWebExchange 上下文中运行时,可以使用 ServerWebExchange 代替。spring-doc.cadn.net.cn

一个服务应用是使用AuthorizedClientServiceReactiveOAuth2AuthorizedClientManager的常见场景。 服务应用通常在后台运行,无需用户交互,并且通常以系统级账户而非用户账户运行。 配置了client_credentials授权类型的OAuth 2.0客户端可以被视为一种类型的服务应用。spring-doc.cadn.net.cn

以下代码展示了如何配置一个支持 AuthorizedClientServiceReactiveOAuth2AuthorizedClientManager 授权类型的 client_credentials 的示例:spring-doc.cadn.net.cn

@Bean
public ReactiveOAuth2AuthorizedClientManager authorizedClientManager(
		ReactiveClientRegistrationRepository clientRegistrationRepository,
		ReactiveOAuth2AuthorizedClientService authorizedClientService) {

	ReactiveOAuth2AuthorizedClientProvider authorizedClientProvider =
			ReactiveOAuth2AuthorizedClientProviderBuilder.builder()
					.clientCredentials()
					.build();

	AuthorizedClientServiceReactiveOAuth2AuthorizedClientManager authorizedClientManager =
			new AuthorizedClientServiceReactiveOAuth2AuthorizedClientManager(
					clientRegistrationRepository, authorizedClientService);
	authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider);

	return authorizedClientManager;
}
@Bean
fun authorizedClientManager(
        clientRegistrationRepository: ReactiveClientRegistrationRepository,
        authorizedClientService: ReactiveOAuth2AuthorizedClientService): ReactiveOAuth2AuthorizedClientManager {
    val authorizedClientProvider: ReactiveOAuth2AuthorizedClientProvider = ReactiveOAuth2AuthorizedClientProviderBuilder.builder()
            .clientCredentials()
            .build()
    val authorizedClientManager = AuthorizedClientServiceReactiveOAuth2AuthorizedClientManager(
            clientRegistrationRepository, authorizedClientService)
    authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider)
    return authorizedClientManager
}