Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
130 views

Spring Security Architecture

The document provides a high-level overview of the Spring Security architecture, which separates authentication and authorization into two independent problems. It discusses how Spring Security uses filters and method annotations to apply security in web applications. It describes the key interfaces for authentication (AuthenticationManager) and authorization (AccessDecisionManager), and how they are implemented using ProviderManager and AccessDecisionVoter chains. It also covers customizing the authentication managers and authorization attributes.

Uploaded by

alessandro p.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views

Spring Security Architecture

The document provides a high-level overview of the Spring Security architecture, which separates authentication and authorization into two independent problems. It discusses how Spring Security uses filters and method annotations to apply security in web applications. It describes the key interfaces for authentication (AuthenticationManager) and authorization (AccessDecisionManager), and how they are implemented using ProviderManager and AccessDecisionVoter chains. It also covers customizing the authentication managers and authorization attributes.

Uploaded by

alessandro p.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

28/2/2021 Topical Guide | Spring Security Architecture

ALL GUIDES

Spring Security Architecture


This guide is a primer for Spring Security, o ering insight into the design and basic building
blocks of the framework. We cover only the very basics of application security. However, in
doing so, we can clear up some of the confusion experienced by developers who use
Spring Security. To do this, we take a look at the way security is applied in web applications
by using lters and, more generally, by using method annotations. Use this guide when
you need a high-level understanding of how a secure application works, how it can be
customized, or if you need to learn how to think about application security.

This guide is not intended as a manual or recipe for solving more than the most basic
problems (there are other sources for those), but it could be useful for beginners and
experts alike. Spring Boot is also often referenced, because it provides some default
behavior for a secure application, and it can be useful to understand how that ts in with
the overall architecture.

All of the principles apply equally well to applications that do not use Spring
Note
Boot.

Authentication and Access Control


Application security boils down to two more or less independent problems: authentication
(who are you?) and authorization (what are you allowed to do?). Sometimes people say
“access control” instead of "authorization", which can get confusing, but it can be helpful to
think of it that way because “authorization” is overloaded in other places. Spring Security
has an architecture that is designed to separate authentication from authorization and has
strategies and extension points for both.

Authentication

The main strategy interface for authentication is AuthenticationManager , which has


only one method:

https://spring.io/guides/topicals/spring-security-architecture/ 1/13
28/2/2021 Topical Guide | Spring Security Architecture

public interface AuthenticationManager {

Authentication authenticate(Authentication authentication)


throws AuthenticationException;
}

An AuthenticationManager can do one of 3 things in its authenticate() method:

Return an Authentication (normally with authenticated=true ) if it can verify


that the input represents a valid principal.

Throw an AuthenticationException if it believes that the input represents an


invalid principal.

Return null if it cannot decide.

AuthenticationException is a runtime exception. It is usually handled by an


application in a generic way, depending on the style or purpose of the application. In other
words, user code is not normally expected to catch and handle it. For example, a web UI
might render a page that says that the authentication failed, and a backend HTTP service
might send a 401 response, with or without a WWW-Authenticate header depending on
the context.

The most commonly used implementation of AuthenticationManager is


ProviderManager , which delegates to a chain of AuthenticationProvider instances.
An AuthenticationProvider is a bit like an AuthenticationManager , but it has an
extra method to allow the caller to query whether it supports a given Authentication
type:

public interface AuthenticationProvider {

Authentication authenticate(Authentication authentication)


throws AuthenticationException;

boolean supports(Class<?> authentication);


}

The Class<?> argument in the supports() method is really


Class<? extends Authentication> (it is only ever asked if it supports something that
is passed into the authenticate() method). A ProviderManager can support multiple
di erent authentication mechanisms in the same application by delegating to a chain of
AuthenticationProviders . If a ProviderManager does not recognize a particular
Authentication instance type, it is skipped.

https://spring.io/guides/topicals/spring-security-architecture/ 2/13
28/2/2021 Topical Guide | Spring Security Architecture

A ProviderManager has an optional parent, which it can consult if all providers return
null . If the parent is not available, a null Authentication results in an
AuthenticationException .

Sometimes, an application has logical groups of protected resources (for example, all web
resources that match a path pattern, such as /api/** ), and each group can have its own
dedicated AuthenticationManager . Often, each of those is a ProviderManager , and
they share a parent. The parent is then a kind of “global” resource, acting as a fallback for
all providers.

Figure 1. An AuthenticationManager hierarchy using ProviderManager

Customizing Authentication Managers

Spring Security provides some con guration helpers to quickly get common authentication
manager features set up in your application. The most commonly used helper is the
AuthenticationManagerBuilder , which is great for setting up in-memory, JDBC, or
LDAP user details or for adding a custom UserDetailsService . The following example
shows an application that con gures the global (parent) AuthenticationManager :

@Configuration
public class ApplicationSecurity extends WebSecurityConfigurerAdapter {

... // web stuff here

@Autowired
public void initialize(AuthenticationManagerBuilder builder,
DataSource dataSource) {
builder.jdbcAuthentication().dataSource(dataSource).withUser("dave")
.password("secret").roles("USER");
}
https://spring.io/guides/topicals/spring-security-architecture/ 3/13
28/2/2021 Topical Guide | Spring Security Architecture

This example relates to a web application, but the usage of


AuthenticationManagerBuilder is more widely applicable (see Web Security for more
detail on how web application security is implemented). Note that the
AuthenticationManagerBuilder is @Autowired into a method in a @Bean  — that is
what makes it build the global (parent) AuthenticationManager . In contrast, consider
the following example:

@Configuration
public class ApplicationSecurity extends WebSecurityConfigurerAdapter {

@Autowired
DataSource dataSource;

... // web stuff here

@Override
public void configure(AuthenticationManagerBuilder builder) {
builder.jdbcAuthentication().dataSource(dataSource).withUser("dave")
.password("secret").roles("USER");
}

If we had used an @Override of a method in the con gurer, the


AuthenticationManagerBuilder would be used only to build a “local”
AuthenticationManager , which would be a child of the global one. In a Spring Boot
application, you can @Autowired the global one into another bean, but you cannot do
that with the local one unless you explicitly expose it yourself.

Spring Boot provides a default global AuthenticationManager (with only one user)
unless you pre-empt it by providing your own bean of type AuthenticationManager .
The default is secure enough on its own for you not to have to worry about it much, unless
you actively need a custom global AuthenticationManager . If you do any con guration
that builds an AuthenticationManager , you can often do it locally to the resources that
you are protecting and not worry about the global default.

Authorization or Access Control

Once authentication is successful, we can move on to authorization, and the core strategy
here is AccessDecisionManager . There are three implementations provided by the
framework and all three delegate to a chain of AccessDecisionVoter instances, a bit
like the ProviderManager delegates to AuthenticationProviders .
https://spring.io/guides/topicals/spring-security-architecture/ 4/13
28/2/2021 Topical Guide | Spring Security Architecture

An AccessDecisionVoter considers an Authentication (representing a principal) and


a secure Object , which has been decorated with ConfigAttributes :

boolean supports(ConfigAttribute attribute);

boolean supports(Class<?> clazz);

int vote(Authentication authentication, S object,


Collection<ConfigAttribute> attributes);

The Object is completely generic in the signatures of the AccessDecisionManager


and AccessDecisionVoter . It represents anything that a user might want to access (a
web resource or a method in a Java class are the two most common cases). The
ConfigAttributes are also fairly generic, representing a decoration of the secure
Object with some metadata that determines the level of permission required to access
it. ConfigAttribute is an interface. It has only one method (which is quite generic and
returns a String ), so these strings encode in some way the intention of the owner of the
resource, expressing rules about who is allowed to access it. A typical ConfigAttribute
is the name of a user role (like ROLE_ADMIN or ROLE_AUDIT ), and they often have
special formats (like the ROLE_ pre x) or represent expressions that need to be
evaluated.

Most people use the default AccessDecisionManager , which is AffirmativeBased (if


any voters return a rmatively, access is granted). Any customization tends to happen in
the voters, either by adding new ones or modifying the way that the existing ones work.

It is very common to use ConfigAttributes that are Spring Expression Language (SpEL)
expressions — for example, isFullyAuthenticated() && hasRole('user') . This is
supported by an AccessDecisionVoter that can handle the expressions and create a
context for them. To extend the range of expressions that can be handled requires a
custom implementation of SecurityExpressionRoot and sometimes also
SecurityExpressionHandler .

Web Security
Spring Security in the web tier (for UIs and HTTP back ends) is based on Servlet Filters ,
so it is helpful to rst look at the role of Filters generally. The following picture shows
the typical layering of the handlers for a single HTTP request.

https://spring.io/guides/topicals/spring-security-architecture/ 5/13
28/2/2021 Topical Guide | Spring Security Architecture

The client sends a request to the application, and the container decides which lters and
which servlet apply to it based on the path of the request URI. At most, one servlet can
handle a single request, but lters form a chain, so they are ordered. In fact, a lter can
veto the rest of the chain if it wants to handle the request itself. A lter can also modify the
request or the response used in the downstream lters and servlet. The order of the lter
chain is very important, and Spring Boot manages it through two mechanisms: @Beans of
type Filter can have an @Order or implement Ordered , and they can be part of a
FilterRegistrationBean that itself has an order as part of its API. Some o -the-shelf
lters de ne their own constants to help signal what order they like to be in relative to
each other (for example, the SessionRepositoryFilter from Spring Session has a
DEFAULT_ORDER of Integer.MIN_VALUE + 50 , which tells us it likes to be early in the
chain, but it does not rule out other lters coming before it).

Spring Security is installed as a single Filter in the chain, and its concrete type is
FilterChainProxy , for reasons that we cover soon. In a Spring Boot application, the
security lter is a @Bean in the ApplicationContext , and it is installed by default so
that it is applied to every request. It is installed at a position de ned by
SecurityProperties.DEFAULT_FILTER_ORDER , which in turn is anchored by
FilterRegistrationBean.REQUEST_WRAPPER_FILTER_MAX_ORDER (the maximum order
that a Spring Boot application expects lters to have if they wrap the request, modifying its
behavior). There is more to it than that, though: From the point of view of the container,
Spring Security is a single lter, but, inside of it, there are additional lters, each playing a
special role. The following image shows this relationship:

https://spring.io/guides/topicals/spring-security-architecture/ 6/13
28/2/2021 Topical Guide | Spring Security Architecture

Figure 2. Spring Security is a single physical Filter but delegates processing to a chain
of internal lters

In fact, there is even one more layer of indirection in the security lter: It is usually installed
in the container as a DelegatingFilterProxy , which does not have to be a Spring
@Bean . The proxy delegates to a FilterChainProxy , which is always a @Bean , usually
with a xed name of springSecurityFilterChain . It is the FilterChainProxy that
contains all the security logic arranged internally as a chain (or chains) of lters. All the
lters have the same API (they all implement the Filter interface from the Servlet
speci cation), and they all have the opportunity to veto the rest of the chain.

There can be multiple lter chains all managed by Spring Security in the same top level
FilterChainProxy and all are unknown to the container. The Spring Security lter
contains a list of lter chains and dispatches a request to the rst chain that matches it.
The following picture shows the dispatch happening based on matching the request path
( /foo/** matches before /** ). This is very common but not the only way to match a
request. The most important feature of this dispatch process is that only one chain ever
handles a request.

https://spring.io/guides/topicals/spring-security-architecture/ 7/13
28/2/2021 Topical Guide | Spring Security Architecture

Figure 3. The Spring Security FilterChainProxy dispatches requests to the rst chain
that matches.

A vanilla Spring Boot application with no custom security con guration has a several (call it
n) lter chains, where usually n=6. The rst (n-1) chains are there just to ignore static
resource patterns, like /css/** and /images/** , and the error view: /error . (The
paths can be controlled by the user with security.ignored from the
SecurityProperties con guration bean.) The last chain matches the catch-all path
( /** ) and is more active, containing logic for authentication, authorization, exception
handling, session handling, header writing, and so on. There are a total of 11 lters in this
chain by default, but normally it is not necessary for users to concern themselves with
which lters are used and when.

The fact that all lters internal to Spring Security are unknown to the container
is important, especially in a Spring Boot application, where, by default, all
@Beans of type Filter are registered automatically with the container. So if
Note
you want to add a custom lter to the security chain, you need to either not
make it be a @Bean or wrap it in a FilterRegistrationBean that explicitly
disables the container registration.

Creating and Customizing Filter Chains

The default fallback lter chain in a Spring Boot application (the one with the /** request
matcher) has a prede ned order of SecurityProperties.BASIC_AUTH_ORDER . You can
switch it o completely by setting security.basic.enabled=false , or you can use it as

https://spring.io/guides/topicals/spring-security-architecture/ 8/13
28/2/2021 Topical Guide | Spring Security Architecture

a fallback and de ne other rules with a lower order. To do the latter, add a @Bean of type
WebSecurityConfigurerAdapter (or WebSecurityConfigurer ) and decorate the class
with @Order , as follows:

@Configuration
@Order(SecurityProperties.BASIC_AUTH_ORDER - 10)
public class ApplicationConfigurerAdapter extends
WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception {
http.antMatcher("/match1/**")
...;
}
}

This bean causes Spring Security to add a new lter chain and order it before the fallback.

Many applications have completely di erent access rules for one set of resources
compared to another. For example, an application that hosts a UI and a backing API might
support cookie-based authentication with a redirect to a login page for the UI parts and
token-based authentication with a 401 response to unauthenticated requests for the API
parts. Each set of resources has its own WebSecurityConfigurerAdapter with a unique
order and its own request matcher. If the matching rules overlap, the earliest ordered lter
chain wins.

Request Matching for Dispatch and Authorization

A security lter chain (or, equivalently, a WebSecurityConfigurerAdapter ) has a request


matcher that is used to decide whether to apply it to an HTTP request. Once the decision is
made to apply a particular lter chain, no others are applied. However, within a lter chain,
you can have more ne-grained control of authorization by setting additional matchers in
the HttpSecurity con gurer, as follows:

@Configuration
@Order(SecurityProperties.BASIC_AUTH_ORDER - 10)
public class ApplicationConfigurerAdapter extends
WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception {
http.antMatcher("/match1/**")
.authorizeRequests()
.antMatchers("/match1/user").hasRole("USER")
.antMatchers("/match1/spam").hasRole("SPAM")
.anyRequest().isAuthenticated();
}
}

https://spring.io/guides/topicals/spring-security-architecture/ 9/13
28/2/2021 Topical Guide | Spring Security Architecture

One of the easiest mistakes to make when con guring Spring Security is to forget that
these matchers apply to di erent processes. One is a request matcher for the whole lter
chain, and the other is only to choose the access rule to apply.

Combining Application Security Rules with Actuator Rules

If you use the Spring Boot Actuator for management endpoints, you probably want them
to be secure, and, by default, they are. In fact, as soon as you add the Actuator to a secure
application, you get an additional lter chain that applies only to the actuator endpoints. It
is de ned with a request matcher that matches only actuator endpoints and it has an
order of ManagementServerProperties.BASIC_AUTH_ORDER , which is 5 fewer than the
default SecurityProperties fallback lter, so it is consulted before the fallback.

If you want your application security rules to apply to the actuator endpoints, you can add
a lter chain that is ordered earlier than the actuator one and that has a request matcher
that includes all actuator endpoints. If you prefer the default security settings for the
actuator endpoints, the easiest thing is to add your own lter later than the actuator one,
but earlier than the fallback (for example,
ManagementServerProperties.BASIC_AUTH_ORDER + 1 ), as follows:

@Configuration
@Order(ManagementServerProperties.BASIC_AUTH_ORDER + 1)
public class ApplicationConfigurerAdapter extends
WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception {
http.antMatcher("/foo/**")
...;
}
}

Spring Security in the web tier is currently tied to the Servlet API, so it is only
really applicable when running an application in a servlet container, either
Note embedded or otherwise. It is not, however, tied to Spring MVC or the rest of
the Spring web stack, so it can be used in any servlet application — for
instance, one using JAX-RS.

Method Security
As well as support for securing web applications, Spring Security o ers support for
applying access rules to Java method executions. For Spring Security, this is just a di erent
https://spring.io/guides/topicals/spring-security-architecture/ 10/13
28/2/2021 Topical Guide | Spring Security Architecture

type of “protected resource”. For users, it means the access rules are declared using the
same format of ConfigAttribute strings (for example, roles or expressions) but in a
di erent place in your code. The rst step is to enable method security — for example, in
the top level con guration for our application:

@SpringBootApplication
@EnableGlobalMethodSecurity(securedEnabled = true)
public class SampleSecureApplication {
}

Then we can decorate the method resources directly:

@Service
public class MyService {

@Secured("ROLE_USER")
public String secure() {
return "Hello Security";
}

This example is a service with a secure method. If Spring creates a @Bean of this type, it is
proxied and callers have to go through a security interceptor before the method is actually
executed. If access is denied, the caller gets an AccessDeniedException instead of the
actual method result.

There are other annotations that you can use on methods to enforce security constraints,
notably @PreAuthorize and @PostAuthorize , which let you write expressions
containing references to method parameters and return values, respectively.

It is not uncommon to combine Web security and method security. The lter
chain provides the user experience features, such as authentication and redirect
Tip
to login pages and so on, and the method security provides protection at a more
granular level.

Working with Threads


Spring Security is fundamentally thread-bound, because it needs to make the current
authenticated principal available to a wide variety of downstream consumers. The basic
building block is the SecurityContext , which may contain an Authentication (and

https://spring.io/guides/topicals/spring-security-architecture/ 11/13
28/2/2021 Topical Guide | Spring Security Architecture

when a user is logged in it is an Authentication that is explicitly authenticated ). You


can always access and manipulate the SecurityContext through static convenience
methods in SecurityContextHolder , which, in turn, manipulate a ThreadLocal . The
following example shows such an arrangement:

SecurityContext context = SecurityContextHolder.getContext();


Authentication authentication = context.getAuthentication();
assert(authentication.isAuthenticated);

It is not common for user application code to do this, but it can be useful if you, for
instance, need to write a custom authentication lter (although, even then, there are base
classes in Spring Security that you can use so that you could avoid needing to use the
SecurityContextHolder ).

If you need access to the currently authenticated user in a web endpoint, you can use a
method parameter in a @RequestMapping , as follows:

@RequestMapping("/foo")
public String foo(@AuthenticationPrincipal User user) {
... // do stuff with user
}

This annotation pulls the current Authentication out of the SecurityContext and
calls the getPrincipal() method on it to yield the method parameter. The type of the
Principal in an Authentication is dependent on the AuthenticationManager
used to validate the authentication, so this can be a useful little trick to get a type-safe
reference to your user data.

If Spring Security is in use, the Principal from the HttpServletRequest is of type


Authentication , so you can also use that directly:

@RequestMapping("/foo")
public String foo(Principal principal) {
Authentication authentication = (Authentication) principal;
User = (User) authentication.getPrincipal();
... // do stuff with user
}

This can sometimes be useful if you need to write code that works when Spring Security is
not in use (you would need to be more defensive about loading the Authentication
class).

Processing Secure Methods Asynchronously

https://spring.io/guides/topicals/spring-security-architecture/ 12/13
28/2/2021 Topical Guide | Spring Security Architecture

Since the SecurityContext is thread-bound, if you want to do any background


processing that calls secure methods (for example, with @Async ), you need to ensure
that the context is propagated. This boils down to wrapping the SecurityContext with
the task ( Runnable , Callable , and so on) that is executed in the background. Spring
Security provides some helpers to make this easier, such as wrappers for Runnable and
Callable . To propagate the SecurityContext to @Async methods, you need to
supply an AsyncConfigurer and ensure the Executor is of the correct type:

@Configuration
public class ApplicationConfiguration extends AsyncConfigurerSupport {

@Override
public Executor getAsyncExecutor() {
return new
DelegatingSecurityContextExecutorService(Executors.newFixedThreadPool(5)
);
}

https://spring.io/guides/topicals/spring-security-architecture/ 13/13

You might also like