Spring?boot?security權(quán)限管理集成cas單點登錄功能的實現(xiàn)
掙扎了兩周,Spring security的cas終于搞出來了,廢話不多說,開篇!
1.Spring boot集成Spring security
本篇是使用spring security集成cas,因此,先得集成spring security
新建一個Spring boot項目,加入maven依賴,我這里是用的架構(gòu)是Spring boot2.0.4+Spring mvc+Spring data jpa+Spring security5
pom.xml:
<?xml version="1.0" encoding="UTF-8"?> <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd"> <modelVersion>4.0.0</modelVersion> <groupId>com.cas.client1</groupId> <artifactId>cas-client1</artifactId> <version>0.0.1-SNAPSHOT</version> <packaging>jar</packaging> <name>cas-client1</name> <description>Demo project for Spring Boot</description> <parent> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-parent</artifactId> <version>2.0.4.RELEASE</version> <relativePath/> <!-- lookup parent from repository --> </parent> <properties> <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding> <project.reporting.outputEncoding>UTF-8</project.reporting.outputEncoding> <java.version>1.8</java.version> </properties> <dependencies> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-web</artifactId> </dependency> <artifactId>spring-boot-starter-thymeleaf</artifactId> <artifactId>spring-boot-starter-tomcat</artifactId> <scope>provided</scope> <groupId>junit</groupId> <artifactId>junit</artifactId> <version>4.12</version> <scope>test</scope> <artifactId>spring-boot-starter-test</artifactId> <artifactId>spring-boot-starter-security</artifactId> <groupId>org.springframework.security</groupId> <artifactId>spring-security-test</artifactId> <!-- security taglibs --> <artifactId>spring-security-taglibs</artifactId> <groupId>org.springframework.security.oauth</groupId> <artifactId>spring-security-oauth2</artifactId> <version>RELEASE</version> <artifactId>spring-boot-starter-data-jpa</artifactId> <artifactId>spring-boot-starter-jdbc</artifactId> <groupId>mysql</groupId> <artifactId>mysql-connector-java</artifactId> <version>5.1.46</version> <!-- https://mvnrepository.com/artifact/com.alibaba/druid-spring-boot-starter --> <groupId>com.alibaba</groupId> <artifactId>druid-spring-boot-starter</artifactId> <version>1.1.10</version> <artifactId>spring-boot</artifactId> <version>2.0.2.RELEASE</version> <scope>compile</scope> </dependencies> <build> <plugins> <plugin> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-maven-plugin</artifactId> </plugin> </plugins> </build> </project>
application.properties:
server.port=8083 #靜態(tài)文件訪問存放地址 spring.resources.static-locations=classpath:/html/ # thymeleaf 模板存放地址 spring.thymeleaf.prefix=classpath:/html/ spring.thymeleaf.suffix=.html spring.thymeleaf.mode=LEGACYHTML5 spring.thymeleaf.encoding=UTF-8 # JDBC 配置(驅(qū)動類自動從url的mysql識別,數(shù)據(jù)源類型自動識別) # 或spring.datasource.url= spring.datasource.druid.url=jdbc:mysql://localhost:3306/vhr?useUnicode=true&characterEncoding=UTF8 # 或spring.datasource.username= spring.datasource.druid.username=root # 或spring.datasource.password= spring.datasource.druid.password=1234 #或 spring.datasource.driver-class-name= #spring.datasource.druid.driver-class-name=com.mysql.jdbc.Driver #連接池配置(通常來說,只需要修改initialSize、minIdle、maxActive # 如果用Oracle,則把poolPreparedStatements配置為true,mysql可以配置為false。分庫分表較多的數(shù)據(jù)庫,建議配置為false。removeabandoned不建議在生產(chǎn)環(huán)境中打開如果用SQL Server,建議追加配置) spring.datasource.druid.initial-size=1 spring.datasource.druid.max-active=20 spring.datasource.druid.min-idle=1 # 配置獲取連接等待超時的時間 spring.datasource.druid.max-wait=60000 #打開PSCache,并且指定每個連接上PSCache的大小 spring.datasource.druid.pool-prepared-statements=true spring.datasource.druid.max-pool-prepared-statement-per-connection-size=20 #spring.datasource.druid.max-open-prepared-statements=和上面的等價 spring.datasource.druid.validation-query=SELECT 'x' #spring.datasource.druid.validation-query-timeout= spring.datasource.druid.test-on-borrow=false spring.datasource.druid.test-on-return=false spring.datasource.druid.test-while-idle=true #配置間隔多久才進行一次檢測,檢測需要關閉的空閑連接,單位是毫秒 spring.datasource.druid.time-between-eviction-runs-millis=60000 #配置一個連接在池中最小生存的時間,單位是毫秒 spring.datasource.druid.min-evictable-idle-time-millis=300000 #spring.datasource.druid.max-evictable-idle-time-millis= #配置多個英文逗號分隔 #spring.datasource.druid.filters= stat # WebStatFilter配置,說明請參考Druid Wiki,配置_配置WebStatFilter #是否啟用StatFilter默認值true spring.datasource.druid.web-stat-filter.enabled=true spring.datasource.druid.web-stat-filter.url-pattern=/* spring.datasource.druid.web-stat-filter.exclusions=*.js,*.gif,*.jpg,*.png,*.css,*.ico,/druid/* spring.datasource.druid.web-stat-filter.session-stat-enable=false spring.datasource.druid.web-stat-filter.session-stat-max-count=1000 spring.datasource.druid.web-stat-filter.principal-session-name=admin spring.datasource.druid.web-stat-filter.principal-cookie-name=admin spring.datasource.druid.web-stat-filter.profile-enable=true # StatViewServlet配置 #展示Druid的統(tǒng)計信息,StatViewServlet的用途包括:1.提供監(jiān)控信息展示的html頁面2.提供監(jiān)控信息的JSON API #是否啟用StatViewServlet默認值true spring.datasource.druid.stat-view-servlet.enabled=true spring.datasource.druid.stat-view-servlet.url-pattern=/druid/* # JPA config spring.jpa.database=mysql spring.jpa.hibernate.ddl-auto=update spring.jpa.show-sql=true spring.jpa.generate-ddl=true spring.jpa.properties.hibernate.dialect=org.hibernate.dialect.MySQL5Dialect spring.jpa.open-in-view=true # 解決jpa no session的問題 spring.jpa.properties.hibernate.enable_lazy_load_no_trans=true
這里使用數(shù)據(jù)庫存儲角色權(quán)限信息,分三種實體:用戶;角色;資源;用戶對角色多對多;角色對資源多對多
創(chuàng)建幾個實體類:
用戶:這里直接使用用戶持久化對象實現(xiàn)Spring security要求的UserDetails接口,并實現(xiàn)對應方法
package com.cas.client1.entity; import org.springframework.security.core.GrantedAuthority; import org.springframework.security.core.userdetails.UserDetails; import org.springframework.util.CollectionUtils; import javax.persistence.*; import java.util.ArrayList; import java.util.Collection; import java.util.List; @Entity @Table(name = "s_user") public class User implements UserDetails { @Id private String id; @Column(name = "username") private String username; @Column(name = "password") private String password; @ManyToMany(fetch = FetchType.LAZY) @JoinTable( name = "s_user_role", joinColumns = @JoinColumn(name = "user_id"), inverseJoinColumns = @JoinColumn(name = "role_id") ) private List<Role> roles; public User() { } public User(String id, String username, String password) { this.id = id; this.username = username; this.password = password; public String getId() { return id; public void setId(String id) { public List<Role> getRoles() { return roles; public void setRoles(List<Role> roles) { this.roles = roles; @Override public String getUsername() { return username; public boolean isAccountNonExpired() { return true; public boolean isAccountNonLocked() { public boolean isCredentialsNonExpired() { public boolean isEnabled() { public void setUsername(String username) { @Transient List<GrantedAuthority> grantedAuthorities=new ArrayList<>(); public Collection<? extends GrantedAuthority> getAuthorities() { if (grantedAuthorities.size()==0){ if (!CollectionUtils.isEmpty(roles)){ for (Role role:roles){ List<Resource> resources = role.getResources(); if (!CollectionUtils.isEmpty(resources)){ for (Resource resource:resources){ grantedAuthorities.add(new SimpleGrantedAuthority(resource.getResCode())); } } } } grantedAuthorities.add(new SimpleGrantedAuthority("AUTH_0")); } return grantedAuthorities; public String getPassword() { return password; public void setPassword(String password) { }
注意看這里:
我給每一位登錄的用戶都授予了AUTH_0的權(quán)限,AUTH_0在下面的SecurityMetaDataSource里被關聯(lián)的url為:/**,也就是說除開那些機密程度更高的,這個登錄用戶能訪問所有資源
角色:
package com.cas.client1.entity; import javax.persistence.*; import java.util.List; /** * @author Administrator */ @Entity @Table(name = "s_role") public class Role { @Id @Column(name = "id") private String id; @Column(name = "role_name") private String roleName; @ManyToMany(fetch = FetchType.LAZY) @JoinTable( name = "s_role_res", joinColumns = @JoinColumn(name = "role_id"), inverseJoinColumns = @JoinColumn(name = "res_id") ) private List<Resource> resources; name = "s_user_role", inverseJoinColumns = @JoinColumn(name = "user_id") private List<User> users; public String getId() { return id; } public void setId(String id) { this.id = id; public String getRoleName() { return roleName; public void setRoleName(String roleName) { this.roleName = roleName; public List<Resource> getResources() { return resources; public void setResources(List<Resource> resources) { this.resources = resources; public List<User> getUsers() { return users; public void setUsers(List<User> users) { this.users = users; }
權(quán)限:
package com.cas.client1.entity; import javax.persistence.Column; import javax.persistence.Entity; import javax.persistence.Id; import javax.persistence.Table; @Entity @Table(name = "s_resource") public class Resource { @Id @Column(name = "id") private String id; @Column(name = "res_name") private String resName; @Column(name = "res_code") private String resCode; @Column(name = "url") private String url; @Column(name = "priority") private String priority; public String getId() { return id; } public void setId(String id) { this.id = id; public String getResName() { return resName; public void setResName(String resName) { this.resName = resName; public String getResCode() { return resCode; public void setResCode(String resCode) { this.resCode = resCode; public String getUrl() { return url; public void setUrl(String url) { this.url = url; public String getPriority() { return priority; public void setPriority(String priority) { this.priority = priority; }
建立幾個DAO
UserDao:
package com.cas.client1.dao; import com.cas.client1.entity.User; import org.springframework.data.jpa.repository.JpaRepository; import org.springframework.data.jpa.repository.Query; import org.springframework.data.repository.query.Param; import org.springframework.stereotype.Repository; import java.util.List; @Repository public interface UserDao extends JpaRepository<User,String> { @Override List<User> findAll(); List<User> findByUsername(String username); /** * 根據(jù)用戶名like查詢 * @param username * @return */ List<User> getUserByUsernameContains(String username); @Query("from User where id=:id") User getUserById(@Param("id") String id); }
ResourceDao:
package com.cas.client1.dao; import com.cas.client1.entity.Resource; import org.springframework.data.jpa.repository.JpaRepository; import org.springframework.data.jpa.repository.Query; import org.springframework.stereotype.Repository; import java.util.List; /** * @author Administrator */ @Repository public interface ResourceDao extends JpaRepository<Resource,String> { @Query("from Resource order by priority") List<Resource> getAllResource(); }
Service
UserService:
package com.cas.client1.service; import com.cas.client1.dao.UserDao; import com.cas.client1.entity.User; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Service; import java.util.List; @Service public class UserService { @Autowired private UserDao userDao; public User findByUsername(String username){ List<User> list = userDao.findByUsername(username); return list!=null&&list.size()>0?list.get(0):null; } }
ResourceService:
package com.cas.client1.service; import com.cas.client1.dao.ResourceDao; import com.cas.client1.entity.Resource; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Service; import java.util.List; @Service public class ResourceService { @Autowired private ResourceDao resourceDao; public List<Resource> getAll(){ return resourceDao.getAllResource(); } }
創(chuàng)建UserDetailsServiceImpl,實現(xiàn)UserDetailsService接口,這個類是用以提供給Spring security從數(shù)據(jù)庫加載用戶信息的
package com.cas.client1.security; import com.cas.client1.entity.User; import com.cas.client1.service.UserService; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.security.cas.authentication.CasAssertionAuthenticationToken; import org.springframework.security.core.userdetails.AuthenticationUserDetailsService; import org.springframework.security.core.userdetails.UserDetails; import org.springframework.security.core.userdetails.UserDetailsService; import org.springframework.security.core.userdetails.UsernameNotFoundException; import org.springframework.stereotype.Component; /** * @author Administrator */ @SuppressWarnings("ALL") @Component public class UserDetailsServiceImpl implements UserDetailsService{ @Autowired private UserService userService; @Override public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException { User user = userService.findByUsername(username); return user; } }
記得加@Component注解,以把實例交由Spring管理,或@Service,你們喜歡就好
創(chuàng)建SecurityMetaDataSource類
該類實現(xiàn)Spring security的FilterInvocationSecurityMetadataSource接口,作用是提供權(quán)限的元數(shù)據(jù)定義,并根據(jù)請求url匹配該url所需要的權(quán)限,獲取權(quán)限后交由AccessDecisionManager的實現(xiàn)者裁定能否訪問這個url,不能則會返回403的http錯誤碼
SecurityMetaDataSource:
package com.cas.client1.security; import com.cas.client1.entity.Resource; import com.cas.client1.service.ResourceService; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.security.access.AccessDecisionManager; import org.springframework.security.access.ConfigAttribute; import org.springframework.security.access.SecurityConfig; import org.springframework.security.access.intercept.AbstractSecurityInterceptor; import org.springframework.security.web.FilterInvocation; import org.springframework.security.web.access.intercept.FilterInvocationSecurityMetadataSource; import org.springframework.security.web.util.matcher.AndRequestMatcher; import org.springframework.security.web.util.matcher.AntPathRequestMatcher; import org.springframework.security.web.util.matcher.RequestMatcher; import org.springframework.stereotype.Component; import javax.annotation.PostConstruct; import java.util.*; @Component public class SecurityMetaDataSource implements FilterInvocationSecurityMetadataSource { @Autowired private ResourceService resourceService; private LinkedHashMap<String,Collection<ConfigAttribute>> metaData; @PostConstruct private void loadSecurityMetaData(){ List<Resource> list = resourceService.getAll(); metaData=new LinkedHashMap<>(); for (Resource resource:list){ List<ConfigAttribute> attributes=new ArrayList<>(); attributes.add(new SecurityConfig(resource.getResCode())); metaData.put(resource.getUrl(),attributes); } List<ConfigAttribute> base=new ArrayList<>(); base.add(new SecurityConfig("AUTH_0")); metaData.put("/**",base); } @Override public Collection<ConfigAttribute> getAttributes(Object object) throws IllegalArgumentException { FilterInvocation invocation= (FilterInvocation) object; if (metaData==null){ return new ArrayList<>(0); } String requestUrl = invocation.getRequestUrl(); System.out.println("請求Url:"+requestUrl); Iterator<Map.Entry<String, Collection<ConfigAttribute>>> iterator = metaData.entrySet().iterator(); Collection<ConfigAttribute> rs=new ArrayList<>(); while (iterator.hasNext()){ Map.Entry<String, Collection<ConfigAttribute>> next = iterator.next(); String url = next.getKey(); Collection<ConfigAttribute> value = next.getValue(); RequestMatcher requestMatcher=new AntPathRequestMatcher(url); if (requestMatcher.matches(invocation.getRequest())){ rs = value; break; } } System.out.println("攔截認證權(quán)限為:"+rs); return rs; } @Override public Collection<ConfigAttribute> getAllConfigAttributes() { System.out.println("invoke getAllConfigAttributes "); //loadSecurityMetaData(); //System.out.println("初始化元數(shù)據(jù)"); Collection<Collection<ConfigAttribute>> values = metaData.values(); Collection<ConfigAttribute> all=new ArrayList<>(); for (Collection<ConfigAttribute> each:values){ each.forEach(configAttribute -> { all.add(configAttribute); }); } return all; } @Override public boolean supports(Class<?> clazz) { return true; } }
同理:記得加上@Component注解
重頭戲來了!Spring security的配置
創(chuàng)建SpringSecurityConfig類
該類繼承于WebSecurityConfigurerAdapter,核心的配置類,在這里定義Spring security的使用方式
SpringSecurityConfig
package com.cas.client1.security; import com.cas.client1.config.CasProperties; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import org.springframework.security.access.AccessDecisionManager; import org.springframework.security.access.AccessDecisionVoter; import org.springframework.security.access.vote.AffirmativeBased; import org.springframework.security.access.vote.RoleVoter; import org.springframework.security.authentication.AuthenticationManager; import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; import org.springframework.security.config.annotation.web.builders.HttpSecurity; import org.springframework.security.config.annotation.web.builders.WebSecurity; import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder; import org.springframework.security.web.access.intercept.FilterSecurityInterceptor; import java.util.ArrayList; import java.util.List; /** * Spring security配置 * @author youyp * @date 2018-8-10 */ @SuppressWarnings("ALL") @Configuration @EnableWebSecurity public class SpringSecurityConfig extends WebSecurityConfigurerAdapter { @Autowired private UserDetailsServiceImpl userDetailsService; @Autowired private SecurityMetaDataSource securityMetaDataSource; @Override protected void configure(AuthenticationManagerBuilder auth) throws Exception { super.configure(auth); } @Override public void configure(WebSecurity web) throws Exception { web.ignoring().antMatchers("/js/**","/css/**","/img/**","/*.ico","/login.html", "/error","/login.do"); } @Override protected void configure(HttpSecurity http) throws Exception { System.out.println("配置Spring security"); http.formLogin() //指定登錄頁是”/login” .loginPage("/login.html").permitAll() .loginProcessingUrl("/login.do").permitAll() .defaultSuccessUrl("/home",true) .permitAll() //登錄成功后可使用loginSuccessHandler()存儲用戶信息,可選。 //.successHandler(loginSuccessHandler()).permitAll() .and() .logout().permitAll() .invalidateHttpSession(true) .and() //登錄后記住用戶,下次自動登錄,數(shù)據(jù)庫中必須存在名為persistent_logins的表 .rememberMe() .tokenValiditySeconds(1209600) .and() .csrf().disable() //其他所有資源都需要認證,登陸后訪問 .authorizeRequests().anyRequest().fullyAuthenticated(); http.addFilterBefore(filterSecurityInterceptor(),FilterSecurityInterceptor.class); } /** * 注意:這里不能加@Bean注解 * @return * @throws Exception */ //@Bean public FilterSecurityInterceptor filterSecurityInterceptor() throws Exception { FilterSecurityInterceptor filterSecurityInterceptor=new FilterSecurityInterceptor(); filterSecurityInterceptor.setSecurityMetadataSource(securityMetaDataSource); filterSecurityInterceptor.setAuthenticationManager(authenticationManager()); filterSecurityInterceptor.setAccessDecisionManager(affirmativeBased()); return filterSecurityInterceptor; } /** * 重寫AuthenticationManager獲取的方法并且定義為Bean * @return * @throws Exception */ @Override @Bean public AuthenticationManager authenticationManagerBean() throws Exception { return super.authenticationManagerBean(); } @Autowired public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception { //指定密碼加密所使用的加密器為passwordEncoder() //需要將密碼加密后寫入數(shù)據(jù)庫 auth.userDetailsService(userDetailsService).passwordEncoder(passwordEncoder()); auth.eraseCredentials(false); } @Bean public BCryptPasswordEncoder passwordEncoder() { return new BCryptPasswordEncoder(4); } /** * 定義決策管理器,這里可直接使用內(nèi)置的AffirmativeBased選舉器, * 如果需要,可自定義,繼承AbstractAccessDecisionManager,實現(xiàn)decide方法即可 * @return */ @Bean public AccessDecisionManager affirmativeBased(){ List<AccessDecisionVoter<? extends Object>> voters=new ArrayList<>(); voters.add(roleVoter()); System.out.println("正在創(chuàng)建決策管理器"); return new AffirmativeBased(voters); } /** * 定義選舉器 * @return */ @Bean public RoleVoter roleVoter(){ //這里使用角色選舉器 RoleVoter voter=new RoleVoter(); System.out.println("正在創(chuàng)建選舉器"); voter.setRolePrefix("AUTH_"); System.out.println("已將角色選舉器的前綴修改為AUTH_"); return voter; } }
說一個注意點:
FilterSecurityInterceptor這個過濾器最為重要,它負責數(shù)據(jù)庫權(quán)限信息加載,權(quán)限鑒定等關鍵動作,這個過濾器位于SpringSecurityFilterChain,即Spring security的過濾器鏈中,如果將這個類在配置類中加了@Bean注解,那么它將直接加入web容器的過濾器鏈中,這個鏈是首層過濾器鏈,
進入這個過濾器鏈之后才會進入SpringSecurityFilterChain這個負責安全的鏈條,如果這個跑到外層去了,就會導致這個獨有的過濾器一直在生效,請求無限被攔截重定向,因為這個過濾器前面沒有別的過濾器阻止它生效,如果它位于SpringSecurityFilterChain中,在進入FilterSecurityInterceptor這個
過濾器之前會有很多的Spring security過濾器在生效,如果不滿足前面的過濾器的條件,不會進入到這個過濾器。也就是說,要進入到這個過濾器,必須要從SpringSecurityFilterChain進入,從其他地方進入都會導致請求被無限重定向
另外
FilterSecurityInterceptor這個類繼承于AbstractSecurityInterceptor并實現(xiàn)Filter接口,由此我們可以重寫該類,自定義我們的特殊業(yè)務,但是,個人覺得FilterSecurityInterceptor這個實現(xiàn)類已經(jīng)很完整地實現(xiàn)了這個過濾器應做的工作,沒有必要重寫
類似的,還有AccessDecisionManager這個“決策者”,Spring security為這個功能提供了幾個默認的實現(xiàn)者,如AffirmativeBased這個類,是一個基于投票的決策器,投票器(Voter)要求實現(xiàn)AccessDecisionVoter接口,Spring security已為我們提供了幾個很有用的投票器如RoleVoter,WebExpressionVoter
這些我們都沒有必要去自定義,而且自定義出來的也沒有默認實現(xiàn)拓展性和穩(wěn)定性更好
再定義一個登陸的Controller
LoginController
package com.cas.client2.casclient2.controller; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.security.authentication.AuthenticationManager; import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; import org.springframework.security.cas.authentication.CasAuthenticationToken; import org.springframework.security.cas.web.CasAuthenticationFilter; import org.springframework.security.core.Authentication; import org.springframework.security.core.context.SecurityContextHolder; import org.springframework.stereotype.Controller; import org.springframework.web.bind.annotation.RequestMapping; import javax.servlet.http.HttpSession; @SuppressWarnings("ALL") @Controller public class LoginController { @Autowired private AuthenticationManager authenticationManager; /** * 自定義登錄地址 * @param username * @param password * @param session * @return */ @RequestMapping("login.do") public String login(String username,String passwod, HttpSession session){ try { System.out.println("進入登錄請求.........."); UsernamePasswordAuthenticationToken token=new UsernamePasswordAuthenticationToken(username,passwod); Authentication authentication=authenticationManager.authenticate(token); SecurityContextHolder.getContext().setAuthentication(authentication); session.setAttribute("SPRING_SECURITY_CONTEXT", SecurityContextHolder.getContext()); System.out.println("登錄成功"); return "redirect:home.html"; }catch (Exception e){ e.printStackTrace(); return "login.html"; } } }
創(chuàng)建幾個頁面:在resources下創(chuàng)建文件夾html,用于存放html靜態(tài)文件,
home.html
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>HOME</title> </head> <body> <h1>welcome to Home</h1> <button onclick="javascript:location.href='/logout'">退出</button> </body> </html>
login.html
<!DOCTYPE html> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:th="http://www.thymeleaf.org" xmlns:sec="http://www.thymeleaf.org/thymeleaf-extras-springsecurity3"> <head> <meta charset="UTF-8"> <title>登錄</title> </head> <body> <span style="color: red" id="msg"></span> <form action="/login.do" method="post"> <div><label> User Name : <input type="text" name="username"/> </label></div> <div><label> Password: <input type="password" name="password"/> </label></div> <div><input type="submit" value="Sign In"/></div> <input type="checkbox" name="remember-me" value="true" th:checked="checked"/><p>Remember me</p> </form> </body> <script type="text/javascript"> var url=location.href var param=url.split("?")[1]; console.log(param); if (param){ var p=param.split("&"); var msg=p[0].split("=")[1]; document.getElementById("msg").innerHTML=msg; } </script> </html>
admin.html
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>admin</title> </head> <body> 你好,歡迎登陸,這是管理員界面,擁有/admin.html的訪問權(quán)限才能訪問 </body> </html>
再定義幾個錯誤頁面
在html文件夾下創(chuàng)建一個error文件夾,在error文件夾中創(chuàng)建403.html,404.html,500.html;在程序遇到這些錯誤碼時,會自動跳轉(zhuǎn)到對應的頁面
先啟動一下項目,讓spring-data-jpa反向生成一下表結(jié)構(gòu)
再往數(shù)據(jù)庫插入幾條數(shù)據(jù):
用戶表的密碼需要放密文,我們把我們的明文密碼使用我們的密碼encoder轉(zhuǎn)一下:BCryptPasswordEncoder.encode("123");得到密文后存到數(shù)據(jù)庫的password字段中
用戶表:
資源表:即權(quán)限信息表
角色表:
角色權(quán)限中間表:
我們先不給用戶配置角色,現(xiàn)在是空角色
啟動Spring boot啟動類,訪問localhost:8083,檢測到?jīng)]登錄會自動跳到登錄頁面,登錄后自動跳轉(zhuǎn)到home.html
訪問admin.html,返回403頁面,當前用戶無權(quán)限訪問
再將剛剛的角色分配給用戶,再次訪問
此時便可訪問,大功告成!
2.部署CAS server
cas全稱Central Authentication Service,翻譯為:中央認證服務;從名字我們便可得知,這是一個獨立的服務,主要負責用戶登錄憑證的驗證;事實也是如此,cas有認證中心和client端,認證中心就是我們的cas server,負責用戶憑證的驗證,需要獨立部署,cas client就是我們的各個相互信任的應用
我們從cas官網(wǎng)下載源碼,從moudle中找到一個.war后綴的文件,將這個文件拷出來,
改一下文件名為:cas,放到一個Tomcat中,啟動tomcat,(端口先改一下,如8081),在瀏覽器中訪問localhost:8081/cas即可看到cas的登錄界面
報了個警告,說我們沒有配置ssl,也就是需要配置https,不過可以不用配置,
我們可以配置使用http:
設置cas server使用http非安全協(xié)議
主要有以下步驟:
1.WEB-INF/deployerConfigContext.xml中在<beanclass="org.jasig.cas.authentication.handler.support.HttpBasedServiceCredentialsAuthenticationHandler"p:httpClient-ref="httpClient"/>增加參數(shù)p:requireSecure="false",是否需要安全驗證,即HTTPS,false為不采用如下:<beanclass="org.jasig.cas.authentication.handler.support.HttpBasedServiceCredentialsAuthenticationHandler"p:httpClient-ref="httpClient"p:requireSecure="false"/>
1. WEB-INF/spring-configuration/ticketGrantingTicketCookieGenerator.xml中將p:cookieSecure="true"修改為 p:cookieSecure="false"
2. WEB-INF/spring-configuration/warnCookieGenerator.xml中將p:cookieSecure="true"改為p:cookieSecure="false"
3. 在tomcat的server.xml中關閉8443端口,如下圖
3.配置CAS client
在之前Spring security的基礎上,我們加入cas認證
在pom.xml中加入依賴包:
<!-- security 對CAS支持 --> <dependency> <groupId>org.springframework.security</groupId> <artifactId>spring-security-cas</artifactId> </dependency>
修改一下我們的UserDetailsServiceImpl類,讓它實現(xiàn)AuthenticationUserDetailsService<CasAssertionAuthenticationToken>接口
UserDetailsServiceImpl:
package com.cas.client1.security; import com.cas.client1.entity.User; import com.cas.client1.service.UserService; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.security.cas.authentication.CasAssertionAuthenticationToken; import org.springframework.security.core.userdetails.AuthenticationUserDetailsService; import org.springframework.security.core.userdetails.UserDetails; import org.springframework.security.core.userdetails.UserDetailsService; import org.springframework.security.core.userdetails.UsernameNotFoundException; import org.springframework.stereotype.Component; /** * @author Administrator */ @SuppressWarnings("ALL") @Component public class UserDetailsServiceImpl implements UserDetailsService, AuthenticationUserDetailsService<CasAssertionAuthenticationToken> { @Autowired private UserService userService; @Override public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException { User user = userService.findByUsername(username); return user; } /** * 實現(xiàn)AuthenticationUserDetailsService的方法, * 用于獲取cas server返回的用戶信息,再根據(jù)用戶關鍵信息加載出用戶在當前系統(tǒng)的權(quán)限 * @param token * @return * @throws UsernameNotFoundException */ public UserDetails loadUserDetails(CasAssertionAuthenticationToken token) throws UsernameNotFoundException { String name = token.getName(); System.out.println("獲得的用戶名:"+name); User user = userService.findByUsername(name); if (user==null){ throw new UsernameNotFoundException(name+"不存在"); } }
在application.properties文件中加上以下內(nèi)容:
# cas服務器地址 cas.server.host.url=http://localhost:8081/cas # cas服務器登錄地址 cas.server.host.login_url=${cas.server.host.url}/login # cas服務器登出地址 cas.server.host.logout_url=${cas.server.host.url}/logout?service=${app.server.host.url} # 應用訪問地址 app.server.host.url=http://localhost:8083 # 應用登錄地址 app.login.url=/login.do # 應用登出地址 app.logout.url=/logout
新增一個配置實體類
CasProperties
package com.cas.client1.config; import org.springframework.beans.factory.annotation.Value; import org.springframework.stereotype.Component; @Component public class CasProperties { @Value("${cas.server.host.url}") private String casServerUrl; @Value("${cas.server.host.login_url}") private String casServerLoginUrl; @Value("${cas.server.host.logout_url}") private String casServerLogoutUrl; @Value("${app.server.host.url}") private String appServerUrl; @Value("${app.login.url}") private String appLoginUrl; @Value("${app.logout.url}") private String appLogoutUrl; /**get set方法略 */ }
再修改一下我們的Spring security配置類
package com.cas.client1.security; import com.cas.client1.config.CasProperties; import org.jasig.cas.client.session.SingleSignOutFilter; import org.jasig.cas.client.validation.Cas20ServiceTicketValidator; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import org.springframework.http.HttpMethod; import org.springframework.security.access.AccessDecisionManager; import org.springframework.security.access.AccessDecisionVoter; import org.springframework.security.access.vote.AffirmativeBased; import org.springframework.security.access.vote.RoleVoter; import org.springframework.security.authentication.AuthenticationManager; import org.springframework.security.cas.ServiceProperties; import org.springframework.security.cas.authentication.CasAuthenticationProvider; import org.springframework.security.cas.web.CasAuthenticationEntryPoint; import org.springframework.security.cas.web.CasAuthenticationFilter; import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; import org.springframework.security.config.annotation.web.builders.HttpSecurity; import org.springframework.security.config.annotation.web.builders.WebSecurity; import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder; import org.springframework.security.web.access.intercept.FilterSecurityInterceptor; import org.springframework.security.web.authentication.logout.LogoutFilter; import org.springframework.security.web.authentication.logout.SecurityContextLogoutHandler; import java.util.ArrayList; import java.util.List; /** * Spring security配置 * @author youyp * @date 2018-8-10 */ @SuppressWarnings("ALL") @Configuration @EnableWebSecurity public class SpringSecurityConfig extends WebSecurityConfigurerAdapter { @Autowired private CasProperties casProperties; @Autowired private UserDetailsServiceImpl userDetailsService; @Autowired private SecurityMetaDataSource securityMetaDataSource; @Override protected void configure(AuthenticationManagerBuilder auth) throws Exception { super.configure(auth); auth.authenticationProvider(casAuthenticationProvider()); } @Override public void configure(WebSecurity web) throws Exception { web.ignoring().antMatchers("/js/**","/css/**","/img/**","/*.ico","/login.html", "/error","/login.do"); //web.ignoring().antMatchers("/js/**","/css/**","/img/**","/*.ico",,"/home"); //web.ignoring().antMatchers("/**"); // super.configure(web); } @Override protected void configure(HttpSecurity http) throws Exception { System.out.println("配置Spring security"); http.formLogin() //指定登錄頁是”/login” //.loginPage("/login.html").permitAll() //.loginProcessingUrl("/login.do").permitAll() //.defaultSuccessUrl("/home",true) //.permitAll() //登錄成功后可使用loginSuccessHandler()存儲用戶信息,可選。 //.successHandler(loginSuccessHandler()).permitAll() .and() .logout().permitAll() //退出登錄后的默認網(wǎng)址是”/home” //.logoutSuccessUrl("/home.html") //.permitAll() .invalidateHttpSession(true) .and() //登錄后記住用戶,下次自動登錄,數(shù)據(jù)庫中必須存在名為persistent_logins的表 .rememberMe() .tokenValiditySeconds(1209600) .and() .csrf().disable() //其他所有資源都需要認證,登陸后訪問 .authorizeRequests().anyRequest().fullyAuthenticated(); http.exceptionHandling().authenticationEntryPoint(casAuthenticationEntryPoint()) .and() .addFilterAt(casAuthenticationFilter(),CasAuthenticationFilter.class) .addFilterBefore(casLogoutFilter(),LogoutFilter.class) .addFilterBefore(singleSignOutFilter(),CasAuthenticationFilter.class); /** * FilterSecurityInterceptor本身屬于過濾器,不能在外面定義為@Bean, * 如果定義在外面,則這個過濾器會被獨立加載到webContext中,導致請求會一直被這個過濾器攔截 * 加入到Springsecurity的過濾器鏈中,才會使它完整的生效 */ http.addFilterBefore(filterSecurityInterceptor(),FilterSecurityInterceptor.class); } /** * 注意:這里不能加@Bean注解 * @return * @throws Exception */ // @Bean public FilterSecurityInterceptor filterSecurityInterceptor() throws Exception { FilterSecurityInterceptor filterSecurityInterceptor=new FilterSecurityInterceptor(); filterSecurityInterceptor.setSecurityMetadataSource(securityMetaDataSource); filterSecurityInterceptor.setAuthenticationManager(authenticationManager()); filterSecurityInterceptor.setAccessDecisionManager(affirmativeBased()); return filterSecurityInterceptor; } /** * 認證入口 * <p> * <b>Note:</b>瀏覽器訪問不可直接填客戶端的login請求,若如此則會返回Error頁面,無法被此入口攔截 * </p> * @return */ @Bean public CasAuthenticationEntryPoint casAuthenticationEntryPoint(){ CasAuthenticationEntryPoint casAuthenticationEntryPoint=new CasAuthenticationEntryPoint(); casAuthenticationEntryPoint.setLoginUrl(casProperties.getCasServerLoginUrl()); casAuthenticationEntryPoint.setServiceProperties(serviceProperties()); return casAuthenticationEntryPoint; } @Bean public ServiceProperties serviceProperties() { ServiceProperties serviceProperties=new ServiceProperties(); serviceProperties.setService(casProperties.getAppServerUrl()+casProperties.getAppLoginUrl()); serviceProperties.setAuthenticateAllArtifacts(true); return serviceProperties; } // @Bean public CasAuthenticationFilter casAuthenticationFilter() throws Exception { CasAuthenticationFilter casAuthenticationFilter=new CasAuthenticationFilter(); casAuthenticationFilter.setAuthenticationManager(authenticationManager()); casAuthenticationFilter.setFilterProcessesUrl(casProperties.getAppLoginUrl()); // casAuthenticationFilter.setAuthenticationSuccessHandler( // new SimpleUrlAuthenticationSuccessHandler("/home.html")); return casAuthenticationFilter; } @Bean public CasAuthenticationProvider casAuthenticationProvider(){ CasAuthenticationProvider casAuthenticationProvider=new CasAuthenticationProvider(); casAuthenticationProvider.setAuthenticationUserDetailsService(userDetailsService); casAuthenticationProvider.setServiceProperties(serviceProperties()); casAuthenticationProvider.setTicketValidator(cas20ServiceTicketValidator()); casAuthenticationProvider.setKey("casAuthenticationProviderKey"); return casAuthenticationProvider; } @Bean public Cas20ServiceTicketValidator cas20ServiceTicketValidator() { return new Cas20ServiceTicketValidator(casProperties.getCasServerUrl()); } // @Bean public SingleSignOutFilter singleSignOutFilter(){ SingleSignOutFilter singleSignOutFilter=new SingleSignOutFilter(); singleSignOutFilter.setCasServerUrlPrefix(casProperties.getCasServerUrl()); singleSignOutFilter.setIgnoreInitConfiguration(true); return singleSignOutFilter; } // @Bean public LogoutFilter casLogoutFilter(){ LogoutFilter logoutFilter = new LogoutFilter(casProperties.getCasServerLogoutUrl(), new SecurityContextLogoutHandler()); logoutFilter.setFilterProcessesUrl(casProperties.getAppLogoutUrl()); return logoutFilter; } /** * 重寫AuthenticationManager獲取的方法并且定義為Bean * @return * @throws Exception */ @Override @Bean public AuthenticationManager authenticationManagerBean() throws Exception { return super.authenticationManagerBean(); } @Autowired public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception { //指定密碼加密所使用的加密器為passwordEncoder() //需要將密碼加密后寫入數(shù)據(jù)庫 //auth.userDetailsService(userDetailsService).passwordEncoder(passwordEncoder()); //auth.eraseCredentials(false); } @Bean public BCryptPasswordEncoder passwordEncoder() { return new BCryptPasswordEncoder(4); } /** * 定義決策管理器,這里可直接使用內(nèi)置的AffirmativeBased選舉器, * 如果需要,可自定義,繼承AbstractAccessDecisionManager,實現(xiàn)decide方法即可 * @return */ @Bean public AccessDecisionManager affirmativeBased(){ List<AccessDecisionVoter<? extends Object>> voters=new ArrayList<>(); voters.add(roleVoter()); System.out.println("正在創(chuàng)建決策管理器"); return new AffirmativeBased(voters); } /** * 定義選舉器 * @return */ @Bean public RoleVoter roleVoter(){ //這里使用角色選舉器 RoleVoter voter=new RoleVoter(); System.out.println("正在創(chuàng)建選舉器"); voter.setRolePrefix("AUTH_"); System.out.println("已將角色選舉器的前綴修改為AUTH_"); return voter; } @Bean public LoginSuccessHandler loginSuccessHandler() { return new LoginSuccessHandler(); } }
這里我們新增了幾個filter,請注意,這幾個filter定義時都不能配置@Bean注解,原因以上相同,這幾個filter都要加入到springSecurity的FilterChain中,而不是直接加入到web容器的FilterChain中
再修改一下LoginController
package com.cas.client1.controller; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.security.authentication.AuthenticationManager; import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; import org.springframework.security.cas.web.CasAuthenticationFilter; import org.springframework.security.core.Authentication; import org.springframework.security.core.context.SecurityContextHolder; import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter; import org.springframework.stereotype.Controller; import org.springframework.web.bind.annotation.RequestMapping; import javax.servlet.http.HttpSession; @SuppressWarnings("Duplicates") @Controller public class LoginController { @Autowired private AuthenticationManager authenticationManager; /** * 自定義登錄地址 * @param username * @param password * @param session * @return */ @RequestMapping("login.do") public String login(String ticket, HttpSession session){ try { System.out.println("進入登錄請求.........."); //cas單點登錄的用戶名就是:_cas_stateful_ ,用戶憑證是server傳回來的ticket String username = CasAuthenticationFilter.CAS_STATEFUL_IDENTIFIER; UsernamePasswordAuthenticationToken token=new UsernamePasswordAuthenticationToken(username,ticket); Authentication authentication=authenticationManager.authenticate(token); SecurityContextHolder.getContext().setAuthentication(authentication); session.setAttribute("SPRING_SECURITY_CONTEXT", SecurityContextHolder.getContext()); System.out.println("登錄成功"); return "redirect:home.html"; }catch (Exception e){ e.printStackTrace(); return "login.html"; } } }
這時,之前負責登錄的loginController不再是驗證用戶名和密碼正不正確了,因為用戶名密碼的驗證已經(jīng)交給cas server了,LoginController的工作就是接收cas server重定向時傳回來的ticket,驗證ticket的有效性,如果沒有異常,則會進入到UserDetailsServiceImpl中的loadUserDetails方法,并根據(jù)用戶名加載用戶權(quán)限等信息,然后我們再將用戶信息存入Session,完成本地登錄,本地登錄之后,用戶每次請求時,就不需要再次驗證ticket了,而是驗證Session
到這里,cas client已經(jīng)配置完成,為了看清楚流程,我們以debug模式啟動一下項目,在loginController的login方法開頭打一個斷點,打開瀏覽器調(diào)試模式(F12),切換到network看請求,在瀏覽器中輸入:localhost:8083,瀏覽器會自動重定向到cas server 的登錄頁面,如下圖:
我們輸入一個數(shù)據(jù)庫中有的用戶名,再在密碼欄中輸入一次用戶名,因為這里的cas server驗證方式還沒改,只要求用戶名和密碼相同就可通過驗證,后面我會研究一下怎么修改cas server 的驗證方式為數(shù)據(jù)庫驗證
如輸入:用戶名:user 密碼:user
點擊登錄,驗證成功后,我們看F12 network請求,發(fā)現(xiàn)瀏覽器發(fā)送了兩個請求,一個是8081的,也就是cas server的,另外一個是8083的,也就是我們的client端的,如圖:
另一個
因為我們在后臺開了debug模式,打了斷點,所以后面這個請求一直在pending狀態(tài),我們先看第一個請求的詳細情況:
很明顯的,這個請求發(fā)送了我們的用戶名和密碼,由此可知,這個請求的作用就是負責在cas server后臺驗證用戶名的密碼,驗證成功后,會自動重定向到第二個請求
我們再來看第二個請求:
這個請求就是我們cas client所配置的登錄地址,此時這個請求后面自動帶上了一個名為ticket的參數(shù),參數(shù)值是一串自動生成的隨機字符串,由cas server生成的
我們再回到后臺,沒什么錯誤的話,我們可以看到LoginController接收到了這個參數(shù),我們先在UserDetailsServiceImpl類的loadUserDetails方法的開頭打一個斷點,按F8讓調(diào)試器跑走,此時,我們就可以看到調(diào)試器跳到了我們剛剛打的UserDetasServiceImpl的斷點中,再看看參數(shù)
可以看出,我們接收到了cas server認證完ticket后傳回來的用戶名,我們根據(jù)用戶名加載對應的權(quán)限,返回即可,此時我們再次按F8跳走
再回到界面,發(fā)現(xiàn)我們已經(jīng)可以訪問頁面了:
下一步,就是驗證多個應用之間是否能只登陸一次就不用再登陸了;
我們將當前項目拷貝一份,改名稱為cas-client2(maven的groupId和artifactId),再修改一下端口為8082,,記得對應的cas配置也要改:
啟動項目
先訪問localhost:8082
發(fā)現(xiàn)它自動跳轉(zhuǎn)到了8081的cas server
再打開另外一個瀏覽器標簽,訪問localhost:8083
發(fā)現(xiàn)它也自動跳到了cas的登錄頁面,我們先在這里輸入賬號密碼登錄:
登錄成功后,我們再切換回剛剛沒登錄的8082的網(wǎng)頁標簽,刷新一下,
ok,8082也不用登陸了,大功告成!
源碼地址:
https://github.com/yupingyou/casclient.git
另:Spring security原本默認有個/login和/logout的handler,(以前不是這個地址,不知道從哪個版本開始改了,以前好像是_spring_security_check,大概是這個,記不太清,我用了4以后就發(fā)現(xiàn)地址變了),但是我發(fā)現(xiàn)我訪問/login的時候出現(xiàn)404,但/logout可以訪問,沒發(fā)現(xiàn)什么原因,后來我就自定義一個登陸了,也就是我配置的/login.do,代替了默認的/login
到此這篇關于Spring boot security權(quán)限管理集成cas單點登錄的文章就介紹到這了,更多相關Spring boot security集成cas單點登錄內(nèi)容請搜索腳本之家以前的文章或繼續(xù)瀏覽下面的相關文章希望大家以后多多支持腳本之家!
相關文章
SpringBoot四大神器之Auto onfiguration的使用
本文主要介紹了SpringBoot四大神器之Auto Configuration,springboot auto configuration的本質(zhì)就是自動配置spring的各種bean。感興趣的可以了解一下2021-10-10Java異常(Exception)處理以及常見異??偨Y(jié)
在《Java編程思想》中這樣定義異常,阻止當前方法或作用域繼續(xù)執(zhí)行的問題,雖然java中有異常處理機制,但是要明確一點,決不應該用"正常"的態(tài)度來看待異常,這篇文章主要給大家介紹了關于Java異常(Exception)處理以及常見異常的相關資料,需要的朋友可以參考下2021-10-10JPA如何使用entityManager執(zhí)行SQL并指定返回類型
這篇文章主要介紹了JPA使用entityManager執(zhí)行SQL并指定返回類型的操作,具有很好的參考價值,希望對大家有所幫助。如有錯誤或未考慮完全的地方,望不吝賜教2021-06-06淺談java中String StringBuffer StringBuilder的區(qū)別
下面小編就為大家?guī)硪黄獪\談java中String StringBuffer StringBuilder的區(qū)別。小編覺得挺不錯的,現(xiàn)在就分享給大家,也給大家做個參考。一起跟隨小編過來看看吧2016-06-06