core-model-components.adoc 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477
  1. [[core-model-components]]
  2. = Core Model / Components
  3. :toc: left
  4. :toclevels: 1
  5. :spring-security-reference-base-url: https://docs.spring.io/spring-security/reference
  6. [[registered-client]]
  7. == RegisteredClient
  8. A `RegisteredClient` is a representation of a client that is https://datatracker.ietf.org/doc/html/rfc6749#section-2[registered] with the authorization server.
  9. A client must be registered with the authorization server before it can initiate an authorization grant flow, such as `authorization_code` or `client_credentials`.
  10. During client registration, the client is assigned a unique https://datatracker.ietf.org/doc/html/rfc6749#section-2.2[client identifier], (optionally) a client secret (depending on https://datatracker.ietf.org/doc/html/rfc6749#section-2.1[client type]), and metadata associated with its unique client identifier.
  11. The client's metadata can range from human-facing display strings (such as client name) to items specific to a protocol flow (such as the list of valid redirect URIs).
  12. [TIP]
  13. The corresponding client registration model in Spring Security's OAuth2 Client support is {spring-security-reference-base-url}/servlet/oauth2/client/core.html#oauth2Client-client-registration[ClientRegistration].
  14. The primary purpose of a client is to request access to protected resources.
  15. The client first requests an access token by authenticating with the authorization server and presenting the authorization grant.
  16. The authorization server authenticates the client and authorization grant, and, if they are valid, issues an access token.
  17. The client can now request the protected resource from the resource server by presenting the access token.
  18. The following example shows how to configure a `RegisteredClient` that is allowed to perform the https://datatracker.ietf.org/doc/html/rfc6749#section-4.1[authorization_code grant] flow to request an access token:
  19. [source,java]
  20. ----
  21. RegisteredClient registeredClient = RegisteredClient.withId(UUID.randomUUID().toString())
  22. .clientId("client-a")
  23. .clientSecret("{noop}secret") <1>
  24. .clientAuthenticationMethod(ClientAuthenticationMethod.CLIENT_SECRET_BASIC)
  25. .authorizationGrantType(AuthorizationGrantType.AUTHORIZATION_CODE)
  26. .redirectUri("http://127.0.0.1:8080/authorized")
  27. .scope("scope-a")
  28. .clientSettings(ClientSettings.builder().requireAuthorizationConsent(true).build())
  29. .build();
  30. ----
  31. <1> `\{noop\}` represents the `PasswordEncoder` id for Spring Security's {spring-security-reference-base-url}/features/authentication/password-storage.html#authentication-password-storage-dpe[NoOpPasswordEncoder].
  32. The corresponding configuration in Spring Security's {spring-security-reference-base-url}/servlet/oauth2/client/index.html[OAuth2 Client support] is:
  33. [source,yaml]
  34. ----
  35. spring:
  36. security:
  37. oauth2:
  38. client:
  39. registration:
  40. client-a:
  41. provider: spring
  42. client-id: client-a
  43. client-secret: secret
  44. authorization-grant-type: authorization_code
  45. redirect-uri: "http://127.0.0.1:8080/authorized"
  46. scope: scope-a
  47. provider:
  48. spring:
  49. issuer-uri: http://localhost:9000
  50. ----
  51. A `RegisteredClient` has metadata (attributes) associated with its unique Client Identifier and is defined as follows:
  52. [source,java]
  53. ----
  54. public class RegisteredClient implements Serializable {
  55. private String id; <1>
  56. private String clientId; <2>
  57. private Instant clientIdIssuedAt; <3>
  58. private String clientSecret; <4>
  59. private Instant clientSecretExpiresAt; <5>
  60. private String clientName; <6>
  61. private Set<ClientAuthenticationMethod> clientAuthenticationMethods; <7>
  62. private Set<AuthorizationGrantType> authorizationGrantTypes; <8>
  63. private Set<String> redirectUris; <9>
  64. private Set<String> scopes; <10>
  65. private ClientSettings clientSettings; <11>
  66. private TokenSettings tokenSettings; <12>
  67. ...
  68. }
  69. ----
  70. <1> `id`: The ID that uniquely identifies the `RegisteredClient`.
  71. <2> `clientId`: The client identifier.
  72. <3> `clientIdIssuedAt`: The time at which the client identifier was issued.
  73. <4> `clientSecret`: The client's secret. The value should be encoded using Spring Security's {spring-security-reference-base-url}/features/authentication/password-storage.html#authentication-password-storage-dpe[PasswordEncoder].
  74. <5> `clientSecretExpiresAt`: The time at which the client secret expires.
  75. <6> `clientName`: A descriptive name used for the client. The name may be used in certain scenarios, such as when displaying the client name in the consent page.
  76. <7> `clientAuthenticationMethods`: The authentication method(s) that the client may use. The supported values are `client_secret_basic`, `client_secret_post`, https://datatracker.ietf.org/doc/html/rfc7523[`private_key_jwt`], `client_secret_jwt`, and `none` https://datatracker.ietf.org/doc/html/rfc7636[(public clients)].
  77. <8> `authorizationGrantTypes`: The https://datatracker.ietf.org/doc/html/rfc6749#section-1.3[authorization grant type(s)] that the client can use. The supported values are `authorization_code`, `client_credentials`, and `refresh_token`.
  78. <9> `redirectUris`: The registered https://datatracker.ietf.org/doc/html/rfc6749#section-3.1.2[redirect URI(s)] that the client may use in redirect-based flows – for example, `authorization_code` grant.
  79. <10> `scopes`: The scope(s) that the client is allowed to request.
  80. <11> `clientSettings`: The custom settings for the client – for example, require https://datatracker.ietf.org/doc/html/rfc7636[PKCE], require authorization consent, and others.
  81. <12> `tokenSettings`: The custom settings for the OAuth2 tokens issued to the client – for example, access/refresh token time-to-live, reuse refresh tokens, and others.
  82. [[registered-client-repository]]
  83. == RegisteredClientRepository
  84. The `RegisteredClientRepository` is the central component where new clients can be registered and existing clients can be queried.
  85. It is used by other components when following a specific protocol flow, such as client authentication, authorization grant processing, token introspection, dynamic client registration, and others.
  86. The provided implementations of `RegisteredClientRepository` are `InMemoryRegisteredClientRepository` and `JdbcRegisteredClientRepository`.
  87. The `InMemoryRegisteredClientRepository` implementation stores `RegisteredClient` instances in-memory and is recommended *ONLY* to be used during development and testing.
  88. `JdbcRegisteredClientRepository` is a JDBC implementation that persists `RegisteredClient` instances by using `JdbcOperations`.
  89. [NOTE]
  90. The `RegisteredClientRepository` is a *REQUIRED* component.
  91. The following example shows how to register a `RegisteredClientRepository` `@Bean`:
  92. [source,java]
  93. ----
  94. @Bean
  95. public RegisteredClientRepository registeredClientRepository() {
  96. List<RegisteredClient> registrations = ...
  97. return new InMemoryRegisteredClientRepository(registrations);
  98. }
  99. ----
  100. Alternatively, you can configure the `RegisteredClientRepository` through the xref:configuration-model.adoc#oauth2-authorization-server-configurer[`OAuth2AuthorizationServerConfigurer`]:
  101. [source,java]
  102. ----
  103. @Bean
  104. public SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) throws Exception {
  105. OAuth2AuthorizationServerConfigurer<HttpSecurity> authorizationServerConfigurer =
  106. new OAuth2AuthorizationServerConfigurer<>();
  107. http.apply(authorizationServerConfigurer);
  108. authorizationServerConfigurer
  109. .registeredClientRepository(registeredClientRepository);
  110. ...
  111. return http.build();
  112. }
  113. ----
  114. [[oauth2-authorization]]
  115. == OAuth2Authorization
  116. An `OAuth2Authorization` is a representation of an OAuth2 authorization, which holds state related to the authorization granted to a <<registered-client, client>>, by the resource owner or itself in the case of the `client_credentials` authorization grant type.
  117. [TIP]
  118. The corresponding authorization model in Spring Security's OAuth2 Client support is {spring-security-reference-base-url}/servlet/oauth2/client/core.html#oauth2Client-authorized-client[OAuth2AuthorizedClient].
  119. After the successful completion of an authorization grant flow, an `OAuth2Authorization` is created and associates an `OAuth2AccessToken`, an (optional) `OAuth2RefreshToken`, and additional state specific to the executed authorization grant type.
  120. The `OAuth2Token` instances associated with an `OAuth2Authorization` vary, depending on the authorization grant type.
  121. For the OAuth2 https://datatracker.ietf.org/doc/html/rfc6749#section-4.1[authorization_code grant], an `OAuth2AuthorizationCode`, an `OAuth2AccessToken`, and an (optional) `OAuth2RefreshToken` are associated.
  122. For the OpenID Connect 1.0 https://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth[authorization_code grant], an `OAuth2AuthorizationCode`, an `OidcIdToken`, an `OAuth2AccessToken`, and an (optional) `OAuth2RefreshToken` are associated.
  123. For the OAuth2 https://datatracker.ietf.org/doc/html/rfc6749#section-4.4[client_credentials grant], only an `OAuth2AccessToken` is associated.
  124. `OAuth2Authorization` and its attributes are defined as follows:
  125. [source,java]
  126. ----
  127. public class OAuth2Authorization implements Serializable {
  128. private String id; <1>
  129. private String registeredClientId; <2>
  130. private String principalName; <3>
  131. private AuthorizationGrantType authorizationGrantType; <4>
  132. private Map<Class<? extends OAuth2Token>, Token<?>> tokens; <5>
  133. private Map<String, Object> attributes; <6>
  134. ...
  135. }
  136. ----
  137. <1> `id`: The ID that uniquely identifies the `OAuth2Authorization`.
  138. <2> `registeredClientId`: The ID that uniquely identifies the <<registered-client, RegisteredClient>>.
  139. <3> `principalName`: The principal name of the resource owner (or client).
  140. <4> `authorizationGrantType`: The `AuthorizationGrantType` used.
  141. <5> `tokens`: The `OAuth2Token` instances (and associated metadata) specific to the executed authorization grant type.
  142. <6> `attributes`: The additional attributes specific to the executed authorization grant type – for example, the authenticated `Principal`, `OAuth2AuthorizationRequest`, authorized scope(s), and others.
  143. `OAuth2Authorization` and its associated `OAuth2Token` instances have a set lifespan.
  144. A newly issued `OAuth2Token` is active and becomes inactive when it either expires or is invalidated (revoked).
  145. The `OAuth2Authorization` is (implicitly) inactive when all associated `OAuth2Token` instances are inactive.
  146. Each `OAuth2Token` is held in an `OAuth2Authorization.Token`, which provides accessors for `isExpired()`, `isInvalidated()`, and `isActive()`.
  147. `OAuth2Authorization.Token` also provides `getClaims()`, which returns the claims (if any) associated with the `OAuth2Token`.
  148. [[oauth2-authorization-service]]
  149. == OAuth2AuthorizationService
  150. The `OAuth2AuthorizationService` is the central component where new authorizations are stored and existing authorizations are queried.
  151. It is used by other components when following a specific protocol flow – for example, client authentication, authorization grant processing, token introspection, token revocation, dynamic client registration, and others.
  152. The provided implementations of `OAuth2AuthorizationService` are `InMemoryOAuth2AuthorizationService` and `JdbcOAuth2AuthorizationService`.
  153. The `InMemoryOAuth2AuthorizationService` implementation stores `OAuth2Authorization` instances in-memory and is recommended *ONLY* to be used during development and testing.
  154. `JdbcOAuth2AuthorizationService` is a JDBC implementation that persists `OAuth2Authorization` instances by using `JdbcOperations`.
  155. [NOTE]
  156. The `OAuth2AuthorizationService` is an *OPTIONAL* component and defaults to `InMemoryOAuth2AuthorizationService`.
  157. The following example shows how to register an `OAuth2AuthorizationService` `@Bean`:
  158. [source,java]
  159. ----
  160. @Bean
  161. public OAuth2AuthorizationService authorizationService() {
  162. return new InMemoryOAuth2AuthorizationService();
  163. }
  164. ----
  165. Alternatively, you can configure the `OAuth2AuthorizationService` through the xref:configuration-model.adoc#oauth2-authorization-server-configurer[`OAuth2AuthorizationServerConfigurer`]:
  166. [source,java]
  167. ----
  168. @Bean
  169. public SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) throws Exception {
  170. OAuth2AuthorizationServerConfigurer<HttpSecurity> authorizationServerConfigurer =
  171. new OAuth2AuthorizationServerConfigurer<>();
  172. http.apply(authorizationServerConfigurer);
  173. authorizationServerConfigurer
  174. .authorizationService(authorizationService);
  175. ...
  176. return http.build();
  177. }
  178. ----
  179. [[oauth2-authorization-consent]]
  180. == OAuth2AuthorizationConsent
  181. An `OAuth2AuthorizationConsent` is a representation of an authorization "consent" (decision) from an https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.1[OAuth2 authorization request flow] – for example, the `authorization_code` grant, which holds the authorities granted to a <<registered-client, client>> by the resource owner.
  182. When authorizing access to a client, the resource owner may grant only a subset of the authorities requested by the client.
  183. The typical use case is the `authorization_code` grant flow, in which the client requests scope(s) and the resource owner grants (or denies) access to the requested scope(s).
  184. After the completion of an OAuth2 authorization request flow, an `OAuth2AuthorizationConsent` is created (or updated) and associates the granted authorities with the client and resource owner.
  185. `OAuth2AuthorizationConsent` and its attributes are defined as follows:
  186. [source,java]
  187. ----
  188. public final class OAuth2AuthorizationConsent implements Serializable {
  189. private final String registeredClientId; <1>
  190. private final String principalName; <2>
  191. private final Set<GrantedAuthority> authorities; <3>
  192. ...
  193. }
  194. ----
  195. <1> `registeredClientId`: The ID that uniquely identifies the <<registered-client, RegisteredClient>>.
  196. <2> `principalName`: The principal name of the resource owner.
  197. <3> `authorities`: The authorities granted to the client by the resource owner. An authority can represent a scope, a claim, a permission, a role, and others.
  198. [[oauth2-authorization-consent-service]]
  199. == OAuth2AuthorizationConsentService
  200. The `OAuth2AuthorizationConsentService` is the central component where new authorization consents are stored and existing authorization consents are queried.
  201. It is primarily used by components that implement an OAuth2 authorization request flow – for example, the `authorization_code` grant.
  202. The provided implementations of `OAuth2AuthorizationConsentService` are `InMemoryOAuth2AuthorizationConsentService` and `JdbcOAuth2AuthorizationConsentService`.
  203. The `InMemoryOAuth2AuthorizationConsentService` implementation stores `OAuth2AuthorizationConsent` instances in-memory and is recommended *ONLY* for development and testing.
  204. `JdbcOAuth2AuthorizationConsentService` is a JDBC implementation that persists `OAuth2AuthorizationConsent` instances by using `JdbcOperations`.
  205. [NOTE]
  206. The `OAuth2AuthorizationConsentService` is an *OPTIONAL* component and defaults to `InMemoryOAuth2AuthorizationConsentService`.
  207. The following example shows how to register an `OAuth2AuthorizationConsentService` `@Bean`:
  208. [source,java]
  209. ----
  210. @Bean
  211. public OAuth2AuthorizationConsentService authorizationConsentService() {
  212. return new InMemoryOAuth2AuthorizationConsentService();
  213. }
  214. ----
  215. Alternatively, you can configure the `OAuth2AuthorizationConsentService` through the xref:configuration-model.adoc#oauth2-authorization-server-configurer[`OAuth2AuthorizationServerConfigurer`]:
  216. [source,java]
  217. ----
  218. @Bean
  219. public SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) throws Exception {
  220. OAuth2AuthorizationServerConfigurer<HttpSecurity> authorizationServerConfigurer =
  221. new OAuth2AuthorizationServerConfigurer<>();
  222. http.apply(authorizationServerConfigurer);
  223. authorizationServerConfigurer
  224. .authorizationConsentService(authorizationConsentService);
  225. ...
  226. return http.build();
  227. }
  228. ----
  229. [[oauth2-token-context]]
  230. == OAuth2TokenContext
  231. An `OAuth2TokenContext` is a context object that holds information associated with an `OAuth2Token` and is used by an <<oauth2-token-generator, OAuth2TokenGenerator>> and <<oauth2-token-customizer, OAuth2TokenCustomizer>>.
  232. `OAuth2TokenContext` provides the following accessors:
  233. [source,java]
  234. ----
  235. public interface OAuth2TokenContext extends Context {
  236. default RegisteredClient getRegisteredClient() ... <1>
  237. default <T extends Authentication> T getPrincipal() ... <2>
  238. default ProviderContext getProviderContext() ... <3>
  239. @Nullable
  240. default OAuth2Authorization getAuthorization() ... <4>
  241. default Set<String> getAuthorizedScopes() ... <5>
  242. default OAuth2TokenType getTokenType() ... <6>
  243. default AuthorizationGrantType getAuthorizationGrantType() ... <7>
  244. default <T extends Authentication> T getAuthorizationGrant() ... <8>
  245. ...
  246. }
  247. ----
  248. <1> `getRegisteredClient()`: The <<registered-client, RegisteredClient>> associated with the authorization grant.
  249. <2> `getPrincipal()`: The `Authentication` instance of the resource owner (or client).
  250. <3> `getProviderContext()`: The xref:configuration-model.adoc#provider-context[`ProviderContext`] object that holds information related to the provider.
  251. <4> `getAuthorization()`: The <<oauth2-authorization, OAuth2Authorization>> associated with the authorization grant.
  252. <5> `getAuthorizedScopes()`: The scope(s) authorized for the client.
  253. <6> `getTokenType()`: The `OAuth2TokenType` to generate. The supported values are `code`, `access_token`, `refresh_token`, and `id_token`.
  254. <7> `getAuthorizationGrantType()`: The `AuthorizationGrantType`.
  255. <8> `getAuthorizationGrant()`: The `Authentication` instance used by the `AuthenticationProvider` that processes the authorization grant.
  256. [[oauth2-token-generator]]
  257. == OAuth2TokenGenerator
  258. An `OAuth2TokenGenerator` is responsible for generating an `OAuth2Token` from the information contained in the provided <<oauth2-token-context, OAuth2TokenContext>>.
  259. The `OAuth2Token` generated primarily depends on the type of `OAuth2TokenType` specified in the `OAuth2TokenContext`.
  260. For example, when the `value` for `OAuth2TokenType` is:
  261. * `code`, then `OAuth2AuthorizationCode` is generated.
  262. * `access_token`, then `OAuth2AccessToken` is generated.
  263. * `refresh_token`, then `OAuth2RefreshToken` is generated.
  264. * `id_token`, then `OidcIdToken` is generated.
  265. Furthermore, the format of the generated `OAuth2AccessToken` varies, depending on the `TokenSettings.getAccessTokenFormat()` configured for the <<registered-client, RegisteredClient>>.
  266. If the format is `OAuth2TokenFormat.SELF_CONTAINED` (the default), then a `Jwt` is generated.
  267. If the format is `OAuth2TokenFormat.REFERENCE`, then an "opaque" token is generated.
  268. Finally, if the generated `OAuth2Token` has a set of claims and implements `ClaimAccessor`, the claims are made accessible from <<oauth2-authorization, OAuth2Authorization.Token.getClaims()>>.
  269. The `OAuth2TokenGenerator` is primarily used by components that implement authorization grant processing – for example, `authorization_code`, `client_credentials`, and `refresh_token`.
  270. The provided implementations are `OAuth2AccessTokenGenerator`, `OAuth2RefreshTokenGenerator`, and `JwtGenerator`.
  271. The `OAuth2AccessTokenGenerator` generates an "opaque" (`OAuth2TokenFormat.REFERENCE`) access token, and the `JwtGenerator` generates a `Jwt` (`OAuth2TokenFormat.SELF_CONTAINED`).
  272. [NOTE]
  273. The `OAuth2TokenGenerator` is an *OPTIONAL* component and defaults to a `DelegatingOAuth2TokenGenerator` composed of an `OAuth2AccessTokenGenerator` and `OAuth2RefreshTokenGenerator`.
  274. As well, if a `JwtEncoder` `@Bean` or `JWKSource<SecurityContext>` `@Bean` is registered, then a `JwtGenerator` is additionally composed in the `DelegatingOAuth2TokenGenerator`.
  275. The `OAuth2TokenGenerator` provides great flexibility, as it can support any custom token format for `access_token` and `refresh_token`.
  276. The following example shows how to register an `OAuth2TokenGenerator` `@Bean`:
  277. [source,java]
  278. ----
  279. @Bean
  280. public OAuth2TokenGenerator<?> tokenGenerator() {
  281. JwtEncoder jwtEncoder = ...
  282. JwtGenerator jwtGenerator = new JwtGenerator(jwtEncoder);
  283. OAuth2AccessTokenGenerator accessTokenGenerator = new OAuth2AccessTokenGenerator();
  284. OAuth2RefreshTokenGenerator refreshTokenGenerator = new OAuth2RefreshTokenGenerator();
  285. return new DelegatingOAuth2TokenGenerator(
  286. jwtGenerator, accessTokenGenerator, refreshTokenGenerator);
  287. }
  288. ----
  289. Alternatively, you can configure the `OAuth2TokenGenerator` through the xref:configuration-model.adoc#oauth2-authorization-server-configurer[`OAuth2AuthorizationServerConfigurer`]:
  290. [source,java]
  291. ----
  292. @Bean
  293. public SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) throws Exception {
  294. OAuth2AuthorizationServerConfigurer<HttpSecurity> authorizationServerConfigurer =
  295. new OAuth2AuthorizationServerConfigurer<>();
  296. http.apply(authorizationServerConfigurer);
  297. authorizationServerConfigurer
  298. .tokenGenerator(tokenGenerator);
  299. ...
  300. return http.build();
  301. }
  302. ----
  303. [[oauth2-token-customizer]]
  304. == OAuth2TokenCustomizer
  305. An `OAuth2TokenCustomizer` provides the ability to customize the attributes of an `OAuth2Token`, which are accessible in the provided <<oauth2-token-context, OAuth2TokenContext>>.
  306. It is used by an <<oauth2-token-generator, OAuth2TokenGenerator>> to let it customize the attributes of the `OAuth2Token` before it is generated.
  307. An `OAuth2TokenCustomizer<OAuth2TokenClaimsContext>` declared with a generic type of `OAuth2TokenClaimsContext` (`implements OAuth2TokenContext`) provides the ability to customize the claims of an "opaque" `OAuth2AccessToken`.
  308. `OAuth2TokenClaimsContext.getClaims()` provides access to the `OAuth2TokenClaimsSet.Builder`, allowing the ability to add, replace, and remove claims.
  309. The following example shows how to implement an `OAuth2TokenCustomizer<OAuth2TokenClaimsContext>` and configure it with an `OAuth2AccessTokenGenerator`:
  310. [source,java]
  311. ----
  312. @Bean
  313. public OAuth2TokenGenerator<?> tokenGenerator() {
  314. JwtEncoder jwtEncoder = ...
  315. JwtGenerator jwtGenerator = new JwtGenerator(jwtEncoder);
  316. OAuth2AccessTokenGenerator accessTokenGenerator = new OAuth2AccessTokenGenerator();
  317. accessTokenGenerator.setAccessTokenCustomizer(accessTokenCustomizer());
  318. OAuth2RefreshTokenGenerator refreshTokenGenerator = new OAuth2RefreshTokenGenerator();
  319. return new DelegatingOAuth2TokenGenerator(
  320. jwtGenerator, accessTokenGenerator, refreshTokenGenerator);
  321. }
  322. @Bean
  323. public OAuth2TokenCustomizer<OAuth2TokenClaimsContext> accessTokenCustomizer() {
  324. return context -> {
  325. OAuth2TokenClaimsSet.Builder claims = context.getClaims();
  326. // Customize claims
  327. };
  328. }
  329. ----
  330. [TIP]
  331. If the `OAuth2TokenGenerator` is not provided as a `@Bean` or is not configured through the `OAuth2AuthorizationServerConfigurer`, an `OAuth2TokenCustomizer<OAuth2TokenClaimsContext>` `@Bean` will automatically be configured with an `OAuth2AccessTokenGenerator`.
  332. An `OAuth2TokenCustomizer<JwtEncodingContext>` declared with a generic type of `JwtEncodingContext` (`implements OAuth2TokenContext`) provides the ability to customize the headers and claims of a `Jwt`.
  333. `JwtEncodingContext.getHeaders()` provides access to the `JoseHeader.Builder`, allowing the ability to add, replace, and remove headers.
  334. `JwtEncodingContext.getClaims()` provides access to the `JwtClaimsSet.Builder`, allowing the ability to add, replace, and remove claims.
  335. The following example shows how to implement an `OAuth2TokenCustomizer<JwtEncodingContext>` and configure it with a `JwtGenerator`:
  336. [source,java]
  337. ----
  338. @Bean
  339. public OAuth2TokenGenerator<?> tokenGenerator() {
  340. JwtEncoder jwtEncoder = ...
  341. JwtGenerator jwtGenerator = new JwtGenerator(jwtEncoder);
  342. jwtGenerator.setJwtCustomizer(jwtCustomizer());
  343. OAuth2AccessTokenGenerator accessTokenGenerator = new OAuth2AccessTokenGenerator();
  344. OAuth2RefreshTokenGenerator refreshTokenGenerator = new OAuth2RefreshTokenGenerator();
  345. return new DelegatingOAuth2TokenGenerator(
  346. jwtGenerator, accessTokenGenerator, refreshTokenGenerator);
  347. }
  348. @Bean
  349. public OAuth2TokenCustomizer<JwtEncodingContext> jwtCustomizer() {
  350. return context -> {
  351. JoseHeader.Builder headers = context.getHeaders();
  352. JwtClaimsSet.Builder claims = context.getClaims();
  353. if (context.getTokenType().equals(OAuth2TokenType.ACCESS_TOKEN)) {
  354. // Customize headers/claims for access_token
  355. } else if (context.getTokenType().getValue().equals(OidcParameterNames.ID_TOKEN)) {
  356. // Customize headers/claims for id_token
  357. }
  358. };
  359. }
  360. ----
  361. [TIP]
  362. If the `OAuth2TokenGenerator` is not provided as a `@Bean` or is not configured through the `OAuth2AuthorizationServerConfigurer`, an `OAuth2TokenCustomizer<JwtEncodingContext>` `@Bean` will automatically be configured with a `JwtGenerator`.