how-to-multitenancy.adoc 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. [[how-to-multitenancy]]
  2. = How-to: Implement Multitenancy
  3. :index-link: ../how-to.html
  4. :docs-dir: ..
  5. This guide shows how to customize Spring Authorization Server to support multiple issuers per host in a multi-tenant hosting configuration.
  6. The purpose of this guide is to demonstrate a general pattern for building multi-tenant capable components for Spring Authorization Server, which can also be applied to other components to suit your needs.
  7. * xref:guides/how-to-multitenancy.adoc#multi-tenant-enable-multiple-issuers[Enable multiple issuers]
  8. * xref:guides/how-to-multitenancy.adoc#multi-tenant-define-tenant-identifier[Define the tenant identifier]
  9. * xref:guides/how-to-multitenancy.adoc#multi-tenant-create-component-registry[Create a component registry]
  10. * xref:guides/how-to-multitenancy.adoc#multi-tenant-create-components[Create multi-tenant components]
  11. * xref:guides/how-to-multitenancy.adoc#multi-tenant-add-tenants-dynamically[Add tenants dynamically]
  12. [[multi-tenant-enable-multiple-issuers]]
  13. == Enable multiple issuers
  14. Support for using multiple issuers per host is disabled by default.
  15. To enable, add the following configuration:
  16. .AuthorizationServerSettingsConfig
  17. [source,java]
  18. ----
  19. include::{examples-dir}/main/java/sample/multitenancy/AuthorizationServerSettingsConfig.java[]
  20. ----
  21. <1> Set to `true` to allow usage of multiple issuers per host.
  22. WARNING: Do not allow for any arbitrary issuer to be used. An allowlist of approved issuers should be enforced.
  23. [[multi-tenant-define-tenant-identifier]]
  24. == Define the tenant identifier
  25. The xref:protocol-endpoints.adoc#oidc-provider-configuration-endpoint[OpenID Connect 1.0 Provider Configuration Endpoint] and xref:protocol-endpoints.adoc#oauth2-authorization-server-metadata-endpoint[OAuth2 Authorization Server Metadata Endpoint] allow for path components in the issuer identifier value, which effectively enables supporting multiple issuers per host.
  26. For example, an https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationRequest[OpenID Provider Configuration Request] "http://localhost:9000/issuer1/.well-known/openid-configuration" or an https://datatracker.ietf.org/doc/html/rfc8414#section-3.1[Authorization Server Metadata Request] "http://localhost:9000/.well-known/oauth-authorization-server/issuer1" would return the following configuration metadata:
  27. [source,json]
  28. ----
  29. {
  30. "issuer": "http://localhost:9000/issuer1",
  31. "authorization_endpoint": "http://localhost:9000/issuer1/oauth2/authorize",
  32. "token_endpoint": "http://localhost:9000/issuer1/oauth2/token",
  33. "jwks_uri": "http://localhost:9000/issuer1/oauth2/jwks",
  34. "revocation_endpoint": "http://localhost:9000/issuer1/oauth2/revoke",
  35. "introspection_endpoint": "http://localhost:9000/issuer1/oauth2/introspect",
  36. ...
  37. }
  38. ----
  39. NOTE: The base URL of the xref:protocol-endpoints.adoc[Protocol Endpoints] is the issuer identifier value.
  40. Essentially, an issuer identifier with a path component represents the _"tenant identifier"_.
  41. [[multi-tenant-create-component-registry]]
  42. == Create a component registry
  43. We start by building a simple registry for managing the concrete components for each tenant.
  44. The registry contains the logic for retrieving a concrete implementation of a particular class using the issuer identifier value.
  45. We will use the following class in each of the delegating implementations below:
  46. .TenantPerIssuerComponentRegistry
  47. [source,java]
  48. ----
  49. include::{examples-dir}/main/java/sample/multitenancy/TenantPerIssuerComponentRegistry.java[]
  50. ----
  51. TIP: This registry is designed to allow components to be easily registered at startup to support adding tenants statically, but also supports xref:guides/how-to-multitenancy.adoc#multi-tenant-add-tenants-dynamically[adding tenants dynamically] at runtime.
  52. [[multi-tenant-create-components]]
  53. == Create multi-tenant components
  54. The components that require multi-tenant capability are:
  55. * xref:guides/how-to-multitenancy.adoc#multi-tenant-registered-client-repository[`RegisteredClientRepository`]
  56. * xref:guides/how-to-multitenancy.adoc#multi-tenant-oauth2-authorization-service[`OAuth2AuthorizationService`]
  57. * xref:guides/how-to-multitenancy.adoc#multi-tenant-oauth2-authorization-consent-service[`OAuth2AuthorizationConsentService`]
  58. * xref:guides/how-to-multitenancy.adoc#multi-tenant-jwk-source[`JWKSource<SecurityContext>`]
  59. For each of these components, an implementation of a composite can be provided that delegates to the concrete component associated to the _"requested"_ issuer identifier.
  60. Let's step through a scenario of how to customize Spring Authorization Server to support 2x tenants for each multi-tenant capable component.
  61. [[multi-tenant-registered-client-repository]]
  62. === Multi-tenant RegisteredClientRepository
  63. The following example shows a sample implementation of a xref:core-model-components.adoc#registered-client-repository[`RegisteredClientRepository`] that is composed of 2x `JdbcRegisteredClientRepository` instances, where each instance is mapped to an issuer identifier:
  64. .RegisteredClientRepositoryConfig
  65. [source,java]
  66. ----
  67. include::{examples-dir}/main/java/sample/multitenancy/RegisteredClientRepositoryConfig.java[]
  68. ----
  69. TIP: Click on the "Expand folded text" icon in the code sample above to display the full example.
  70. <1> A `JdbcRegisteredClientRepository` instance mapped to issuer identifier `issuer1` and using a dedicated `DataSource`.
  71. <2> A `JdbcRegisteredClientRepository` instance mapped to issuer identifier `issuer2` and using a dedicated `DataSource`.
  72. <3> A composite implementation of a `RegisteredClientRepository` that delegates to a `JdbcRegisteredClientRepository` mapped to the _"requested"_ issuer identifier.
  73. <4> Obtain the `JdbcRegisteredClientRepository` that is mapped to the _"requested"_ issuer identifier indicated by `AuthorizationServerContext.getIssuer()`.
  74. IMPORTANT: Explicitly configuring the issuer identifier via `AuthorizationServerSettings.builder().issuer("http://localhost:9000")` forces to a single-tenant configuration. Avoid explicitly configuring the issuer identifier when using a multi-tenant hosting configuration.
  75. In the preceding example, each of the `JdbcRegisteredClientRepository` instances are configured with a `JdbcTemplate` and associated `DataSource`.
  76. This is important in a multi-tenant configuration as a primary requirement is to have the ability to isolate the data from each tenant.
  77. Configuring a dedicated `DataSource` for each component instance provides the flexibility to isolate the data in its own schema within the same database instance or alternatively isolate the data in a separate database instance altogether.
  78. The following example shows a sample configuration of 2x `DataSource` `@Bean` (one for each tenant) that are used by the multi-tenant capable components:
  79. .DataSourceConfig
  80. [source,java]
  81. ----
  82. include::{examples-dir}/main/java/sample/multitenancy/DataSourceConfig.java[]
  83. ----
  84. <1> Use a separate H2 database instance using `issuer1-db` as the name.
  85. <2> Use a separate H2 database instance using `issuer2-db` as the name.
  86. [[multi-tenant-oauth2-authorization-service]]
  87. === Multi-tenant OAuth2AuthorizationService
  88. The following example shows a sample implementation of an xref:core-model-components.adoc#oauth2-authorization-service[`OAuth2AuthorizationService`] that is composed of 2x `JdbcOAuth2AuthorizationService` instances, where each instance is mapped to an issuer identifier:
  89. .OAuth2AuthorizationServiceConfig
  90. [source,java]
  91. ----
  92. include::{examples-dir}/main/java/sample/multitenancy/OAuth2AuthorizationServiceConfig.java[]
  93. ----
  94. <1> A `JdbcOAuth2AuthorizationService` instance mapped to issuer identifier `issuer1` and using a dedicated `DataSource`.
  95. <2> A `JdbcOAuth2AuthorizationService` instance mapped to issuer identifier `issuer2` and using a dedicated `DataSource`.
  96. <3> A composite implementation of an `OAuth2AuthorizationService` that delegates to a `JdbcOAuth2AuthorizationService` mapped to the _"requested"_ issuer identifier.
  97. <4> Obtain the `JdbcOAuth2AuthorizationService` that is mapped to the _"requested"_ issuer identifier indicated by `AuthorizationServerContext.getIssuer()`.
  98. [[multi-tenant-oauth2-authorization-consent-service]]
  99. === Multi-tenant OAuth2AuthorizationConsentService
  100. The following example shows a sample implementation of an xref:core-model-components.adoc#oauth2-authorization-consent-service[`OAuth2AuthorizationConsentService`] that is composed of 2x `JdbcOAuth2AuthorizationConsentService` instances, where each instance is mapped to an issuer identifier:
  101. .OAuth2AuthorizationConsentServiceConfig
  102. [source,java]
  103. ----
  104. include::{examples-dir}/main/java/sample/multitenancy/OAuth2AuthorizationConsentServiceConfig.java[]
  105. ----
  106. <1> A `JdbcOAuth2AuthorizationConsentService` instance mapped to issuer identifier `issuer1` and using a dedicated `DataSource`.
  107. <2> A `JdbcOAuth2AuthorizationConsentService` instance mapped to issuer identifier `issuer2` and using a dedicated `DataSource`.
  108. <3> A composite implementation of an `OAuth2AuthorizationConsentService` that delegates to a `JdbcOAuth2AuthorizationConsentService` mapped to the _"requested"_ issuer identifier.
  109. <4> Obtain the `JdbcOAuth2AuthorizationConsentService` that is mapped to the _"requested"_ issuer identifier indicated by `AuthorizationServerContext.getIssuer()`.
  110. [[multi-tenant-jwk-source]]
  111. === Multi-tenant JWKSource
  112. And finally, the following example shows a sample implementation of a `JWKSource<SecurityContext>` that is composed of 2x `JWKSet` instances, where each instance is mapped to an issuer identifier:
  113. .JWKSourceConfig
  114. [source,java]
  115. ----
  116. include::{examples-dir}/main/java/sample/multitenancy/JWKSourceConfig.java[]
  117. ----
  118. <1> A `JWKSet` instance mapped to issuer identifier `issuer1`.
  119. <2> A `JWKSet` instance mapped to issuer identifier `issuer2`.
  120. <3> A composite implementation of an `JWKSource<SecurityContext>` that uses the `JWKSet` mapped to the _"requested"_ issuer identifier.
  121. <4> Obtain the `JWKSet` that is mapped to the _"requested"_ issuer identifier indicated by `AuthorizationServerContext.getIssuer()`.
  122. [[multi-tenant-add-tenants-dynamically]]
  123. == Add Tenants Dynamically
  124. If the number of tenants is dynamic and can change at runtime, defining each `DataSource` as a `@Bean` may not be feasible.
  125. In this case, the `DataSource` and corresponding components can be registered through other means at application startup and/or runtime.
  126. The following example shows a Spring `@Service` capable of adding tenants dynamically:
  127. .TenantService
  128. [source,java]
  129. ----
  130. include::{examples-dir}/main/java/sample/multitenancy/TenantService.java[]
  131. ----