Browse Source

Add documentation on Reactive x509 security

[gh #5038]
Alexey Nesterov 6 năm trước cách đây
mục cha
commit
0aa4805be8

+ 2 - 0
docs/manual/src/docs/asciidoc/_includes/reactive/index.adoc

@@ -10,6 +10,8 @@ include::oauth2/index.adoc[leveloffset=+1]
 
 include::registered-oauth2-authorized-client.adoc[leveloffset=+1]
 
+include::x509.adoc[leveloffset=+1]
+
 include::webclient.adoc[leveloffset=+1]
 
 include::method.adoc[leveloffset=+1]

+ 55 - 0
docs/manual/src/docs/asciidoc/_includes/reactive/x509.adoc

@@ -0,0 +1,55 @@
+[[reactive-x509]]
+= Reactive X.509 Authentication
+
+Similar to <<x509,Servlet X.509 authentication>>, reactive x509 authentication filter allows extracting an authentication token from a certificate provided by a client.
+
+Below is an example of a reactive x509 security configuration:
+[source,java]
+----
+@Bean
+public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
+    http
+        .x509()
+        .and()
+        .authorizeExchange()
+            .anyExchange().permitAll();
+
+    return http.build();
+}
+----
+
+In the configuration above, when neither `principalExtractor` nor `authenticationManager` is provided defaults will be used. The default principal extractor is `SubjectDnX509PrincipalExtractor` which extracts the CN (common name) field from a certificate provided by a client. The default authentication manager is `ReactivePreAuthenticatedAuthenticationManager` which performs user account validation, checking that user account with a name extracted by `principalExtractor` exists and it is not locked, disabled, or expired.
+
+The next example demonstrates how these defaults can be overridden.
+
+[source,java]
+----
+@Bean
+public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
+    SubjectDnX509PrincipalExtractor principalExtractor =
+            new SubjectDnX509PrincipalExtractor();
+
+    principalExtractor.setSubjectDnRegex("OU=(.*?)(?:,|$)");
+
+    ReactiveAuthenticationManager authenticationManager = authentication -> {
+        authentication.setAuthenticated("Trusted Org Unit".equals(authentication.getName()));
+        return Mono.just(authentication);
+    };
+
+    // @formatter:off
+    http
+        .x509()
+            .principalExtractor(principalExtractor)
+            .authenticationManager(authenticationManager)
+        .and()
+            .authorizeExchange()
+            .anyExchange().authenticated();
+    // @formatter:on
+
+    return http.build();
+}
+----
+
+In this example, a username is extracted from the OU field of a client certificate instead of CN, and account lookup using `ReactiveUserDetailsService` is not performed at all. Instead, if the provided certificate issued to an OU named "Trusted Org Unit", a request will be authenticated.
+
+For an example of configuring Netty and `WebClient` or `curl` command-line tool to use mutual TLS and enable X.509 authentication, please refer to https://github.com/spring-projects/spring-security/tree/master/samples/boot/webflux-x509.