[[oauth2AuthorizationServer-getting-started]] = Getting Started If you are just getting started with Spring Security Authorization Server, the following sections walk you through creating your first application. [[oauth2AuthorizationServer-system-requirements]] == System Requirements Spring Security Authorization Server requires a Java 17 or higher Runtime Environment. [[oauth2AuthorizationServer-installing-spring-security-authorization-server]] == Installing Spring Security Authorization Server The easiest way to begin using Spring Security Authorization Server is by creating a https://spring.io/projects/spring-boot[Spring Boot]-based application. You can use https://start.spring.io[start.spring.io] to generate a basic project or use the https://github.com/spring-projects/spring-authorization-server/tree/main/samples/default-authorizationserver[default authorization server sample] as a guide. Then add Spring Boot's starter for Spring Security Authorization Server as a dependency: [tabs] ====== Maven:: + [[oauth2AuthorizationServer-spring-boot-maven-dependency]] [source,xml,role="primary",subs="attributes,verbatim"] ---- org.springframework.boot spring-boot-starter-oauth2-authorization-server ---- Gradle:: + [[oauth2AuthorizationServer-spring-boot-gradle-dependency]] [source,gradle,role="secondary",subs="attributes,verbatim"] ---- implementation "org.springframework.boot:spring-boot-starter-oauth2-authorization-server" ---- ====== TIP: See https://docs.spring.io/spring-boot/docs/current/reference/html/getting-started.html#getting-started.installing[Installing Spring Boot] for more information on using Spring Boot with Maven or Gradle. Alternatively, you can add Spring Security Authorization Server without Spring Boot using the following example: [tabs] ====== Maven:: + [[oauth2AuthorizationServer-maven-dependency]] [source,xml,role="primary",subs="attributes,verbatim"] ---- org.springframework.security spring-security-oauth2-authorization-server {spring-security-version} ---- Gradle:: + [[oauth2AuthorizationServer-gradle-dependency]] [source,gradle,role="secondary",subs="attributes,verbatim"] ---- implementation "org.springframework.security:spring-security-oauth2-authorization-server:{spring-security-version}" ---- ====== [[oauth2AuthorizationServer-developing-your-first-application]] == Developing Your First Application To get started, you need the minimum required components defined as a `@Bean`. When using the `spring-boot-starter-oauth2-authorization-server` dependency, define the following properties and Spring Boot will provide the necessary `@Bean` definitions for you: [[oauth2AuthorizationServer-application-yml]] .application.yml [source,yaml] ---- server: port: 9000 logging: level: org.springframework.security: trace spring: security: user: name: user password: password oauth2: authorizationserver: client: oidc-client: registration: client-id: "oidc-client" client-secret: "{noop}secret" client-authentication-methods: - "client_secret_basic" authorization-grant-types: - "authorization_code" - "refresh_token" redirect-uris: - "http://127.0.0.1:8080/login/oauth2/code/oidc-client" post-logout-redirect-uris: - "http://127.0.0.1:8080/" scopes: - "openid" - "profile" require-authorization-consent: true ---- TIP: Beyond the Getting Started experience, most users will want to customize the default configuration. The xref:servlet/oauth2/authorization-server/getting-started.adoc#oauth2AuthorizationServer-defining-required-components[next section] demonstrates providing all of the necessary beans yourself. [[oauth2AuthorizationServer-defining-required-components]] == Defining Required Components If you want to customize the default configuration (regardless of whether you're using Spring Boot), you can define the minimum required components as a `@Bean` in a Spring `@Configuration`. These components can be defined as follows: [[oauth2AuthorizationServer-sample-gettingstarted]] .SecurityConfig.java [source,java] ---- @Configuration @EnableWebSecurity public class SecurityConfig { @Bean // <1> @Order(1) public SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) throws Exception { // @formatter:off http .oauth2AuthorizationServer((authorizationServer) -> authorizationServer .oidc(Customizer.withDefaults()) // Enable OpenID Connect 1.0 ) .authorizeHttpRequests((authorize) -> authorize .anyRequest().authenticated() ) // Redirect to the login page when not authenticated from the // authorization endpoint .exceptionHandling((exceptions) -> exceptions .defaultAuthenticationEntryPointFor( new LoginUrlAuthenticationEntryPoint("/login"), new MediaTypeRequestMatcher(MediaType.TEXT_HTML) ) ); // @formatter:on return http.build(); } @Bean // <2> @Order(2) public SecurityFilterChain defaultSecurityFilterChain(HttpSecurity http) throws Exception { // @formatter:off http .authorizeHttpRequests((authorize) -> authorize .anyRequest().authenticated() ) // Form login handles the redirect to the login page from the // authorization server filter chain .formLogin(Customizer.withDefaults()); // @formatter:on return http.build(); } @Bean // <3> public UserDetailsService userDetailsService() { // @formatter:off UserDetails userDetails = User.withDefaultPasswordEncoder() .username("user") .password("password") .roles("USER") .build(); // @formatter:on return new InMemoryUserDetailsManager(userDetails); } @Bean // <4> public RegisteredClientRepository registeredClientRepository() { // @formatter:off RegisteredClient oidcClient = RegisteredClient.withId(UUID.randomUUID().toString()) .clientId("oidc-client") .clientSecret("{noop}secret") .clientAuthenticationMethod(ClientAuthenticationMethod.CLIENT_SECRET_BASIC) .authorizationGrantType(AuthorizationGrantType.AUTHORIZATION_CODE) .authorizationGrantType(AuthorizationGrantType.REFRESH_TOKEN) .redirectUri("http://127.0.0.1:8080/login/oauth2/code/oidc-client") .postLogoutRedirectUri("http://127.0.0.1:8080/") .scope(OidcScopes.OPENID) .scope(OidcScopes.PROFILE) .clientSettings(ClientSettings.builder().requireAuthorizationConsent(true).build()) .build(); // @formatter:on return new InMemoryRegisteredClientRepository(oidcClient); } @Bean // <5> public JWKSource jwkSource() { KeyPair keyPair = generateRsaKey(); RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic(); RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate(); // @formatter:off RSAKey rsaKey = new RSAKey.Builder(publicKey) .privateKey(privateKey) .keyID(UUID.randomUUID().toString()) .build(); // @formatter:on JWKSet jwkSet = new JWKSet(rsaKey); return new ImmutableJWKSet<>(jwkSet); } private static KeyPair generateRsaKey() { // <6> KeyPair keyPair; try { KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA"); keyPairGenerator.initialize(2048); keyPair = keyPairGenerator.generateKeyPair(); } catch (Exception ex) { throw new IllegalStateException(ex); } return keyPair; } @Bean // <7> public JwtDecoder jwtDecoder(JWKSource jwkSource) { return OAuth2AuthorizationServerConfiguration.jwtDecoder(jwkSource); } @Bean // <8> public AuthorizationServerSettings authorizationServerSettings() { return AuthorizationServerSettings.builder().build(); } } ---- This is a minimal configuration for getting started quickly. To understand what each component is used for, see the following descriptions: <1> A Spring Security filter chain for the xref:servlet/oauth2/authorization-server/protocol-endpoints.adoc[Protocol Endpoints]. <2> A Spring Security filter chain for xref:servlet/authentication/index.adoc#servlet-authentication[authentication]. <3> An instance of {security-api-url}/org/springframework/security/core/userdetails/UserDetailsService.html[`UserDetailsService`] for retrieving users to authenticate. <4> An instance of xref:servlet/oauth2/authorization-server/core-model-components.adoc#oauth2AuthorizationServer-registered-client-repository[`RegisteredClientRepository`] for managing clients. <5> An instance of `com.nimbusds.jose.jwk.source.JWKSource` for signing access tokens. <6> An instance of `java.security.KeyPair` with keys generated on startup used to create the `JWKSource` above. <7> An instance of {security-api-url}/org/springframework/security/oauth2/jwt/JwtDecoder.html[`JwtDecoder`] for decoding signed access tokens. <8> An instance of xref:servlet/oauth2/authorization-server/configuration-model.adoc#oauth2AuthorizationServer-configuring-authorization-server-settings[`AuthorizationServerSettings`] to configure Spring Security Authorization Server.