| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899 | 
[[kotlin-config]]= Kotlin ConfigurationSpring Security Kotlin Configuration support has been available since Spring Security 5.3.It enables users to easily configure Spring Security using a native Kotlin DSL.NOTE: Spring Security provides https://github.com/spring-projects/spring-security-samples/tree/main/servlet/spring-boot/kotlin/hello-security[a sample application] which demonstrates the use of Spring Security Kotlin Configuration.[[kotlin-config-httpsecurity]]== HttpSecurityHow does Spring Security know that we want to require all users to be authenticated?How does Spring Security know we want to support form based authentication?There is a configuration class that is being invoked behind the scenes called `WebSecurityConfigurerAdapter`.It has a method called `configure` with the following default implementation:[source,kotlin]----fun configure(http: HttpSecurity) {   http {        authorizeRequests {            authorize(anyRequest, authenticated)        }       formLogin { }       httpBasic { }    }}----The default configuration above:* Ensures that any request to our application requires the user to be authenticated* Allows users to authenticate with form based login* Allows users to authenticate with HTTP Basic authenticationYou will notice that this configuration is quite similar the XML Namespace configuration:[source,xml]----<http>	<intercept-url pattern="/**" access="authenticated"/>	<form-login />	<http-basic /></http>----== Multiple HttpSecurityWe can configure multiple HttpSecurity instances just as we can have multiple `<http>` blocks.The key is to extend the `WebSecurityConfigurerAdapter` multiple times.For example, the following is an example of having a different configuration for URL's that start with `/api/`.[source,kotlin]----@EnableWebSecurityclass MultiHttpSecurityConfig {    @Bean                                                            <1>    public fun userDetailsService(): UserDetailsService {        val users: User.UserBuilder = User.withDefaultPasswordEncoder()        val manager = InMemoryUserDetailsManager()        manager.createUser(users.username("user").password("password").roles("USER").build())        manager.createUser(users.username("admin").password("password").roles("USER","ADMIN").build())        return manager    }    @Configuration    @Order(1)                                                        <2>    class ApiWebSecurityConfigurationAdapter: WebSecurityConfigurerAdapter() {        override fun configure(http: HttpSecurity) {            http {                securityMatcher("/api/**")                           <3>                authorizeRequests {                    authorize(anyRequest, hasRole("ADMIN"))                }                httpBasic { }            }        }    }    @Configuration                                                   <4>    class FormLoginWebSecurityConfigurerAdapter: WebSecurityConfigurerAdapter() {        override fun configure(http: HttpSecurity) {            http {                authorizeRequests {                    authorize(anyRequest, authenticated)                }                formLogin { }            }        }    }}----<1> Configure Authentication as normal<2> Create an instance of `WebSecurityConfigurerAdapter` that contains `@Order` to specify which `WebSecurityConfigurerAdapter` should be considered first.<3> The `http.antMatcher` states that this `HttpSecurity` will only be applicable to URLs that start with `/api/`<4> Create another instance of `WebSecurityConfigurerAdapter`.If the URL does not start with `/api/` this configuration will be used.This configuration is considered after `ApiWebSecurityConfigurationAdapter` since it has an `@Order` value after `1` (no `@Order` defaults to last).
 |