123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899 |
- [[kotlin-config]]
- = Kotlin Configuration
- Spring Security Kotlin Configuration support has been available since Spring Security 5.3.
- It enables users to easily configure Spring Security using a native Kotlin DSL.
- NOTE: Spring Security provides https://github.com/spring-projects/spring-security-samples/tree/main/servlet/spring-boot/kotlin/hello-security[a sample application] which demonstrates the use of Spring Security Kotlin Configuration.
- [[kotlin-config-httpsecurity]]
- == HttpSecurity
- How does Spring Security know that we want to require all users to be authenticated?
- How does Spring Security know we want to support form based authentication?
- Actually, there is a bean that is being invoked behind the scenes called `SecurityFilterChain`.
- It is configured with the following default implementation:
- [source,kotlin]
- ----
- @Bean
- open fun filterChain(http: HttpSecurity): SecurityFilterChain {
- http {
- authorizeRequests {
- authorize(anyRequest, authenticated)
- }
- formLogin { }
- httpBasic { }
- }
- return http.build()
- }
- ----
- The default configuration above:
- * Ensures that any request to our application requires the user to be authenticated
- * Allows users to authenticate with form based login
- * Allows users to authenticate with HTTP Basic authentication
- You will notice that this configuration is quite similar the XML Namespace configuration:
- [source,xml]
- ----
- <http>
- <intercept-url pattern="/**" access="authenticated"/>
- <form-login />
- <http-basic />
- </http>
- ----
- == Multiple HttpSecurity
- We can configure multiple HttpSecurity instances just as we can have multiple `<http>` blocks.
- The key is to register multiple `SecurityFilterChain` `@Bean`s.
- For example, the following is an example of having a different configuration for URL's that start with `/api/`.
- [source,kotlin]
- ----
- @EnableWebSecurity
- class MultiHttpSecurityConfig {
- @Bean <1>
- public fun userDetailsService(): UserDetailsService {
- val users: User.UserBuilder = User.withDefaultPasswordEncoder()
- val manager = InMemoryUserDetailsManager()
- manager.createUser(users.username("user").password("password").roles("USER").build())
- manager.createUser(users.username("admin").password("password").roles("USER","ADMIN").build())
- return manager
- }
- @Order(1) <2>
- @Bean
- open fun apiFilterChain(http: HttpSecurity): SecurityFilterChain {
- http {
- securityMatcher("/api/**") <3>
- authorizeRequests {
- authorize(anyRequest, hasRole("ADMIN"))
- }
- httpBasic { }
- }
- return http.build()
- }
- @Bean <4>
- open fun formLoginFilterChain(http: HttpSecurity): SecurityFilterChain {
- http {
- authorizeRequests {
- authorize(anyRequest, authenticated)
- }
- formLogin { }
- }
- return http.build()
- }
- }
- ----
- <1> Configure Authentication as normal
- <2> Expose an instance of `SecurityFilterChain` that contains `@Order` to specify which `SecurityFilterChain` should be considered first.
- <3> The `http.antMatcher` states that this `HttpSecurity` will only be applicable to URLs that start with `/api/`
- <4> Expose another instance of `SecurityFilterChain`.
- If the URL does not start with `/api/` this configuration will be used.
- This configuration is considered after `apiFilterChain` since it has an `@Order` value after `1` (no `@Order` defaults to last).
|