123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119 |
- = OAuth 2.0 Migrations
- == Validate `typ` Header with `JwtTypeValidator`
- If when following the 6.5 preparatory steps you set `validateTypes` to `false`, you can now remove it.
- You can also remove explicitly adding `JwtTypeValidator` to the list of defaults.
- For example, change this:
- [tabs]
- ======
- Java::
- +
- [source,java,role="primary"]
- ----
- @Bean
- JwtDecoder jwtDecoder() {
- NimbusJwtDecoder jwtDecoder = NimbusJwtDecoder.withIssuerLocation(location)
- .validateTypes(false) <1>
- // ... your remaining configuration
- .build();
- jwtDecoder.setJwtValidator(JwtValidators.createDefaultWithValidators(
- new JwtIssuerValidator(location), JwtTypeValidator.jwt())); <2>
- return jwtDecoder;
- }
- ----
- Kotlin::
- +
- [source,kotlin,role="secondary"]
- ----
- @Bean
- fun jwtDecoder(): JwtDecoder {
- val jwtDecoder = NimbusJwtDecoder.withIssuerLocation(location)
- .validateTypes(false) <1>
- // ... your remaining configuration
- .build()
- jwtDecoder.setJwtValidator(JwtValidators.createDefaultWithValidators(
- JwtIssuerValidator(location), JwtTypeValidator.jwt())) <2>
- return jwtDecoder
- }
- ----
- ======
- <1> - Switch off Nimbus verifying the `typ`
- <2> - Add the default `typ` validator
- to this:
- [tabs]
- ======
- Java::
- +
- [source,java,role="primary"]
- ----
- @Bean
- JwtDecoder jwtDecoder() {
- NimbusJwtDecoder jwtDecoder = NimbusJwtDecoder.withIssuerLocation(location)
- // ... your remaining configuration <1>
- .build();
- jwtDecoder.setJwtValidator(JwtValidators.createDefaultWithIssuer(location)); <2>
- return jwtDecoder;
- }
- ----
- Kotlin::
- +
- [source,kotlin,role="secondary"]
- ----
- @Bean
- fun jwtDecoder(): JwtDecoder {
- val jwtDecoder = NimbusJwtDecoder.withIssuerLocation(location)
- // ... your remaining configuration
- .build()
- jwtDecoder.setJwtValidator(JwtValidators.createDefaultWithIssuer(location)) <2>
- return jwtDecoder
- }
- ----
- ======
- <1> - `validateTypes` now defaults to `false`
- <2> - `JwtTypeValidator#jwt` is added by all `createDefaultXXX` methods
- == Do Not Process `<saml2:Response>` GET Requests with `Saml2AuthenticationTokenConverter`
- Spring Security does not support processing `<saml2:Response>` payloads over GET as this is not supported by the SAML 2.0 spec.
- To better comply with this, `Saml2AuthenticationTokenConverter` will not process GET requests by default as of Spring Security 8.
- To prepare for this, the property `shouldConvertGetRequests` is available.
- To use it, publish your own `Saml2AuthenticationTokenConverter` like so:
- [tabs]
- ======
- Java::
- +
- [source,java,role="primary"]
- ----
- @Bean
- Saml2AuthenticationTokenConverter authenticationConverter(RelyingPartyRegistrationRepository registrations) {
- Saml2AuhenticationTokenConverter authenticationConverter = new Saml2AuthenticationTokenConverter(
- new DefaultRelyingPartyRegistrationResolver(registrations));
- authenticationConverter.setShouldConvertGetRequests(false);
- return authenticationConverter;
- }
- ----
- Kotlin::
- +
- [source,kotlin,role="secondary"]
- ----
- @Bean
- fun authenticationConverter(val registrations: RelyingPartyRegistrationRepository): Saml2AuthenticationTokenConverter {
- val authenticationConverter = new Saml2AuthenticationTokenConverter(
- DefaultRelyingPartyRegistrationResolver(registrations))
- authenticationConverter.setShouldConvertGetRequests(false)
- return authenticationConverter
- }
- ----
- ======
- If you must continue using `Saml2AuthenticationTokenConverter` to process GET requests, you can call `setShouldConvertGetRequests` to `true.`
|