| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319 | 
							- [[oauth2-client-authentication]]
 
- = [[oauth2Client-client-auth-support]]Client Authentication Support
 
- [[oauth2-client-authentication-client-credentials]]
 
- == [[oauth2Client-client-credentials-auth]]Client Credentials
 
- [[oauth2-client-authentication-client-credentials-client-secret-basic]]
 
- === Authenticate using `client_secret_basic`
 
- Client Authentication with HTTP Basic is supported out of the box and no customization is necessary to enable it.
 
- The default implementation is provided by `DefaultOAuth2TokenRequestHeadersConverter`.
 
- Given the following Spring Boot properties for an OAuth 2.0 client registration:
 
- [source,yaml]
 
- ----
 
- spring:
 
-   security:
 
-     oauth2:
 
-       client:
 
-         registration:
 
-           okta:
 
-             client-id: client-id
 
-             client-secret: client-secret
 
-             client-authentication-method: client_secret_basic
 
-             authorization-grant-type: authorization_code
 
-             ...
 
- ----
 
- The following example shows how to configure `DefaultAuthorizationCodeTokenResponseClient` to disable URL encoding of the client credentials:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- DefaultOAuth2TokenRequestHeadersConverter<OAuth2AuthorizationCodeGrantRequest> headersConverter =
 
- 		new DefaultOAuth2TokenRequestHeadersConverter<>();
 
- headersConverter.setEncodeClientCredentials(false);
 
- OAuth2AuthorizationCodeGrantRequestEntityConverter requestEntityConverter =
 
- 		new OAuth2AuthorizationCodeGrantRequestEntityConverter();
 
- requestEntityConverter.setHeadersConverter(headersConverter);
 
- DefaultAuthorizationCodeTokenResponseClient tokenResponseClient =
 
- 		new DefaultAuthorizationCodeTokenResponseClient();
 
- tokenResponseClient.setRequestEntityConverter(requestEntityConverter);
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val headersConverter = DefaultOAuth2TokenRequestHeadersConverter<OAuth2AuthorizationCodeGrantRequest>()
 
- headersConverter.setEncodeClientCredentials(false)
 
- val requestEntityConverter = OAuth2AuthorizationCodeGrantRequestEntityConverter()
 
- requestEntityConverter.setHeadersConverter(headersConverter)
 
- val tokenResponseClient = DefaultAuthorizationCodeTokenResponseClient()
 
- tokenResponseClient.setRequestEntityConverter(requestEntityConverter)
 
- ----
 
- ======
 
- [[oauth2-client-authentication-client-credentials-client-secret-post]]
 
- === Authenticate using `client_secret_post`
 
- Client Authentication with client credentials included in the request-body is supported out of the box and no customization is necessary to enable it.
 
- The following Spring Boot properties for an OAuth 2.0 client registration demonstrate the configuration:
 
- [source,yaml]
 
- ----
 
- spring:
 
-   security:
 
-     oauth2:
 
-       client:
 
-         registration:
 
-           okta:
 
-             client-id: client-id
 
-             client-secret: client-secret
 
-             client-authentication-method: client_secret_post
 
-             authorization-grant-type: authorization_code
 
-             ...
 
- ----
 
- [[oauth2-client-authentication-jwt-bearer]]
 
- == [[oauth2Client-jwt-bearer-auth]]JWT Bearer
 
- [NOTE]
 
- ====
 
- Please refer to JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants for further details on https://datatracker.ietf.org/doc/html/rfc7523#section-2.2[JWT Bearer] Client Authentication.
 
- ====
 
- The default implementation for JWT Bearer Client Authentication is `NimbusJwtClientAuthenticationParametersConverter`,
 
- which is a `Converter` that customizes the Token Request parameters by adding
 
- a signed JSON Web Token (JWS) in the `client_assertion` parameter.
 
- The `java.security.PrivateKey` or `javax.crypto.SecretKey` used for signing the JWS
 
- is supplied by the `com.nimbusds.jose.jwk.JWK` resolver associated with `NimbusJwtClientAuthenticationParametersConverter`.
 
- [[oauth2-client-authentication-jwt-bearer-private-key-jwt]]
 
- === Authenticate using `private_key_jwt`
 
- Given the following Spring Boot properties for an OAuth 2.0 Client registration:
 
- [source,yaml]
 
- ----
 
- spring:
 
-   security:
 
-     oauth2:
 
-       client:
 
-         registration:
 
-           okta:
 
-             client-id: okta-client-id
 
-             client-authentication-method: private_key_jwt
 
-             authorization-grant-type: authorization_code
 
-             ...
 
- ----
 
- The following example shows how to configure `DefaultAuthorizationCodeTokenResponseClient`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- Function<ClientRegistration, JWK> jwkResolver = (clientRegistration) -> {
 
- 	if (clientRegistration.getClientAuthenticationMethod().equals(ClientAuthenticationMethod.PRIVATE_KEY_JWT)) {
 
- 		// Assuming RSA key type
 
- 		RSAPublicKey publicKey = ...
 
- 		RSAPrivateKey privateKey = ...
 
- 		return new RSAKey.Builder(publicKey)
 
- 				.privateKey(privateKey)
 
- 				.keyID(UUID.randomUUID().toString())
 
- 				.build();
 
- 	}
 
- 	return null;
 
- };
 
- OAuth2AuthorizationCodeGrantRequestEntityConverter requestEntityConverter =
 
- 		new OAuth2AuthorizationCodeGrantRequestEntityConverter();
 
- requestEntityConverter.addParametersConverter(
 
- 		new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver));
 
- DefaultAuthorizationCodeTokenResponseClient tokenResponseClient =
 
- 		new DefaultAuthorizationCodeTokenResponseClient();
 
- tokenResponseClient.setRequestEntityConverter(requestEntityConverter);
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val jwkResolver: Function<ClientRegistration, JWK> =
 
-     Function<ClientRegistration, JWK> { clientRegistration ->
 
-         if (clientRegistration.clientAuthenticationMethod.equals(ClientAuthenticationMethod.PRIVATE_KEY_JWT)) {
 
-             // Assuming RSA key type
 
-             var publicKey: RSAPublicKey
 
-             var privateKey: RSAPrivateKey
 
-             RSAKey.Builder(publicKey) = //...
 
-                 .privateKey(privateKey) = //...
 
-                 .keyID(UUID.randomUUID().toString())
 
-                 .build()
 
-         }
 
-         null
 
-     }
 
- val requestEntityConverter = OAuth2AuthorizationCodeGrantRequestEntityConverter()
 
- requestEntityConverter.addParametersConverter(
 
-     NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
 
- )
 
- val tokenResponseClient = DefaultAuthorizationCodeTokenResponseClient()
 
- tokenResponseClient.setRequestEntityConverter(requestEntityConverter)
 
- ----
 
- ======
 
- [[oauth2-client-authentication-jwt-bearer-client-secret-jwt]]
 
- === Authenticate using `client_secret_jwt`
 
- Given the following Spring Boot properties for an OAuth 2.0 Client registration:
 
- [source,yaml]
 
- ----
 
- spring:
 
-   security:
 
-     oauth2:
 
-       client:
 
-         registration:
 
-           okta:
 
-             client-id: okta-client-id
 
-             client-secret: okta-client-secret
 
-             client-authentication-method: client_secret_jwt
 
-             authorization-grant-type: client_credentials
 
-             ...
 
- ----
 
- The following example shows how to configure `DefaultClientCredentialsTokenResponseClient`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- Function<ClientRegistration, JWK> jwkResolver = (clientRegistration) -> {
 
- 	if (clientRegistration.getClientAuthenticationMethod().equals(ClientAuthenticationMethod.CLIENT_SECRET_JWT)) {
 
- 		SecretKeySpec secretKey = new SecretKeySpec(
 
- 				clientRegistration.getClientSecret().getBytes(StandardCharsets.UTF_8),
 
- 				"HmacSHA256");
 
- 		return new OctetSequenceKey.Builder(secretKey)
 
- 				.keyID(UUID.randomUUID().toString())
 
- 				.build();
 
- 	}
 
- 	return null;
 
- };
 
- OAuth2ClientCredentialsGrantRequestEntityConverter requestEntityConverter =
 
- 		new OAuth2ClientCredentialsGrantRequestEntityConverter();
 
- requestEntityConverter.addParametersConverter(
 
- 		new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver));
 
- DefaultClientCredentialsTokenResponseClient tokenResponseClient =
 
- 		new DefaultClientCredentialsTokenResponseClient();
 
- tokenResponseClient.setRequestEntityConverter(requestEntityConverter);
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val jwkResolver = Function<ClientRegistration, JWK?> { clientRegistration: ClientRegistration ->
 
-     if (clientRegistration.clientAuthenticationMethod == ClientAuthenticationMethod.CLIENT_SECRET_JWT) {
 
-         val secretKey = SecretKeySpec(
 
-             clientRegistration.clientSecret.toByteArray(StandardCharsets.UTF_8),
 
-             "HmacSHA256"
 
-         )
 
-         OctetSequenceKey.Builder(secretKey)
 
-             .keyID(UUID.randomUUID().toString())
 
-             .build()
 
-     }
 
-     null
 
- }
 
- val requestEntityConverter = OAuth2ClientCredentialsGrantRequestEntityConverter()
 
- requestEntityConverter.addParametersConverter(
 
-     NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
 
- )
 
- val tokenResponseClient = DefaultClientCredentialsTokenResponseClient()
 
- tokenResponseClient.setRequestEntityConverter(requestEntityConverter)
 
- ----
 
- ======
 
- [[oauth2-client-authentication-jwt-bearer-assertion]]
 
- === Customizing the JWT assertion
 
- The JWT produced by `NimbusJwtClientAuthenticationParametersConverter` contains the `iss`, `sub`, `aud`, `jti`, `iat` and `exp` claims by default. You can customize the headers and/or claims by providing a `Consumer<NimbusJwtClientAuthenticationParametersConverter.JwtClientAuthenticationContext<T>>` to `setJwtClientAssertionCustomizer()`. The following example shows how to customize claims of the JWT:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- Function<ClientRegistration, JWK> jwkResolver = ...
 
- NimbusJwtClientAuthenticationParametersConverter<OAuth2ClientCredentialsGrantRequest> converter =
 
- 		new NimbusJwtClientAuthenticationParametersConverter<>(jwkResolver);
 
- converter.setJwtClientAssertionCustomizer((context) -> {
 
- 	context.getHeaders().header("custom-header", "header-value");
 
- 	context.getClaims().claim("custom-claim", "claim-value");
 
- });
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val jwkResolver = ...
 
- val converter: NimbusJwtClientAuthenticationParametersConverter<OAuth2ClientCredentialsGrantRequest> =
 
-     NimbusJwtClientAuthenticationParametersConverter(jwkResolver)
 
- converter.setJwtClientAssertionCustomizer { context ->
 
-     context.headers.header("custom-header", "header-value")
 
-     context.claims.claim("custom-claim", "claim-value")
 
- }
 
- ----
 
- ======
 
- [[oauth2-client-authentication-public]]
 
- == [[oauth2Client-public-auth]]Public Authentication
 
- Public Client Authentication is supported out of the box and no customization is necessary to enable it.
 
- The following Spring Boot properties for an OAuth 2.0 client registration demonstrate the configuration:
 
- [source,yaml]
 
- ----
 
- spring:
 
-   security:
 
-     oauth2:
 
-       client:
 
-         registration:
 
-           okta:
 
-             client-id: client-id
 
-             client-authentication-method: none
 
-             authorization-grant-type: authorization_code
 
-             ...
 
- ----
 
- [NOTE]
 
- ====
 
- Public Clients are supported using https://tools.ietf.org/html/rfc7636[Proof Key for Code Exchange] (PKCE).
 
- PKCE will automatically be used when `client-authentication-method` is set to "none" (`ClientAuthenticationMethod.NONE`).
 
- ====
 
 
  |