项目作者: karthikeyan-ng

项目描述 :
This repository contains various Spring Boot + Security related concepts and techniques.
高级语言: Java
项目地址: git://github.com/karthikeyan-ng/learn-and-apply-spring-security.git


LearnSpringSecurity

This repository contains various Spring Boot + Security related concepts and techniques.

  1. basic-spring-security - you will learn

    1. How to add spring security dependency?
    2. How to use Spring default password?
    3. How to override the default username and password?
  2. basic-spring-security - you will learn

    1. How to use InMemoryUserDetailsManager to store your username and password in order to anthenticate the given user.
  3. basic-spring-security - you will learn

    1. How to use MySQL database to validate username and password (plain text) using NoOpPasswordEncoder.
    2. How to use MySQL database to validate username and password (bcrypt encoder) using BCryptPasswordEncoder
    3. How to use DaoAuthenticationProvider and UserDetailsService
  4. basic-spring-security - you will learn

    1. How to customize Spring security to use your own Login Form implementation to validate the given username and password instead spring provided default implementation.
  5. basic-spring-security - you will learn

    1. How to use Spring Boot + Security + OAuth2 token to validate the user account using Google API SSO.

Spring Boot Security

Authentication

  1. - HTTP Authentication
  2. - Forms Authentication
  3. - Certificate
  4. - Tokens (JWT)

Authorization
Privileges / Authorities
Roles

  • In Spring Security, granted authorities and roles are a form of expressing a privilege/permission for an authenticated user

  • We express them using plain names

    • Granted Authorities - Roles
      (Small action based) (Larger scope)
      READ_PROFILE ROLE_ADMIN
      EDIT_PROFILE ROLE_USER
      DELETE_PROFILE ROLE_SALES
      ACCESS_PUBLIC_API ROLE_MANAGEMENT

HTTP Basic Authentication

  1. In the context of HTTP, basic authentication is the process for browser to request a username and password when making a request in order to authentify the user
  2. Client/
  3. Browser ----------- Get /home --------------------------> Server
  4. 401 Unauthorized
  5. WWW-Authenticate: Basic realm="localhost"
  6. <------------------------------------------------ ==> this step it will show a popup dialog to enter username and password
  7. Authorization: Basic sgsgasgasgaswtrw25252141=
  8. ----------- Get /home -------------------------->
  9. <------------200 OK-------------------------------
  10. return some resource from server
  11. Encoding of username and password
  12. username: karthi
  13. password: testing
  14. - Name and Password are combined (Ex: karthi:testing)
  15. - Browser will encode this to Base64 format (Ex: Ssgsgsoj252522sgsS)
  16. - Transmit in HTTP header (Ex: Authorization:Basic Ssgsgsoj252522sgsS)
  17. Stuff you need to know about Basic Authentication
  18. - It is very simple. It doesn't require cookie, session identifiers, or login page
  19. - Transmitted credentials are not encrypted. They are encoded with Base64 in transit, but not encrypted or hashed in any way.
  20. - Basic Authentication is typically used in conjunction with HTTPS to provide confidentiallity.
  21. - In this case, user can't grab the given username and password. Becuase, it uses HTTPS layer.
  22. - HTTP does not provide a method for a web server to instruct the client to "log out"
  23. - This authentication mechanism is not handled by your app, but the browser
  24. - Simpler definition:
  25. - HTTP Basic is the simplest form of authentication. In conjunction with SSL, it is considered the bare minimum for protecting non-sensitive resources.
  26. - Otherwise, go with a more secure solution.

Form Based Authentication

  1. It is the process of authenticating a user by presenting a custom HTML page that will collect credentials and by directing the authentication responsibility to the web application that collects the form data.
  2. Login:
  3. Client ---------------- GET /home ---------------------------> Server
  4. <-----If not authenticated REDIRECT to login page -----
  5. Login form will be displayed
  6. ------------- POST form data (username + password) ----> [Session][Created]
  7. <----- If OK create SESSION ID and return auth cookie --
  8. -------------- GET /employees/reports/all -------------->
  9. <---- 200 OK --------------------------------------------
  10. Logout:
  11. Client ---------------- GET /logout ---------------------------> Server
  12. <------- SESSION is invalidated & Redirected to /login -- [Session][removed]
  13. Stuff you need to know about Forms Authentication
  14. - The application is responsible for dealing with form data and performing the actual authorization phase.
  15. - Infrastructure handled by Spring Secutrity.
  16. - It is the most widespread form of authentication, well sutied for self-contained apps.
  17. - The user credentials are conveyed in the clear to the web application, so use SSL to keep them safe in transit.
  18. - This technique is inherently phishable, so use SSL and certificates from trusted organizations.
  19. - Not suited for public REST endpoints given to third party apps or customers. Only self-contained.
  20. Simpler definition:
  21. Forms Authentication is the most used method for authorizing users and works like a charm for self-contained apps that do not expose public API's to other parties.

Token Based Authentication using JWT (JSON Web Token)

  1. JSON Web Token (JWT) is a compact and safe way to transmit data between two parties. The information can be trusted because it is digitally signed.
  2. Login:
  3. |------------------ |-------------------|
  4. | |--- User sign in (Credentials, Facebook, Google, etc) -->| Auth Server |
  5. | | | |
  6. | Client (Outside)|<--- Authenticated. Token {JWT} created and returned ----|___________________|
  7. | your app domain)|
  8. | | |-------------------|
  9. | |--->GET /report/all HEADER Authorization: Bearer {JWT}-->| Application |
  10. | | | (REST) |
  11. | |<------------- 200 OK -----------------------------------| |
  12. | | | |
  13. | |--->POST /product HEADER Authorization: Bearer {JWT} --->| |
  14. | | | |
  15. | |<------------- 200 OK -----------------------------------|___________________|
  16. -------------------
  17. JWT Structure:
  18. JSON Web Token consist of three parts separated by dots(.)
  19. 1. Header
  20. 2. Payload (Data)
  21. 3. Signature
  22. Example: hhhh.ppppppp.ssssssss
  23. Refer: https://jwt.io
  24. When should you use them?
  25. Mobile ----------- {JWT} ------ www.myapp.com
  26. Auth Server +
  27. REST API
  28. WEB ------------ {JWT} ---------
  29. 3rd Party1 ----- {JWT} ---------
  30. 3rd Party2 ----- {JWT} ---------

SSL & HTTPS

  1. HTTP is a combination of HTTP plus SSL security layer on top of it. HTTPS is just HTTP that delivers data securely between endpoints.
  2. HTTP is not Secure
  3. ------------------
  4. Client/Browser <-------- http://mymailserver.com --------> MailServer
  5. john.does
  6. password
  7. In this above HTTP transaction, some malicious user can try to intercept/hack the given username and password.
  8. HTTPS is secure
  9. ---------------
  10. Client/Browser <-------- https://mymailserver.com --------> MailServer
  11. john.does
  12. password
  13. In this method, the malicious user can't see the given information. It will be secure.
  14. How HTTPS works?
  15. ----------------
  16. This is where SSL Certificate come in to play.
  17. Security in HTTPS communication is ensured by using SSL certificates
  18. Self-Signed (Created by you) - Good for development
  19. Signed by Trusted Authority (Comodo, Symantec, DigiCert, etc.) - For Production
  20. Flow
  21. ----
  22. Broswer/
  23. Client Machine ----------- HTTPS request ---------------------> Server
  24. <--- Server sends certificate with public key--
  25. SSL Verification. If OK browser sends
  26. back session key
  27. ----------------------------------------------->
  28. <------------------------------------------------------------------->
  29. Secure communication by encrypting all data with session key
  30. SSL is mandatory for any web application, regardless of the chosen security config.