# Authorize HttpServletRequests with AuthorizationFilter This section builds on [Servlet Architecture and Implementation](../architecture.html#servlet-architecture) by digging deeper into how [authorization](index.html#servlet-authorization) works within Servlet-based applications. | |`AuthorizationFilter` supersedes [`FilterSecurityInterceptor`](authorize-requests.html#servlet-authorization-filtersecurityinterceptor).
To remain backward compatible, `FilterSecurityInterceptor` remains the default.
This section discusses how `AuthorizationFilter` works and how to override the default configuration.| |---|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| The [`AuthorizationFilter`](https://docs.spring.io/spring-security/site/docs/5.6.2/api/org/springframework/security/web/access/intercept/AuthorizationFilter.html) provides [authorization](index.html#servlet-authorization) for `HttpServletRequest`s. It is inserted into the [FilterChainProxy](../architecture.html#servlet-filterchainproxy) as one of the [Security Filters](../architecture.html#servlet-security-filters). You can override the default when you declare a `SecurityFilterChain`. Instead of using [`authorizeRequests`](#servlet-authorize-requests-defaults), use `authorizeHttpRequests`, like so: Example 1. Use authorizeHttpRequests Java ``` @Bean SecurityFilterChain web(HttpSecurity http) throws AuthenticationException { http .authorizeHttpRequests((authorize) -> authorize .anyRequest().authenticated(); ) // ... return http.build(); } ``` This improves on `authorizeRequests` in a number of ways: 1. Uses the simplified `AuthorizationManager` API instead of metadata sources, config attributes, decision managers, and voters. This simplifies reuse and customization. 2. Delays `Authentication` lookup. Instead of the authentication needing to be looked up for every request, it will only look it up in requests where an authorization decision requires authentication. 3. Bean-based configuration support. When `authorizeHttpRequests` is used instead of `authorizeRequests`, then [`AuthorizationFilter`](https://docs.spring.io/spring-security/site/docs/5.6.2/api/org/springframework/security/web/access/intercept/AuthorizationFilter.html) is used instead of [`FilterSecurityInterceptor`](authorize-requests.html#servlet-authorization-filtersecurityinterceptor). ![authorizationfilter](https://docs.spring.io/spring-security/reference/_images/servlet/authorization/authorizationfilter.png) Figure 1. Authorize HttpServletRequest * ![number 1](https://docs.spring.io/spring-security/reference/_images/icons/number_1.png) First, the `AuthorizationFilter` obtains an [Authentication](../authentication/architecture.html#servlet-authentication-authentication) from the [SecurityContextHolder](../authentication/architecture.html#servlet-authentication-securitycontextholder). It wraps this in an `Supplier` in order to delay lookup. * ![number 2](https://docs.spring.io/spring-security/reference/_images/icons/number_2.png) Second, `AuthorizationFilter` creates a [`FilterInvocation`](https://docs.spring.io/spring-security/site/docs/5.6.2/api/org/springframework/security/web/FilterInvocation.html) from the `HttpServletRequest`, `HttpServletResponse`, and `FilterChain`. * ![number 3](https://docs.spring.io/spring-security/reference/_images/icons/number_3.png) Next, it passes the `Supplier` and `FilterInvocation` to the [`AuthorizationManager`](../architecture.html#authz-authorization-manager). * ![number 4](https://docs.spring.io/spring-security/reference/_images/icons/number_4.png) If authorization is denied, an `AccessDeniedException` is thrown. In this case the [`ExceptionTranslationFilter`](../architecture.html#servlet-exceptiontranslationfilter) handles the `AccessDeniedException`. * ![number 5](https://docs.spring.io/spring-security/reference/_images/icons/number_5.png) If access is granted, `AuthorizationFilter` continues with the [FilterChain](../architecture.html#servlet-filters-review) which allows the application to process normally. We can configure Spring Security to have different rules by adding more rules in order of precedence. Example 2. Authorize Requests Java ``` @Bean SecurityFilterChain web(HttpSecurity http) throws Exception { http // ... .authorizeHttpRequests(authorize -> authorize (1) .mvcMatchers("/resources/**", "/signup", "/about").permitAll() (2) .mvcMatchers("/admin/**").hasRole("ADMIN") (3) .mvcMatchers("/db/**").access("hasRole('ADMIN') and hasRole('DBA')") (4) .anyRequest().denyAll() (5) ); return http.build(); } ``` |**1**| There are multiple authorization rules specified.
Each rule is considered in the order they were declared. | |-----|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |**2**| We specified multiple URL patterns that any user can access.
Specifically, any user can access a request if the URL starts with "/resources/", equals "/signup", or equals "/about". | |**3**|Any URL that starts with "/admin/" will be restricted to users who have the role "ROLE\_ADMIN".
You will notice that since we are invoking the `hasRole` method we do not need to specify the "ROLE\_" prefix.| |**4**|Any URL that starts with "/db/" requires the user to have both "ROLE\_ADMIN" and "ROLE\_DBA".
You will notice that since we are using the `hasRole` expression we do not need to specify the "ROLE\_" prefix. | |**5**| Any URL that has not already been matched on is denied access.
This is a good strategy if you do not want to accidentally forget to update your authorization rules. | You can take a bean-based approach by constructing your own [`RequestMatcherDelegatingAuthorizationManager`](architecture.html#authz-delegate-authorization-manager) like so: Example 3. Configure RequestMatcherDelegatingAuthorizationManager Java ``` @Bean SecurityFilterChain web(HttpSecurity http, AuthorizationManager access) throws AuthenticationException { http .authorizeHttpRequests((authorize) -> authorize .anyRequest().access(access) ) // ... return http.build(); } @Bean AuthorizationManager requestMatcherAuthorizationManager(HandlerMappingIntrospector introspector) { RequestMatcher permitAll = new AndRequestMatcher( new MvcRequestMatcher(introspector, "/resources/**"), new MvcRequestMatcher(introspector, "/signup"), new MvcRequestMatcher(introspector, "/about")); RequestMatcher admin = new MvcRequestMatcher(introspector, "/admin/**"); RequestMatcher db = new MvcRequestMatcher(introspector, "/db/**"); RequestMatcher any = AnyRequestMatcher.INSTANCE; AuthorizationManager manager = RequestMatcherDelegatingAuthorizationManager.builder() .add(permitAll, (context) -> new AuthorizationDecision(true)) .add(admin, AuthorityAuthorizationManager.hasRole("ADMIN")) .add(db, AuthorityAuthorizationManager.hasRole("DBA")) .add(any, new AuthenticatedAuthorizationManager()) .build(); return (context) -> manager.check(context.getRequest()); } ``` You can also wire [your own custom authorization managers](architecture.html#authz-custom-authorization-manager) for any request matcher. Here is an example of mapping a custom authorization manager to the `my/authorized/endpoint`: Example 4. Custom Authorization Manager Java ``` @Bean SecurityFilterChain web(HttpSecurity http) throws Exception { http .authorizeHttpRequests((authorize) -> authorize .mvcMatchers("/my/authorized/endpoint").access(new CustomAuthorizationManager()); ) // ... return http.build(); } ``` Or you can provide it for all requests as seen below: Example 5. Custom Authorization Manager for All Requests Java ``` @Bean SecurityFilterChain web(HttpSecurity http) throws Exception { http .authorizeHttpRequests((authorize) -> authorize .anyRequest.access(new CustomAuthorizationManager()); ) // ... return http.build(); } ``` [Authorization Architecture](architecture.html)[Authorize HTTP Requests with FilterSecurityInterceptor](authorize-requests.html)