# 反应式 X.509 认证 与[Servlet X.509 authentication](../../servlet/authentication/x509.html#servlet-x509)类似,Active X509 身份验证过滤器允许从客户端提供的证书中提取身份验证令牌。 下面是一个反应式 X509 安全配置的示例: 爪哇 ``` @Bean public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) { http .x509(withDefaults()) .authorizeExchange(exchanges -> exchanges .anyExchange().permitAll() ); return http.build(); } ``` Kotlin ``` @Bean fun securityWebFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain { return http { x509 { } authorizeExchange { authorize(anyExchange, authenticated) } } } ``` 在上面的配置中,当`principalExtractor`和`authenticationManager`都不提供时,将使用默认值。默认的主体提取器是`SubjectDnX509PrincipalExtractor`,它从客户机提供的证书中提取 CN(通用名称)字段。默认的身份验证管理器是`ReactivePreAuthenticatedAuthenticationManager`,它执行用户帐户验证,检查具有`principalExtractor`提取的名称的用户帐户是否存在,并且该帐户没有被锁定、禁用或过期。 下一个示例演示了如何重写这些默认值。 爪哇 ``` @Bean public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) { SubjectDnX509PrincipalExtractor principalExtractor = new SubjectDnX509PrincipalExtractor(); principalExtractor.setSubjectDnRegex("OU=(.*?)(?:,|$)"); ReactiveAuthenticationManager authenticationManager = authentication -> { authentication.setAuthenticated("Trusted Org Unit".equals(authentication.getName())); return Mono.just(authentication); }; http .x509(x509 -> x509 .principalExtractor(principalExtractor) .authenticationManager(authenticationManager) ) .authorizeExchange(exchanges -> exchanges .anyExchange().authenticated() ); return http.build(); } ``` Kotlin ``` @Bean fun securityWebFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain? { val customPrincipalExtractor = SubjectDnX509PrincipalExtractor() customPrincipalExtractor.setSubjectDnRegex("OU=(.*?)(?:,|$)") val customAuthenticationManager = ReactiveAuthenticationManager { authentication: Authentication -> authentication.isAuthenticated = "Trusted Org Unit" == authentication.name Mono.just(authentication) } return http { x509 { principalExtractor = customPrincipalExtractor authenticationManager = customAuthenticationManager } authorizeExchange { authorize(anyExchange, authenticated) } } } ``` 在此示例中,从客户端证书的 OU 字段中提取用户名,而不是从 CN 中提取用户名,并且根本不执行使用`ReactiveUserDetailsService`的帐户查找。相反,如果将提供的证书颁发给名为“可信的组织单元”的 OU,则将对请求进行身份验证。 有关配置 Netty 和`WebClient`或`curl`命令行工具以使用相互 TLS 并启用 X.509 身份验证的示例,请参见[https://github.com/spring-projects/spring-security-samples/tree/main/servlet/java-configuration/authentication/x509](https://github.com/spring-projects/spring-security-samples/tree/main/servlet/java-configuration/authentication/x509)。