# 反应式 X.509 认证
与Servlet X.509 authentication类似,Active X509 身份验证过滤器允许从客户端提供的证书中提取身份验证令牌。
下面是一个反应式 X509 安全配置的示例:
爪哇
@Bean
public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
http
.x509(withDefaults())
.authorizeExchange(exchanges -> exchanges
.anyExchange().permitAll()
);
return http.build();
}
Kotlin
@Bean
fun securityWebFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
return http {
x509 { }
authorizeExchange {
authorize(anyExchange, authenticated)
}
}
}
在上面的配置中,当principalExtractor
和authenticationManager
都不提供时,将使用默认值。默认的主体提取器是SubjectDnX509PrincipalExtractor
,它从客户机提供的证书中提取 CN(通用名称)字段。默认的身份验证管理器是ReactivePreAuthenticatedAuthenticationManager
,它执行用户帐户验证,检查具有principalExtractor
提取的名称的用户帐户是否存在,并且该帐户没有被锁定、禁用或过期。
下一个示例演示了如何重写这些默认值。
爪哇
@Bean
public SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
SubjectDnX509PrincipalExtractor principalExtractor =
new SubjectDnX509PrincipalExtractor();
principalExtractor.setSubjectDnRegex("OU=(.*?)(?:,|$)");
ReactiveAuthenticationManager authenticationManager = authentication -> {
authentication.setAuthenticated("Trusted Org Unit".equals(authentication.getName()));
return Mono.just(authentication);
};
http
.x509(x509 -> x509
.principalExtractor(principalExtractor)
.authenticationManager(authenticationManager)
)
.authorizeExchange(exchanges -> exchanges
.anyExchange().authenticated()
);
return http.build();
}
Kotlin
@Bean
fun securityWebFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain? {
val customPrincipalExtractor = SubjectDnX509PrincipalExtractor()
customPrincipalExtractor.setSubjectDnRegex("OU=(.*?)(?:,|$)")
val customAuthenticationManager = ReactiveAuthenticationManager { authentication: Authentication ->
authentication.isAuthenticated = "Trusted Org Unit" == authentication.name
Mono.just(authentication)
}
return http {
x509 {
principalExtractor = customPrincipalExtractor
authenticationManager = customAuthenticationManager
}
authorizeExchange {
authorize(anyExchange, authenticated)
}
}
}
在此示例中,从客户端证书的 OU 字段中提取用户名,而不是从 CN 中提取用户名,并且根本不执行使用ReactiveUserDetailsService
的帐户查找。相反,如果将提供的证书颁发给名为“可信的组织单元”的 OU,则将对请求进行身份验证。
有关配置 Netty 和WebClient
或curl
命令行工具以使用相互 TLS 并启用 X.509 身份验证的示例,请参见https://github.com/spring-projects/spring-security-samples/tree/main/servlet/java-configuration/authentication/x509 (opens new window)。
← WebFlux 应用程序入门 注销 →