com.auth0.spring.security.mvc.Auth0AuthenticationProvider Maven / Gradle / Ivy
package com.auth0.spring.security.mvc;
import com.auth0.Auth0AuthorityStrategy;
import com.auth0.Auth0User;
import com.auth0.SessionUtils;
import com.auth0.jwt.Algorithm;
import com.auth0.jwt.JWTVerifier;
import com.auth0.jwt.JWTVerifyException;
import org.apache.commons.codec.binary.Base64;
import org.apache.commons.lang3.Validate;
import org.springframework.beans.factory.InitializingBean;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.security.authentication.AuthenticationProvider;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.AuthenticationException;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.web.context.request.RequestContextHolder;
import org.springframework.web.context.request.ServletRequestAttributes;
import javax.servlet.ServletContext;
import javax.servlet.http.HttpServletRequest;
import java.io.IOException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.PublicKey;
import java.security.SignatureException;
import java.util.Map;
import static com.auth0.jwt.pem.PemReader.readPublicKey;
/**
* Class that verifies the JWT token and when valid, it will set
* the UserDetails in the authentication object
*/
public class Auth0AuthenticationProvider implements AuthenticationProvider,
InitializingBean {
@Autowired
ServletContext servletContext;
private JWTVerifier jwtVerifier;
private String domain;
private String issuer;
private String clientId;
private String clientSecret;
private String securedRoute;
private boolean base64EncodedSecret;
private Auth0AuthorityStrategy authorityStrategy;
private Algorithm signingAlgorithm;
private String publicKeyPath;
/**
* Performs authentication with the same contract as
* {@link org.springframework.security.authentication.AuthenticationManager#authenticate(Authentication)}
*
* Verifies the JWT Token on every request and only creates Principal if not already authenticated
*
* @param authentication the authentication request object.
*
* @return a fully authenticated object including credentials.
* @throws AuthenticationException if authentication fails.
*/
public Authentication authenticate(final Authentication authentication) throws AuthenticationException {
try {
// always verify JWT token
final Auth0JWTToken tokenAuth = ((Auth0JWTToken) authentication);
final String token = tokenAuth.getJwt();
final Map decoded = jwtVerifier.verify(token);
// check current authentication status of user and avoid re-authentication setup if already authenticated
final Authentication existingAuthentication = SecurityContextHolder.getContext().getAuthentication();
if (existingAuthentication != null && existingAuthentication.isAuthenticated()) {
return existingAuthentication;
}
tokenAuth.setAuthenticated(true);
final ServletRequestAttributes servletReqAttr = (ServletRequestAttributes) RequestContextHolder.currentRequestAttributes();
final HttpServletRequest req = servletReqAttr.getRequest();
final Auth0User auth0User = SessionUtils.getAuth0User(req);
Validate.notNull(auth0User);
tokenAuth.setPrincipal(new Auth0UserDetails(auth0User, authorityStrategy));
tokenAuth.setDetails(decoded);
return authentication;
} catch (InvalidKeyException e) {
throw new Auth0TokenException("InvalidKeyException thrown while decoding JWT token " + e.getLocalizedMessage());
} catch (NoSuchAlgorithmException e) {
throw new Auth0TokenException("NoSuchAlgorithmException thrown while decoding JWT token " + e.getLocalizedMessage());
} catch (IllegalStateException e) {
throw new Auth0TokenException("IllegalStateException thrown while decoding JWT token " + e.getLocalizedMessage());
} catch (SignatureException e) {
throw new Auth0TokenException("SignatureException thrown while decoding JWT token " + e.getLocalizedMessage());
} catch (IOException e) {
throw new Auth0TokenException("IOException thrown while decoding JWT token " + e.getLocalizedMessage());
} catch (JWTVerifyException e) {
throw new Auth0TokenException("JWTVerifyException thrown while decoding JWT token " + e.getLocalizedMessage());
}
}
public boolean supports(Class> authentication) {
return Auth0JWTToken.class.isAssignableFrom(authentication);
}
/**
* Initialises configuration setup for the authentication provider
*/
public void afterPropertiesSet() throws Exception {
if ((clientSecret == null) || (clientId == null)) {
throw new IllegalStateException(
"client secret and client id are not set for Auth0AuthenticationProvider");
}
if (securedRoute == null) {
throw new IllegalStateException(
"You must set which route pattern is used to check for users so that they must be authenticated");
}
switch (signingAlgorithm) {
case HS256:
case HS384:
case HS512:
// Auth0 Client Secrets are currently Base64 encoded
if (base64EncodedSecret) {
jwtVerifier = new JWTVerifier(new Base64(true).decodeBase64(clientSecret), clientId, issuer);
} else {
jwtVerifier = new JWTVerifier(clientSecret, clientId, issuer);
}
return;
case RS256:
case RS384:
case RS512:
Validate.notEmpty(publicKeyPath);
try {
final String publicKeyRealPath = servletContext.getRealPath(publicKeyPath);
final PublicKey publicKey = readPublicKey(publicKeyRealPath);
Validate.notNull(publicKey);
jwtVerifier = new JWTVerifier(publicKey, clientId);
return;
} catch (Exception e) {
throw new IllegalStateException(e.getMessage(), e.getCause());
}
default:
throw new IllegalStateException("Unsupported signing method: " + signingAlgorithm.getValue());
}
}
protected String getDomain() {
return domain;
}
protected void setDomain(String domain) {
this.domain = domain;
}
protected String getIssuer() {
return issuer;
}
protected void setIssuer(String issuer) {
this.issuer = issuer;
}
protected String getClientId() {
return clientId;
}
protected void setClientId(String clientId) {
this.clientId = clientId;
}
protected String getClientSecret() {
return clientSecret;
}
protected void setClientSecret(String clientSecret) {
this.clientSecret = clientSecret;
}
protected String getSecuredRoute() {
return securedRoute;
}
protected void setSecuredRoute(String securedRoute) {
this.securedRoute = securedRoute;
}
protected boolean isBase64EncodedSecret() {
return base64EncodedSecret;
}
protected void setBase64EncodedSecret(boolean base64EncodedSecret) {
this.base64EncodedSecret = base64EncodedSecret;
}
protected Auth0AuthorityStrategy getAuthorityStrategy() {
return authorityStrategy;
}
protected void setAuthorityStrategy(Auth0AuthorityStrategy authorityStrategy) {
this.authorityStrategy = authorityStrategy;
}
protected Algorithm getSigningAlgorithm() {
return signingAlgorithm;
}
protected void setSigningAlgorithm(Algorithm signingAlgorithm) {
this.signingAlgorithm = signingAlgorithm;
}
protected String getPublicKeyPath() {
return publicKeyPath;
}
protected void setPublicKeyPath(String publicKeyPath) {
this.publicKeyPath = publicKeyPath;
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy