亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

目錄
2. Use JWT for Stateless Authentication
Generate JWT (Example Utility)
3. Custom JWT Authentication Filter
4. Secure Endpoints with Role-Based Access
5. Add a Login Endpoint to Issue Tokens
Final Notes
首頁 Java java教程 用彈簧安全和Java確保REST API

用彈簧安全和Java確保REST API

Aug 01, 2025 am 03:31 AM

禁用會話和CSRF,使用SessionCreationPolicy.STATELESS和csrf().disable()實現(xiàn)REST友好安全;2. 採用JWT進行無狀態(tài)認證,通過JwtUtil生成並驗證含用戶角色和過期時間的令牌;3. 創(chuàng)建JwtAuthenticationFilter攔截請求,解析Authorization頭中的Bearer令牌,驗證後將認證信息存入SecurityContextHolder;4. 使用@PreAuthorize("hasRole('ADMIN')")等註解實現(xiàn)基於角色的訪問控制,並通過@EnableGlobalMethodSecurity(prePostEnabled=true)啟用方法級安全;5. 提供登錄接口/login,經(jīng)AuthenticationManager認證成功後返回JWT令牌;務(wù)必使用HTTPS、安全存儲密鑰、避免localStorage存放令牌、嚴(yán)格校驗簽名並設(shè)置合理過期策略,以確保API安全。

Securing REST APIs with Spring Security and Java

Securing REST APIs with Spring Security in Java isn't just a best practice—it's a necessity. Unlike traditional web apps that rely on session cookies, REST APIs are stateless, so security has to be handled differently. Here's how to do it right using Spring Security and Java (without Spring Boot if you're going the XML or pure Java config route, though we'll focus on modern Java config).

Securing REST APIs with Spring Security and Java

1. Enable Spring Security in a REST-Friendly Way

Start by setting up Spring Security with Java configuration. You'll need to disable session creation and CSRF protection since REST APIs typically use token-based authentication (like JWT), not sessions.

 @Configuration
@EnableWebSecurity
public class SecurityConfig {

    @Bean
    public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
        http
            .csrf().disable() // No CSRF for stateless APIs
            .sessionManagement()
                .sessionCreationPolicy(SessionCreationPolicy.STATELESS) // Always stateless
            .and()
            .authorizeHttpRequests(authz -> authz
                .requestMatchers("/api/public/**").permitAll()
                .requestMatchers("/api/admin/**").hasRole("ADMIN")
                .anyRequest().authenticated()
            )
            .httpBasic().disable() // Not ideal for REST; use tokens
            .addFilterBefore(jwtFilter(), UsernamePasswordAuthenticationFilter.class);

        return http.build();
    }

    @Bean
    public JwtAuthenticationFilter jwtFilter() {
        return new JwtAuthenticationFilter();
    }
}

? Key points:

Securing REST APIs with Spring Security and Java
  • STATELESS sessions prevent Spring from creating JSESSIONID cookies.
  • Disable CSRF because it relies on session state.
  • Use requestMatchers() to define public vs. secured endpoints.

2. Use JWT for Stateless Authentication

JWT (JSON Web Token) is perfect for REST APIs. The client logs in once, gets a token, and sends it in the Authorization: Bearer <token> header on subsequent requests.

Generate JWT (Example Utility)

 public class JwtUtil {
    private String secret = "yourSuperSecretKeyThatIsAtLeast256BitsLong";

    public String generateToken(String username, Collection<? extends GrantedAuthority> authorities) {
        return Jwts.builder()
            .setSubject(username)
            .claim("authorities", authorities.stream()
                .map(GrantedAuthority::getAuthority)
                .collect(Collectors.toList()))
            .setIssuedAt(new Date())
            .setExpiration(new Date(System.currentTimeMillis() 86400000)) // 24h
            .signWith(SignatureAlgorithm.HS256, secret)
            .compact();
    }

    public boolean isTokenValid(String token, String username) {
        return getUsernameFromToken(token).equals(username) && !isTokenExpired(token);
    }

    public String getUsernameFromToken(String token) {
        return getClaims(token).getSubject();
    }

    private Claims getClaims(String token) {
        return Jwts.parser()
            .setSigningKey(secret)
            .parseClaimsJws(token)
            .getBody();
    }

    private boolean isTokenExpired(String token) {
        return getClaims(token).getExpiration().before(new Date());
    }
}

?? Keep the secret secure—never hardcode in production. Use environment variables or config servers.

Securing REST APIs with Spring Security and Java

3. Custom JWT Authentication Filter

You need a filter to intercept incoming requests, extract the JWT from the Authorization header, validate it, and set the authentication in Spring Security's context.

 public class JwtAuthenticationFilter extends OncePerRequestFilter {

    @Autowired
    private JwtUtil jwtUtil;

    @Autowired
    private UserDetailsService userDetailsService;

    @Override
    protected void doFilterInternal(HttpServletRequest request,
                                    HttpServletResponse response,
                                    FilterChain filterChain) throws ServletException, IOException {

        String token = extractToken(request);

        if (token != null && jwtUtil.validateToken(token)) {
            String username = jwtUtil.getUsernameFromToken(token);
            UserDetails userDetails = userDetailsService.loadUserByUsername(username);

            UsernamePasswordAuthenticationToken authentication =
                new UsernamePasswordAuthenticationToken(userDetails, null, userDetails.getAuthorities());
            authentication.setDetails(new WebAuthenticationDetailsSource().buildDetails(request));

            SecurityContextHolder.getContext().setAuthentication(authentication);
        }

        filterChain.doFilter(request, response);
    }

    private String extractToken(HttpServletRequest request) {
        String bearerToken = request.getHeader("Authorization");
        if (bearerToken != null && bearerToken.startsWith("Bearer ")) {
            return bearerToken.substring(7);
        }
        return null;
    }
}

? This filter runs before Spring checks authentication. If the token is valid, it sets the Authentication object so @PreAuthorize , hasRole() , etc., work as expected.


4. Secure Endpoints with Role-Based Access

Once authentication is in place, protect your endpoints using method-level security:

 @RestController
@RequestMapping("/api/admin")
@PreAuthorize("hasRole(&#39;ADMIN&#39;)")
public class AdminController {

    @GetMapping("/data")
    public ResponseEntity<String> getSensitiveData() {
        return ResponseEntity.ok("Top secret data!");
    }
}

Don't forget to enable method-level security:

 @Configuration
@EnableGlobalMethodSecurity(prePostEnabled = true)
public class MethodSecurityConfig {
    // No extra beans needed if using global method security
}

5. Add a Login Endpoint to Issue Tokens

Create a simple login controller to authenticate and return a JWT:

 @PostMapping("/login")
public ResponseEntity<?> login(@RequestBody LoginRequest request) {
    try {
        Authentication authentication = authenticationManager.authenticate(
            new UsernamePasswordAuthenticationToken(request.getUsername(), request.getPassword())
        );
        SecurityContextHolder.getContext().setAuthentication(authentication);

        String token = jwtUtil.generateToken(
            authentication.getName(),
            (Collection<? extends GrantedAuthority>) authentication.getAuthorities()
        );

        return ResponseEntity.ok(new JwtResponse(token));
    } catch (AuthenticationException e) {
        return ResponseEntity.status(HttpStatus.UNAUTHORIZED).build();
    }
}

? You'll need to expose the AuthenticationManager bean if not using Spring Boot auto-configuration.


Final Notes

  • Never store JWTs in localStorage (XSS risk). Prefer httpOnly cookies if possible, or use secure in-memory storage.
  • Always use HTTPS in production.
  • Rotate secrets and consider short token expiration with refresh tokens.
  • Validate token signatures strictly—don't use none algorithm.

Basically, securing REST APIs with Spring Security comes down to:

  • Disabling sessions and CSRF.
  • Using JWT (or OAuth2) for stateless auth.
  • Writing a filter to validate tokens.
  • Leveraging Spring's authorization mechanisms.

It's not complex, but easy to get wrong. Do it once right, and your API stays safe.

以上是用彈簧安全和Java確保REST API的詳細內(nèi)容。更多資訊請關(guān)注PHP中文網(wǎng)其他相關(guān)文章!

本網(wǎng)站聲明
本文內(nèi)容由網(wǎng)友自願投稿,版權(quán)歸原作者所有。本站不承擔(dān)相應(yīng)的法律責(zé)任。如發(fā)現(xiàn)涉嫌抄襲或侵權(quán)的內(nèi)容,請聯(lián)絡(luò)admin@php.cn

熱AI工具

Undress AI Tool

Undress AI Tool

免費脫衣圖片

Undresser.AI Undress

Undresser.AI Undress

人工智慧驅(qū)動的應(yīng)用程序,用於創(chuàng)建逼真的裸體照片

AI Clothes Remover

AI Clothes Remover

用於從照片中去除衣服的線上人工智慧工具。

Clothoff.io

Clothoff.io

AI脫衣器

Video Face Swap

Video Face Swap

使用我們完全免費的人工智慧換臉工具,輕鬆在任何影片中換臉!

熱工具

記事本++7.3.1

記事本++7.3.1

好用且免費的程式碼編輯器

SublimeText3漢化版

SublimeText3漢化版

中文版,非常好用

禪工作室 13.0.1

禪工作室 13.0.1

強大的PHP整合開發(fā)環(huán)境

Dreamweaver CS6

Dreamweaver CS6

視覺化網(wǎng)頁開發(fā)工具

SublimeText3 Mac版

SublimeText3 Mac版

神級程式碼編輯軟體(SublimeText3)

Java中的'枚舉”類型是什麼? Java中的'枚舉”類型是什麼? Jul 02, 2025 am 01:31 AM

Java中的枚舉(enum)是一種特殊的類,用於表示固定數(shù)量的常量值。 1.使用enum關(guān)鍵字定義;2.每個枚舉值都是該枚舉類型的公共靜態(tài)最終實例;3.可以包含字段、構(gòu)造函數(shù)和方法,為每個常量添加行為;4.可在switch語句中使用,支持直接比較,並提供name()、ordinal()、values()和valueOf()等內(nèi)置方法;5.枚舉可提升代碼的類型安全性、可讀性和靈活性,適用於狀態(tài)碼、顏色或星期等有限集合場景。

界面隔離原理是什麼? 界面隔離原理是什麼? Jul 02, 2025 am 01:24 AM

接口隔離原則(ISP)要求不強制客戶端依賴未使用的接口。其核心是用多個小而精的接口替代大而全的接口。違反該原則的表現(xiàn)包括:類實現(xiàn)接口時拋出未實現(xiàn)異常、存在大量無效方法實現(xiàn)、無關(guān)功能被強行歸入同一接口。應(yīng)用方法包括:按常用方法組劃分接口、依據(jù)客戶端使用拆分接口、必要時使用組合替代多接口實現(xiàn)。例如將包含打印、掃描、傳真方法的Machine接口拆分為Printer、Scanner和FaxMachine。在小型項目或所有客戶端均使用全部方法時可適當(dāng)放寬規(guī)則。

現(xiàn)代爪哇的異步編程技術(shù) 現(xiàn)代爪哇的異步編程技術(shù) Jul 07, 2025 am 02:24 AM

Java支持異步編程的方式包括使用CompletableFuture、響應(yīng)式流(如ProjectReactor)以及Java19 中的虛擬線程。 1.CompletableFuture通過鍊式調(diào)用提升代碼可讀性和維護性,支持任務(wù)編排和異常處理;2.ProjectReactor提供Mono和Flux類型實現(xiàn)響應(yīng)式編程,具備背壓機制和豐富的操作符;3.虛擬線程減少並發(fā)成本,適用於I/O密集型任務(wù),與傳統(tǒng)平臺線程相比更輕量且易於擴展。每種方式均有適用場景,應(yīng)根據(jù)需求選擇合適工具並避免混合模型以保持簡潔性

Java中可呼叫和可運行的差異 Java中可呼叫和可運行的差異 Jul 04, 2025 am 02:50 AM

Callable和Runnable在Java中主要有三點區(qū)別。第一,Callable的call()方法可以返回結(jié)果,適合需要返回值的任務(wù),如Callable;而Runnable的run()方法無返回值,適用於無需返回的任務(wù),如日誌記錄。第二,Callable允許拋出checked異常,便於錯誤傳遞;而Runnable必須在內(nèi)部處理異常。第三,Runnable可直接傳給Thread或ExecutorService,而Callable只能提交給ExecutorService,並返回Future對像以

在Java中使用枚舉的最佳實踐 在Java中使用枚舉的最佳實踐 Jul 07, 2025 am 02:35 AM

在Java中,枚舉(enum)適合表示固定常量集合,最佳實踐包括:1.用enum表示固定狀態(tài)或選項,提升類型安全和可讀性;2.為枚舉添加屬性和方法以增強靈活性,如定義字段、構(gòu)造函數(shù)、輔助方法等;3.使用EnumMap和EnumSet提高性能和類型安全性,因其基於數(shù)組實現(xiàn)更高效;4.避免濫用enum,如動態(tài)值、頻繁變更或複雜邏輯場景應(yīng)使用其他方式替代。正確使用enum能提升代碼質(zhì)量並減少錯誤,但需注意其適用邊界。

了解Java Nio及其優(yōu)勢 了解Java Nio及其優(yōu)勢 Jul 08, 2025 am 02:55 AM

JavaNIO是Java1.4引入的新型IOAPI,1)面向緩衝區(qū)和通道,2)包含Buffer、Channel和Selector核心組件,3)支持非阻塞模式,4)相比傳統(tǒng)IO更高效處理並發(fā)連接。其優(yōu)勢體現(xiàn)在:1)非阻塞IO減少線程開銷,2)Buffer提升數(shù)據(jù)傳輸效率,3)Selector實現(xiàn)多路復(fù)用,4)內(nèi)存映射加快文件讀寫。使用時需注意:1)Buffer的flip/clear操作易混淆,2)非阻塞下需手動處理不完整數(shù)據(jù),3)Selector註冊需及時取消,4)NIO並非適用於所有場景。

探索Java中不同的同步機制 探索Java中不同的同步機制 Jul 04, 2025 am 02:53 AM

Javaprovidesmultiplesynchronizationtoolsforthreadsafety.1.synchronizedblocksensuremutualexclusionbylockingmethodsorspecificcodesections.2.ReentrantLockoffersadvancedcontrol,includingtryLockandfairnesspolicies.3.Conditionvariablesallowthreadstowaitfor

Java Classloader在內(nèi)部如何工作 Java Classloader在內(nèi)部如何工作 Jul 06, 2025 am 02:53 AM

Java的類加載機制通過ClassLoader實現(xiàn),其核心工作流程分為加載、鏈接和初始化三個階段。加載階段由ClassLoader動態(tài)讀取類的字節(jié)碼並創(chuàng)建Class對象;鏈接包括驗證類的正確性、為靜態(tài)變量分配內(nèi)存及解析符號引用;初始化則執(zhí)行靜態(tài)代碼塊和靜態(tài)變量賦值。類加載採用雙親委派模型,優(yōu)先委託父類加載器查找類,依次嘗試Bootstrap、Extension和ApplicationClassLoader,確保核心類庫安全且避免重複加載。開發(fā)者可自定義ClassLoader,如URLClassL

See all articles