1) JWT with RBAC
JWT tokens can be used for the purpose of authentication in a web service context, by verifying the signature on the token and taking the "sub" claim as the authenticated principal. This assumes no proof of possession of the token, something we will revisit in a future blog post. Once this is done we have the option of performing an authorization check on the authenticated principal. This can be done easily via RBAC by using a claim in the token to represent a role.
Apache CXF has a SimpleAuthorizingInterceptor class, which can map web service operations to role names. If the authenticated principal is not associated with the role that is required to access the operation, then an exception is thrown. Here is an example of how to configure a JAX-RS web service in CXF with the SimpleAuthorizingInterceptor for JWT:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<bean id="serviceBean" class="org.apache.coheigea.cxf.jaxrs.json.common.DoubleItJWTAuthenticationService"/> | |
<bean id="jackson" class="com.fasterxml.jackson.jaxrs.json.JacksonJsonProvider"/> | |
<bean id="jwtFilter" class="org.apache.cxf.rs.security.jose.jaxrs.JwtAuthenticationFilter"> | |
<property name="roleClaim" value="role"/> | |
</bean> | |
<bean id="authorizationInterceptor" | |
class="org.apache.cxf.interceptor.security.SimpleAuthorizingInterceptor"> | |
<property name="methodRolesMap"> | |
<map> | |
<entry key="doubleIt" value="boss"/> | |
</map> | |
</property> | |
</bean> | |
<jaxrs:server address="http://localhost:${testutil.ports.Server}/doubleit"> | |
<jaxrs:serviceBeans> | |
<ref bean="serviceBean"/> | |
</jaxrs:serviceBeans> | |
<jaxrs:providers> | |
<ref bean="jackson"/> | |
<ref bean="jwtFilter"/> | |
</jaxrs:providers> | |
<jaxrs:inInterceptors> | |
<ref bean="authorizationInterceptor"/> | |
</jaxrs:inInterceptors> | |
<jaxrs:properties> | |
<entry key="rs.security.keystore.type" value="jks" /> | |
<entry key="rs.security.keystore.alias" value="myclientkey"/> | |
<entry key="rs.security.keystore.password" value="cspass"/> | |
<entry key="rs.security.keystore.file" value="clientstore.jks" /> | |
<entry key="rs.security.signature.algorithm" value="RS256" /> | |
</jaxrs:properties> | |
</jaxrs:server> |
2) JWT with CBAC
Since CXF 3.3.0, we can also use the Claims annotations in CXF (that previously only worked with SAML tokens) to perform authorization checks on requests that contain JWT tokens. This allows us to specify more fine-grained authorization requirements on the token, as opposed to the RBAC approach above. For example, we can annotate our service endpoint as follows:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@Path("/services") | |
public class DoubleItJWTClaimsAuthenticationService { | |
@POST | |
@Produces("application/json") | |
@Consumes("application/json") | |
@Claim(name = "role", value = {"boss", "ceo"}) | |
public Number doubleIt(Number numberToDouble) { | |
... | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<bean id="jackson" class="com.fasterxml.jackson.jaxrs.json.JacksonJsonProvider"/> | |
<bean id="claimsServiceBean" | |
class="org.apache.coheigea.cxf.jaxrs.jwt.authorization.DoubleItJWTClaimsAuthenticationService" /> | |
<bean id="claimsHandler" class="org.apache.cxf.jaxrs.security.ClaimsAuthorizingFilter"> | |
<property name="securedObject" ref="claimsServiceBean"/> | |
</bean> | |
<jaxrs:server address="http://localhost:${testutil.ports.Server}/doubleitclaims"> | |
<jaxrs:serviceBeans> | |
<ref bean="claimsServiceBean"/> | |
</jaxrs:serviceBeans> | |
<jaxrs:providers> | |
<ref bean="jackson"/> | |
<bean class="org.apache.cxf.rs.security.jose.jaxrs.JwtAuthenticationFilter" /> | |
<ref bean="claimsHandler"/> | |
</jaxrs:providers> | |
<jaxrs:properties> | |
<entry key="rs.security.keystore.type" value="jks" /> | |
<entry key="rs.security.keystore.alias" value="myclientkey"/> | |
<entry key="rs.security.keystore.password" value="cspass"/> | |
<entry key="rs.security.keystore.file" value="clientstore.jks" /> | |
<entry key="rs.security.signature.algorithm" value="RS256" /> | |
</jaxrs:properties> | |
</jaxrs:server> |
No comments:
Post a Comment