2017-03-31 152 views
0

是否有人成功配置了以ADFS作爲身份提供者的Spring Boot OAuth2?我成功地在Facebook上跟隨了本教程,https://spring.io/guides/tutorials/spring-boot-oauth2/,但ADFS似乎沒有userInfoUri。我認爲ADFS會在令牌本身(JWT格式?)中返回聲明數據,但不確定如何使其與Spring一起工作。這是我迄今在我的屬性文件中:如何爲ADFS配置spring引導安全OAuth2?

security: 
    oauth2: 
    client: 
     clientId: [client id setup with ADFS] 
     userAuthorizationUri: https://[adfs domain]/adfs/oauth2/authorize?resource=[MyRelyingPartyTrust] 
     accessTokenUri: https://[adfs domain]/adfs/oauth2/token 
     tokenName: code 
     authenticationScheme: query 
     clientAuthenticationScheme: form 
     grant-type: authorization_code 
    resource: 
     userInfoUri: [not sure what to put here?] 

回答

3

tldr; ADFS將用戶信息嵌入oauth標記中。您需要創建並重寫org.springframework.boot.autoconfigure.security.oauth2.resource.UserInfoTokenServices對象提取這些信息,並把它添加到Principal對象

要開始,首先按照春的OAuth2教程https://spring.io/guides/tutorials/spring-boot-oauth2/。使用這些應用程序屬性(在自己的域名填寫):

security: 
    oauth2: 
    client: 
     clientId: [client id setup with ADFS] 
     userAuthorizationUri: https://[adfs domain]/adfs/oauth2/authorize?resource=[MyRelyingPartyTrust] 
     accessTokenUri: https://[adfs domain]/adfs/oauth2/token 
     tokenName: code 
     authenticationScheme: query 
     clientAuthenticationScheme: form 
     grant-type: authorization_code 
    resource: 
     userInfoUri: https://[adfs domain]/adfs/oauth2/token 

注意:我們將忽略無論是在userInfoUri,但春天的OAuth2似乎需要的東西在那裏。

創建一個新類,AdfsUserInfoTokenServices,您可以在下面複製和調整(您將需要清理一些)。這是Spring類的副本;如果你願意,你可以大概延長了,但我做了足夠的變化,其中似乎沒有像它我得到許多:

package edu.bowdoin.oath2sample; 

import java.util.Base64; 
import java.util.Collections; 
import java.util.List; 
import java.util.Map; 

import org.slf4j.Logger; 
import org.slf4j.LoggerFactory; 
import org.springframework.boot.autoconfigure.security.oauth2.resource.AuthoritiesExtractor; 
import org.springframework.boot.autoconfigure.security.oauth2.resource.FixedAuthoritiesExtractor; 
import org.springframework.boot.autoconfigure.security.oauth2.resource.FixedPrincipalExtractor; 
import org.springframework.boot.autoconfigure.security.oauth2.resource.PrincipalExtractor; 
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; 
import org.springframework.security.core.AuthenticationException; 
import org.springframework.security.core.GrantedAuthority; 
import org.springframework.security.oauth2.client.OAuth2RestOperations; 
import org.springframework.security.oauth2.common.DefaultOAuth2AccessToken; 
import org.springframework.security.oauth2.common.OAuth2AccessToken; 
import org.springframework.security.oauth2.common.exceptions.InvalidTokenException; 
import org.springframework.security.oauth2.provider.OAuth2Authentication; 
import org.springframework.security.oauth2.provider.OAuth2Request; 
import org.springframework.security.oauth2.provider.token.ResourceServerTokenServices; 
import org.springframework.util.Assert; 

import com.fasterxml.jackson.core.type.TypeReference; 
import com.fasterxml.jackson.databind.ObjectMapper; 

public class AdfsUserInfoTokenServices implements ResourceServerTokenServices { 

protected final Logger logger = LoggerFactory.getLogger(getClass()); 

private final String userInfoEndpointUrl; 

private final String clientId; 

private String tokenType = DefaultOAuth2AccessToken.BEARER_TYPE; 

private AuthoritiesExtractor authoritiesExtractor = new FixedAuthoritiesExtractor(); 

private PrincipalExtractor principalExtractor = new FixedPrincipalExtractor(); 

public AdfsUserInfoTokenServices(String userInfoEndpointUrl, String clientId) { 
    this.userInfoEndpointUrl = userInfoEndpointUrl; 
    this.clientId = clientId; 
} 

public void setTokenType(String tokenType) { 
    this.tokenType = tokenType; 
} 

public void setRestTemplate(OAuth2RestOperations restTemplate) { 
    // not used 
} 

public void setAuthoritiesExtractor(AuthoritiesExtractor authoritiesExtractor) { 
    Assert.notNull(authoritiesExtractor, "AuthoritiesExtractor must not be null"); 
    this.authoritiesExtractor = authoritiesExtractor; 
} 

public void setPrincipalExtractor(PrincipalExtractor principalExtractor) { 
    Assert.notNull(principalExtractor, "PrincipalExtractor must not be null"); 
    this.principalExtractor = principalExtractor; 
} 

@Override 
public OAuth2Authentication loadAuthentication(String accessToken) 
     throws AuthenticationException, InvalidTokenException { 
    Map<String, Object> map = getMap(this.userInfoEndpointUrl, accessToken); 
    if (map.containsKey("error")) { 
     if (this.logger.isDebugEnabled()) { 
      this.logger.debug("userinfo returned error: " + map.get("error")); 
     } 
     throw new InvalidTokenException(accessToken); 
    } 
    return extractAuthentication(map); 
} 

private OAuth2Authentication extractAuthentication(Map<String, Object> map) { 
    Object principal = getPrincipal(map); 
    List<GrantedAuthority> authorities = this.authoritiesExtractor 
      .extractAuthorities(map); 
    OAuth2Request request = new OAuth2Request(null, this.clientId, null, true, null, 
      null, null, null, null); 
    UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(
      principal, "N/A", authorities); 
    token.setDetails(map); 
    return new OAuth2Authentication(request, token); 
} 

/** 
* Return the principal that should be used for the token. The default implementation 
* delegates to the {@link PrincipalExtractor}. 
* @param map the source map 
* @return the principal or {@literal "unknown"} 
*/ 
protected Object getPrincipal(Map<String, Object> map) { 
    Object principal = this.principalExtractor.extractPrincipal(map); 
    return (principal == null ? "unknown" : principal); 
} 

@Override 
public OAuth2AccessToken readAccessToken(String accessToken) { 
    throw new UnsupportedOperationException("Not supported: read access token"); 
} 

private Map<String, Object> getMap(String path, String accessToken) { 
    if (this.logger.isDebugEnabled()) { 
     this.logger.debug("Getting user info from: " + path); 
    } 
    try { 
     DefaultOAuth2AccessToken token = new DefaultOAuth2AccessToken(
       accessToken); 
     token.setTokenType(this.tokenType); 

     logger.debug("Token value: " + token.getValue()); 

     String jwtBase64 = token.getValue().split("\\.")[1]; 

     logger.debug("Token: Encoded JWT: " + jwtBase64); 
     logger.debug("Decode: " + Base64.getDecoder().decode(jwtBase64.getBytes())); 

     String jwtJson = new String(Base64.getDecoder().decode(jwtBase64.getBytes())); 

     ObjectMapper mapper = new ObjectMapper(); 

     return mapper.readValue(jwtJson, new TypeReference<Map<String, Object>>(){}); 
    } 
    catch (Exception ex) { 
     this.logger.warn("Could not fetch user details: " + ex.getClass() + ", " 
       + ex.getMessage()); 
     return Collections.<String, Object>singletonMap("error", 
       "Could not fetch user details"); 
    } 
} 
} 

的GetMap操作方法,其中令牌值進行分析,而JWT格式的用戶信息是提取和解碼(錯誤檢查可以在這裏得到改進,這是一個粗略的草案,但給你的要點)。見朝着這個鏈接的信息,對ADFS如何令牌中嵌入數據底部:https://blogs.technet.microsoft.com/askpfeplat/2014/11/02/adfs-deep-dive-comparing-ws-fed-saml-and-oauth/

添加到您的配置:

@Autowired 
private ResourceServerProperties sso; 

@Bean 
public ResourceServerTokenServices userInfoTokenServices() { 
    return new AdfsUserInfoTokenServices(sso.getUserInfoUri(), sso.getClientId()); 
} 

現在按照這些指令設置的第一部分ADFS客戶端和依賴方信任https://vcsjones.com/2015/05/04/authenticating-asp-net-5-to-ad-fs-oauth/

您需要將信賴方信任的id添加到屬性文件userAuthorizationUri中作爲參數'resource'的值。

聲明規則:

如果你不希望有創建自己的PrincipalExtractor或AuthoritiesExtractor(見AdfsUserInfoTokenServices代碼),設置屬性無論您正在使用的用戶名(如SAM-帳戶 - 名稱),以便它具有傳出聲明類型「用戶名」。在爲組創建聲明規則時,請確保聲明類型是「權限」(ADFS只是讓我鍵入該聲明,不存在該名稱的現有聲明類型)。否則,您可以編寫提取器來處理ADFS索賠類型。

一旦完成了這一切,你應該有一個工作的例子。這裏有很多細節,但是一旦你把它弄清楚了,它不會太糟糕(比讓SAML使用ADFS更容易)。關鍵是瞭解ADFS將數據嵌入到OAuth2令牌中的方式,並瞭解如何使用UserInfoTokenServices對象。希望這可以幫助別人。

+0

這可以用來集成OAuth2 + ADFS的Spring Rest API嗎? –

+1

@Ashika,我不確定。我認爲它目前僅限於使用表單登錄,這對於單獨使用rest api來說是不允許的。微軟正在MS Server 2016中添加新功能,該功能可能提供以下功能:https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/development/enabling-oauth-confidential-clients-with -ad-FS-2016 –

0

@Erik,這是一個非常好的解釋,說明如何使用ADFS作爲身份和授權提供者。我偶然發現的事情是在JWT令牌中獲得「upn」和「email」信息。這是解碼JWT信息我收到 -

2017-07-13 19:43:15.548 INFO 3848 --- [nio-8080-exec-7] c.e.demo.AdfsUserInfoTokenServices  : Decoded JWT: {"aud":"http://localhost:8080/web-app","iss":"http://adfs1.example.com/adfs/services/trust","iat":1500000192,"exp":1500003792,"apptype":"Confidential","appid":"1fd9b444-8ba4-4d82-942e-91aaf79f5fd0","authmethod":"urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport","auth_time":"2017-07-14T02:43:12.570Z","ver":"1.0"} 

但加入後兩個電子郵件-ID和UPN在根據「發行轉換規則」,並加入「發送LDAP屬性爲索賠」權利規則以發送用戶委託 - 以user_id命名(在FixedPrincipalExtractor - Spring安全性PRINCIPAL_KETS上)我能夠記錄用於在我的UI應用程序上登錄的user_id。這裏是解碼的智威湯遜職位添加聲明規則 -

2017-07-13 20:16:05.918 INFO 8048 --- [nio-8080-exec-3] c.e.demo.AdfsUserInfoTokenServices  : Decoded JWT: {"aud":"http://localhost:8080/web-app","iss":"http://adfs1.example.com/adfs/services/trust","iat":1500002164,"exp":1500005764,"upn":"[email protected]","apptype":"Confidential","appid":"1fd9b444-8ba4-4d82-942e-91aaf79f5fd0","authmethod":"urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport","auth_time":"2017-07-14T03:16:04.745Z","ver":"1.0"}