经过一番混乱之后,我找到了一个实现custom的解决方案
jwtAuthenticationConverter,该解决方案可以将特定于资源的角色添加到Authority集合中。
http.oauth2ResourceServer() .jwt() .jwtAuthenticationConverter(new JwtAuthenticationConverter() { @Override protected Collection<GrantedAuthority> extractAuthorities(final Jwt jwt) { Collection<GrantedAuthority> authorities = super.extractAuthorities(jwt); Map<String, Object> resourceAccess = jwt.getClaim("resource_access"); Map<String, Object> resource = null; Collection<String> resourceRoles = null; if (resourceAccess != null && (resource = (Map<String, Object>) resourceAccess.get("my-resource-id")) != null && (resourceRoles = (Collection<String>) resource.get("roles")) != null) authorities.addAll(resourceRoles.stream() .map(x -> new SimpleGrantedAuthority("ROLE_" + x)) .collect(Collectors.toSet())); return authorities; } });其中 my-resource-id 既是出现在 resource_access 声明中的资源标识符,也是与
ResourceServerSecurityConfigurer中 与API关联的值。
请注意,
extractAuthorities它实际上已被弃用,因此应采用成熟的转换器来实现更面向未来的解决方案
import org.springframework.core.convert.converter.Converter; import org.springframework.security.authentication.AbstractAuthenticationToken; import org.springframework.security.core.GrantedAuthority; import org.springframework.security.core.authority.SimpleGrantedAuthority; import org.springframework.security.oauth2.jwt.Jwt; import org.springframework.security.oauth2.server.resource.authentication.JwtAuthenticationToken; import org.springframework.security.oauth2.server.resource.authentication.JwtGrantedAuthoritiesConverter; import java.util.Collection; import java.util.Collections; import java.util.Map; import java.util.stream.Collectors; import java.util.stream.Stream; public class CustomJwtAuthenticationConverter implements Converter<Jwt, AbstractAuthenticationToken> { private static Collection<? extends GrantedAuthority> extractResourceRoles(final Jwt jwt, final String resourceId) { Map<String, Object> resourceAccess = jwt.getClaim("resource_access"); Map<String, Object> resource; Collection<String> resourceRoles; if (resourceAccess != null && (resource = (Map<String, Object>) resourceAccess.get(resourceId)) != null && (resourceRoles = (Collection<String>) resource.get("roles")) != null) return resourceRoles.stream() .map(x -> new SimpleGrantedAuthority("ROLE_" + x)) .collect(Collectors.toSet()); return Collections.emptySet(); } private final JwtGrantedAuthoritiesConverter defaultGrantedAuthoritiesConverter = new JwtGrantedAuthoritiesConverter(); private final String resourceId; public CustomJwtAuthenticationConverter(String resourceId) { this.resourceId = resourceId; } @Override public AbstractAuthenticationToken convert(final Jwt source) { Collection<GrantedAuthority> authorities = Stream.concat(defaultGrantedAuthoritiesConverter.convert(source) .stream(), extractResourceRoles(source, resourceId).stream()) .collect(Collectors.toSet()); return new JwtAuthenticationToken(source, authorities); } }我已经使用Spring Boot 2.1.9.RELEASE,Spring Security 5.2.0.RELEASE和官方的Keycloak 7.0.0
Docker镜像测试了这两种解决方案。
一般来说,我认为无论实际的授权服务器(即IdentityServer4,Keycloak …)如何,这似乎都是将声明转换为Spring
Security授予的适当位置。



