Spring Security OAuth 自定义授权方式实现手机验证码

网友投稿 582 2022-11-04


Spring Security OAuth 自定义授权方式实现手机验证码

Spring Security OAuth 默认提供OAuth2.0 的四大基本授权方式(authorization_code\implicit\password\client_credential),除此之外我们也能够自定义授权方式。

先了解一下Spring Security OAuth提供的两个默认 Endpoints,一个是AuthorizationEndpoint,这个是仅用于授权码(authorization_code)和简化(implicit)模式的。另外一个是TokenEndpoint,用于OAuth2授权时下发Token,根据授予类型(GrantType)的不同而执行不同的验证方式。

OAuth2协议这里就不做过多介绍了,比较重要的一点是理解认证中各个角色的作用,以及认证的目的(获取用户信息或是具备使用API的权限)。例如在authorization_code模式下,用户(User)在认证服务的网站上进行登录,网站跳转回第三方应用(Client),第三方应用通过Secret和Code换取Token后向资源服务请求用户信息;而在client_credential模式下,第三方应用通过Secret直接获得Token后可以直接利用其访问资源API。所以我们应该根据实际的情景选择适合的认证模式。

对于手机验证码的认证模式,我们首先提出短信验证的通常需求:

每发一次验证码只能尝试验证5次,防止暴力破解

限制验证码发送频率,单个用户(这里简单使用手机号区分)1分钟1条,24小时x条

限制验证码有效期,15分钟

我们根据业务需求构造出对应的模型:

@Data

public class SmsVerificationModel {

/**

* 手机号

*/

private String phoneNumber;

/**

* 验证码

*/

private String captcha;

/**

* 本次验证码验证失败次数,防止暴力尝试

*/

private Integer failCount;

/**

* 该user当日尝试次数,防止滥发短信

*/

private Integer dailyCount;

/**

* 限制短信发送频率和实现验证码有效期

*/

private Date lastSentTime;

/**

* 是否验证成功

*/

private Boolean verified = false;

}

我们预想的认证流程:

接下来要对Spring Security OAuth进行定制,这里直接仿照一个比较相似的password模式,首先需要编写一个新的TokenGranter,处理sms类型下的TokenRequest,这个SmsTokenGranter会生成SmsAuthenticationToken,并将AuthenticationToken交由SmsAuthenticationProvider进行验证,验证成功后生成通过验证的SmsAuthenticationToken,完成Token的颁发。

public class SmsTokenGranter extends AbstractTokenGranter {

private static final String GRANT_TYPE = "sms";

private final AuthenticationManager authenticationManager;

public SmsTokenGranter(AuthenticationManager authenticationManager, AuthorizationServerTokenServices tokenServices,

ClientDetailsService clientDetailsService, OAuth2RequestFactory requestFactory){

super(tokenServices, clientDetailsService, requestFactory, GRANT_TYPE);

this.authenticationManager = authenticationManager;

}

@Override

protected OAuth2Authentication getOAuth2Authentication(ClientDetails client, TokenRequest tokenRequest) {

Map parameters = new LinkedHashMap<>(tokenRequest.getRequestParameters());

String phone = parameters.get("phone");

String code = parameters.get("code");

Authentication userAuth = new SmsAuthenticationToken(phone, code);

try {

userAuth = authenticationManager.authenticate(userAuth);

}

catch (AccountStatusException ase) {

throw new InvalidGrantException(ase.getMessage());

}

catch (BadCredentialsException e) {

throw new InvalidGrantException(e.getMessage());

}

if (userAuth == null || !userAuth.isAuthenticated()) {

throw new InvalidGrantException("Could not authenticate user: " + username);

}

OAuth2Request storedOAuth2Request = getRequestFactory().createOAuth2Request(client, tokenRequest);

return new OAuth2Authentication(storedOAuth2Request, userAuth);

}

}

对应的SmsAuthenticationToken,其中一个构造方法是认证后的。

public class SmsAuthenticationToken extends AbstractAuthenticationToken {

private final Object principal;

private Object credentials;

public SmsAuthenticationToken(Object principal, Object credentials) {

super(null);

this.credentials = credentials;

this.principal = principal;

}

public SmsAuthenticationToken(Object principal, Object credentials,

Collection extends GrantedAuthority> authorities) {

super(authorities);

this.principal = principal;

this.credentials = credentials;

// 表示已经认证

super.setAuthenticated(true);

}

...

}

SmsAuthenticationProvider是仿照AbstractUserDetailsAuthenticationProvider编写的,这里仅仅列出核心部分。

public class SmsAuthenticationProvider implements AuthenticationProvider {

@Override

public Authentication authenticate(Authentication authentication)

throws AuthenticationException {

String username = authentication.getName();

UserDetails user = retrieveUser(username);

preAuthenticationChecks.check(user);

String phoneNumber = authentication.getPrincipal().toString();

String code = authentication.getCredentials().toString();

// 尝试从Redis中取出Model

SmsVerificationModel verificationModel =

Optional.ofNullable(

redisService.get(SMS_REDIS_PREFIX + phoneNumber, SmsVerificationModel.class))

.orElseThrow(() -> new BusinessException(OAuthError.SMS_VERIFY_BEFORE_SEND));

// 判断短信验证次数

Optional.of(verificationModel).filter(x -> x.getFailCount() < SMS_VERIFY_FAIL_MAX_TIMES)

.orElseThrow(() -> new BusinessException(OAuthError.SMS_VERIFY_COUNT_EXCEED));

Optional.of(verificationModel).map(SmsVerificationModel::getLastSentTime)

// 验证码发送15分钟内有效,等价于发送时间加上15分钟晚于当下

.filter(x -> DateUtils.addMinutes(x,15).after(new Date()))

.orElseThrow(() -> new BusinessException(OAuthError.SMS_CODE_EXPIRED));

verificationModel.setVerified(Objects.equals(code, verificationModel.getCaptcha()));

verificationModel.setFailCount(verificationModel.getFailCount() + 1);

redisService.set(SMS_REDIS_PREFIX + phoneNumber, verificationModel, 1, TimeUnit.DAYS);

if(!verificationModel.getVerified()){

throw new BusinessException(OAuthError.SmsCodeWrong);

}

postAuthenticationChecks.check(user);

return createSuccessAuthentication(user, authentication, user);

}

...

接下来要通过配置启用我们定制的类,首先配置AuthorizationServerEndpointsConfigurer,添加上我们的TokenGranter,然后是AuthenticationManagerBuilder,添加我们的AuthenticationProvider。

@Configuration

@EnableAuthorizationServer

public class OAuth2Config extends AuthorizationServerConfigurerAdapter {

@Override

public void configure(AuthorizationServerSecurityConfigurer security) throws Exception {

security

.passwordEncoder(passwordEncoder)

.checkTokenAccess("isAuthenticated()")

.tokenKeyAccess("permitAll()")

// 允许使用Query字段验证客户端,即client_id/client_secret 能够放在查询参数中

.allowFormAuthenticationForClients();

}

@Override

public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {

endpoints.authenticationManager(authenticationManager)

.userDetailsService(userDetailsService)

.tokenStore(tokenStore);

List tokenGranters = new ArrayList<>();

tokenGranters.add(new AuthorizationCodeTokenGranter(endpoints.getTokenServices(), endpoints.getAuthorizationCodeServices(), clientDetailsService,

endpoints.getOAuth2RequestFactory()));

...

tokenGranters.add(new SmsTokenGranter(authenticationManager, endpoints.getTokenServices(),

clientDetailsService, endpoints.getOAuth2RequestFactory()));

endpoints.tokenGranter(new CompositeTokenGranter(tokenGranters));

}

}

@EnableWebSecurity

@Configuration

public class SecurityConfig extends WebSecurityConfigurerAdapter {

...

@Override

protected void configure(AuthenticationManagerBuilder auth) {

auth.authenticationProvider(daoAuthenticationProvider());

}

@Bean

public AuthenticationProvider smsAuthenticationProvider(){

SmsAuthenticationProvider smsAuthenticationProvider = new SmsAuthenticationProvider();

smsAuthenticationProvider.setUserDetailsService(userDetailsService);

smsAuthenticationProvider.setSmsAuthService(smsAuthService);

return smsAuthenticatioqsdFxeGyHnProvider;

}

}

那么短信验证码授权的部分就到这里了,最后还有一个发送短信的接口,这里就不展示了。

最后测试一下,curl --location --request POST 'http://localhost:8080/oauth/token?grant_type=sms&client_id=XXX&phone=手机号&code=验证码' ,成功。

{

"access_token": "39bafa9a-7e5b-4ba4-9eda-e307ac98aad1",

"token_type": "bearer",

"expires_in": 3599,

"scope": "ALL"

}


版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。

上一篇:英雄联盟战绩查询API(英雄联盟战绩查询用什么软件)
下一篇:spring boot打造的websocket服务器端中类自动实例化问题
相关文章

 发表评论

暂时没有评论,来抢沙发吧~