<tfoot id='CWskv'></tfoot>
      • <bdo id='CWskv'></bdo><ul id='CWskv'></ul>
      <legend id='CWskv'><style id='CWskv'><dir id='CWskv'><q id='CWskv'></q></dir></style></legend>

    1. <small id='CWskv'></small><noframes id='CWskv'>

    2. <i id='CWskv'><tr id='CWskv'><dt id='CWskv'><q id='CWskv'><span id='CWskv'><b id='CWskv'><form id='CWskv'><ins id='CWskv'></ins><ul id='CWskv'></ul><sub id='CWskv'></sub></form><legend id='CWskv'></legend><bdo id='CWskv'><pre id='CWskv'><center id='CWskv'></center></pre></bdo></b><th id='CWskv'></th></span></q></dt></tr></i><div id='CWskv'><tfoot id='CWskv'></tfoot><dl id='CWskv'><fieldset id='CWskv'></fieldset></dl></div>

      如何使用 Spring Security 对 Active Directory 服务器进行身份验证?

      时间:2024-05-10
        <bdo id='UqSw9'></bdo><ul id='UqSw9'></ul>

            <tbody id='UqSw9'></tbody>

          <tfoot id='UqSw9'></tfoot>
        • <i id='UqSw9'><tr id='UqSw9'><dt id='UqSw9'><q id='UqSw9'><span id='UqSw9'><b id='UqSw9'><form id='UqSw9'><ins id='UqSw9'></ins><ul id='UqSw9'></ul><sub id='UqSw9'></sub></form><legend id='UqSw9'></legend><bdo id='UqSw9'><pre id='UqSw9'><center id='UqSw9'></center></pre></bdo></b><th id='UqSw9'></th></span></q></dt></tr></i><div id='UqSw9'><tfoot id='UqSw9'></tfoot><dl id='UqSw9'><fieldset id='UqSw9'></fieldset></dl></div>
            • <small id='UqSw9'></small><noframes id='UqSw9'>

                <legend id='UqSw9'><style id='UqSw9'><dir id='UqSw9'><q id='UqSw9'></q></dir></style></legend>
              1. 本文介绍了如何使用 Spring Security 对 Active Directory 服务器进行身份验证?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着跟版网的小编来一起学习吧!

                问题描述

                我正在编写一个需要用户登录的 Spring Web 应用程序.我的公司有一台 Active Directory 服务器,我想将其用于此目的.但是,我在使用 Spring Security 连接到服务器时遇到了问题.

                I'm writing a Spring web application that requires users to login. My company has an Active Directory server that I'd like to make use of for this purpose. However, I'm having trouble using Spring Security to connect to the server.

                我正在使用 Spring 2.5.5 和 Spring Security 2.0.3,以及 Java 1.6.

                I'm using Spring 2.5.5 and Spring Security 2.0.3, along with Java 1.6.

                如果我将 LDAP URL 更改为错误的 IP 地址,它不会抛出异常或任何东西,所以我想知道它是否甚至 尝试 开始连接到服务器.

                If I change the LDAP URL to the wrong IP address, it doesn't throw an exception or anything, so I'm wondering if it's even trying to connect to the server to begin with.

                虽然 Web 应用程序启动得很好,但我在登录页面中输入的任何信息都会被拒绝.我之前使用过一个 InMemoryDaoImpl,它工作得很好,所以我的应用程序的其余部分似乎配置正确.

                Although the web application starts up just fine, any information I enter into the login page is rejected. I had previously used an InMemoryDaoImpl, which worked fine, so the rest of my application seems to be configured correctly.

                这是我的安全相关 bean:

                Here are my security-related beans:

                  <beans:bean id="ldapAuthProvider" class="org.springframework.security.providers.ldap.LdapAuthenticationProvider">
                    <beans:constructor-arg>
                      <beans:bean class="org.springframework.security.providers.ldap.authenticator.BindAuthenticator">
                        <beans:constructor-arg ref="initialDirContextFactory" />
                        <beans:property name="userDnPatterns">
                          <beans:list>
                            <beans:value>CN={0},OU=SBSUsers,OU=Users,OU=MyBusiness,DC=Acme,DC=com</beans:value>
                          </beans:list>
                        </beans:property>
                      </beans:bean>
                    </beans:constructor-arg>
                  </beans:bean>
                
                  <beans:bean id="userDetailsService" class="org.springframework.security.userdetails.ldap.LdapUserDetailsManager">
                    <beans:constructor-arg ref="initialDirContextFactory" />
                  </beans:bean>
                
                  <beans:bean id="initialDirContextFactory" class="org.springframework.security.ldap.DefaultInitialDirContextFactory">
                    <beans:constructor-arg value="ldap://192.168.123.456:389/DC=Acme,DC=com" />
                  </beans:bean>
                

                推荐答案

                我有同样的 banging-my-head-against-the-wall 体验,并最终编写了一个自定义身份验证提供程序来执行 LDAP 查询Active Directory 服务器.

                I had the same banging-my-head-against-the-wall experience you did, and ended up writing a custom authentication provider that does an LDAP query against the Active Directory server.

                所以我与安全相关的 bean 是:

                So my security-related beans are:

                <beans:bean id="contextSource"
                    class="org.springframework.security.ldap.DefaultSpringSecurityContextSource">
                    <beans:constructor-arg value="ldap://hostname.queso.com:389/" />
                </beans:bean>
                
                <beans:bean id="ldapAuthenticationProvider"
                    class="org.queso.ad.service.authentication.LdapAuthenticationProvider">
                    <beans:property name="authenticator" ref="ldapAuthenticator" />
                    <custom-authentication-provider />
                </beans:bean>
                
                <beans:bean id="ldapAuthenticator"
                    class="org.queso.ad.service.authentication.LdapAuthenticatorImpl">
                    <beans:property name="contextFactory" ref="contextSource" />
                    <beans:property name="principalPrefix" value="QUESO" />
                </beans:bean>
                

                然后是 LdapAuthenticationProvider 类:

                Then the LdapAuthenticationProvider class:

                /**
                 * Custom Spring Security authentication provider which tries to bind to an LDAP server with
                 * the passed-in credentials; of note, when used with the custom {@link LdapAuthenticatorImpl},
                 * does <strong>not</strong> require an LDAP username and password for initial binding.
                 * 
                 * @author Jason
                 */
                public class LdapAuthenticationProvider implements AuthenticationProvider {
                
                    private LdapAuthenticator authenticator;
                
                    public Authentication authenticate(Authentication auth) throws AuthenticationException {
                
                        // Authenticate, using the passed-in credentials.
                        DirContextOperations authAdapter = authenticator.authenticate(auth);
                
                        // Creating an LdapAuthenticationToken (rather than using the existing Authentication
                        // object) allows us to add the already-created LDAP context for our app to use later.
                        LdapAuthenticationToken ldapAuth = new LdapAuthenticationToken(auth, "ROLE_USER");
                        InitialLdapContext ldapContext = (InitialLdapContext) authAdapter
                                .getObjectAttribute("ldapContext");
                        if (ldapContext != null) {
                            ldapAuth.setContext(ldapContext);
                        }
                
                        return ldapAuth;
                    }
                
                    public boolean supports(Class clazz) {
                        return (UsernamePasswordAuthenticationToken.class.isAssignableFrom(clazz));
                    }
                
                    public LdapAuthenticator getAuthenticator() {
                        return authenticator;
                    }
                
                    public void setAuthenticator(LdapAuthenticator authenticator) {
                        this.authenticator = authenticator;
                    }
                
                }
                

                然后是 LdapAuthenticatorImpl 类:

                Then the LdapAuthenticatorImpl class:

                /**
                 * Custom Spring Security LDAP authenticator which tries to bind to an LDAP server using the
                 * passed-in credentials; does <strong>not</strong> require "master" credentials for an
                 * initial bind prior to searching for the passed-in username.
                 * 
                 * @author Jason
                 */
                public class LdapAuthenticatorImpl implements LdapAuthenticator {
                
                    private DefaultSpringSecurityContextSource contextFactory;
                    private String principalPrefix = "";
                
                    public DirContextOperations authenticate(Authentication authentication) {
                
                        // Grab the username and password out of the authentication object.
                        String principal = principalPrefix + authentication.getName();
                        String password = "";
                        if (authentication.getCredentials() != null) {
                            password = authentication.getCredentials().toString();
                        }
                
                        // If we have a valid username and password, try to authenticate.
                        if (!("".equals(principal.trim())) && !("".equals(password.trim()))) {
                            InitialLdapContext ldapContext = (InitialLdapContext) contextFactory
                                    .getReadWriteContext(principal, password);
                
                            // We need to pass the context back out, so that the auth provider can add it to the
                            // Authentication object.
                            DirContextOperations authAdapter = new DirContextAdapter();
                            authAdapter.addAttributeValue("ldapContext", ldapContext);
                
                            return authAdapter;
                        } else {
                            throw new BadCredentialsException("Blank username and/or password!");
                        }
                    }
                
                    /**
                     * Since the InitialLdapContext that's stored as a property of an LdapAuthenticationToken is
                     * transient (because it isn't Serializable), we need some way to recreate the
                     * InitialLdapContext if it's null (e.g., if the LdapAuthenticationToken has been serialized
                     * and deserialized). This is that mechanism.
                     * 
                     * @param authenticator
                     *          the LdapAuthenticator instance from your application's context
                     * @param auth
                     *          the LdapAuthenticationToken in which to recreate the InitialLdapContext
                     * @return
                     */
                    static public InitialLdapContext recreateLdapContext(LdapAuthenticator authenticator,
                            LdapAuthenticationToken auth) {
                        DirContextOperations authAdapter = authenticator.authenticate(auth);
                        InitialLdapContext context = (InitialLdapContext) authAdapter
                                .getObjectAttribute("ldapContext");
                        auth.setContext(context);
                        return context;
                    }
                
                    public DefaultSpringSecurityContextSource getContextFactory() {
                        return contextFactory;
                    }
                
                    /**
                     * Set the context factory to use for generating a new LDAP context.
                     * 
                     * @param contextFactory
                     */
                    public void setContextFactory(DefaultSpringSecurityContextSource contextFactory) {
                        this.contextFactory = contextFactory;
                    }
                
                    public String getPrincipalPrefix() {
                        return principalPrefix;
                    }
                
                    /**
                     * Set the string to be prepended to all principal names prior to attempting authentication
                     * against the LDAP server.  (For example, if the Active Directory wants the domain-name-plus
                     * backslash prepended, use this.)
                     * 
                     * @param principalPrefix
                     */
                    public void setPrincipalPrefix(String principalPrefix) {
                        if (principalPrefix != null) {
                            this.principalPrefix = principalPrefix;
                        } else {
                            this.principalPrefix = "";
                        }
                    }
                
                }
                

                最后是 LdapAuthenticationToken 类:

                And finally, the LdapAuthenticationToken class:

                /**
                 * <p>
                 * Authentication token to use when an app needs further access to the LDAP context used to
                 * authenticate the user.
                 * </p>
                 * 
                 * <p>
                 * When this is the Authentication object stored in the Spring Security context, an application
                 * can retrieve the current LDAP context thusly:
                 * </p>
                 * 
                 * <pre>
                 * LdapAuthenticationToken ldapAuth = (LdapAuthenticationToken) SecurityContextHolder
                 *      .getContext().getAuthentication();
                 * InitialLdapContext ldapContext = ldapAuth.getContext();
                 * </pre>
                 * 
                 * @author Jason
                 * 
                 */
                public class LdapAuthenticationToken extends AbstractAuthenticationToken {
                
                    private static final long serialVersionUID = -5040340622950665401L;
                
                    private Authentication auth;
                    transient private InitialLdapContext context;
                    private List<GrantedAuthority> authorities = new ArrayList<GrantedAuthority>();
                
                    /**
                     * Construct a new LdapAuthenticationToken, using an existing Authentication object and
                     * granting all users a default authority.
                     * 
                     * @param auth
                     * @param defaultAuthority
                     */
                    public LdapAuthenticationToken(Authentication auth, GrantedAuthority defaultAuthority) {
                        this.auth = auth;
                        if (auth.getAuthorities() != null) {
                            this.authorities.addAll(Arrays.asList(auth.getAuthorities()));
                        }
                        if (defaultAuthority != null) {
                            this.authorities.add(defaultAuthority);
                        }
                        super.setAuthenticated(true);
                    }
                
                    /**
                     * Construct a new LdapAuthenticationToken, using an existing Authentication object and
                     * granting all users a default authority.
                     * 
                     * @param auth
                     * @param defaultAuthority
                     */
                    public LdapAuthenticationToken(Authentication auth, String defaultAuthority) {
                        this(auth, new GrantedAuthorityImpl(defaultAuthority));
                    }
                
                    public GrantedAuthority[] getAuthorities() {
                        GrantedAuthority[] authoritiesArray = this.authorities.toArray(new GrantedAuthority[0]);
                        return authoritiesArray;
                    }
                
                    public void addAuthority(GrantedAuthority authority) {
                        this.authorities.add(authority);
                    }
                
                    public Object getCredentials() {
                        return auth.getCredentials();
                    }
                
                    public Object getPrincipal() {
                        return auth.getPrincipal();
                    }
                
                    /**
                     * Retrieve the LDAP context attached to this user's authentication object.
                     * 
                     * @return the LDAP context
                     */
                    public InitialLdapContext getContext() {
                        return context;
                    }
                
                    /**
                     * Attach an LDAP context to this user's authentication object.
                     * 
                     * @param context
                     *          the LDAP context
                     */
                    public void setContext(InitialLdapContext context) {
                        this.context = context;
                    }
                
                }
                

                您会注意到其中有一些您可能不需要的位.

                You'll notice that there are a few bits in there that you might not need.

                例如,我的应用需要保留成功登录的 LDAP 上下文以供用户在登录后进一步使用——该应用的目的是让用户通过其 AD 凭据登录,然后执行进一步的与 AD 相关的操作职能.因此,因此,我有一个自定义身份验证令牌 LdapAuthenticationToken,我可以传递它(而不是 Spring 的默认身份验证令牌),它允许我附加 LDAP 上下文.在 LdapAuthenticationProvider.authenticate() 中,我创建了该令牌并将其传回;在 LdapAuthenticatorImpl.authenticate() 中,我将登录的上下文附加到返回对象,以便可以将其添加到用户的 Spring 身份验证对象中.

                For example, my app needed to retain the successfully-logged-in LDAP context for further use by the user once logged in -- the app's purpose is to let users log in via their AD credentials and then perform further AD-related functions. So because of that, I have a custom authentication token, LdapAuthenticationToken, that I pass around (rather than Spring's default Authentication token) which allows me to attach the LDAP context. In LdapAuthenticationProvider.authenticate(), I create that token and pass it back out; in LdapAuthenticatorImpl.authenticate(), I attach the logged-in context to the return object so that it can be added to the user's Spring authentication object.

                另外,在 LdapAuthenticationProvider.authenticate() 中,我为所有登录用户分配了 ROLE_USER 角色——这让我可以在我的拦截 url 元素中测试该角色.您需要匹配您要测试的任何角色,甚至根据 Active Directory 组或其他任何角色分配角色.

                Also, in LdapAuthenticationProvider.authenticate(), I assign all logged-in users the ROLE_USER role -- that's what lets me then test for that role in my intercept-url elements. You'll want to make this match whatever role you want to test for, or even assign roles based on Active Directory groups or whatever.

                最后,由此推论,我实现 LdapAuthenticationProvider.authenticate() 的方式为所有拥有有效 AD 帐户的用户提供了相同的 ROLE_USER 角色.显然,在这种方法中,您可以对用户执行进一步的测试(即,用户是否在特定的 AD 组中?)并以这种方式分配角色,甚至在授予用户访问权限之前测试某些条件 all.

                Finally, and a corollary to that, the way I implemented LdapAuthenticationProvider.authenticate() gives all users with valid AD accounts the same ROLE_USER role. Obviously, in that method, you can perform further tests on the user (i.e., is the user in a specific AD group?) and assign roles that way, or even test for some condition before even granting the user access at all.

                这篇关于如何使用 Spring Security 对 Active Directory 服务器进行身份验证?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持跟版网!

                上一篇:Java 升级 8 到 11 导致 LDAPS 连接出现问题(连接或出站已关闭) 下一篇:如何将 AD 组映射到用户角色 Spring Security LDAP

                相关文章

                <tfoot id='hnDkG'></tfoot>

              2. <legend id='hnDkG'><style id='hnDkG'><dir id='hnDkG'><q id='hnDkG'></q></dir></style></legend>

                  <small id='hnDkG'></small><noframes id='hnDkG'>

                    <i id='hnDkG'><tr id='hnDkG'><dt id='hnDkG'><q id='hnDkG'><span id='hnDkG'><b id='hnDkG'><form id='hnDkG'><ins id='hnDkG'></ins><ul id='hnDkG'></ul><sub id='hnDkG'></sub></form><legend id='hnDkG'></legend><bdo id='hnDkG'><pre id='hnDkG'><center id='hnDkG'></center></pre></bdo></b><th id='hnDkG'></th></span></q></dt></tr></i><div id='hnDkG'><tfoot id='hnDkG'></tfoot><dl id='hnDkG'><fieldset id='hnDkG'></fieldset></dl></div>
                    • <bdo id='hnDkG'></bdo><ul id='hnDkG'></ul>