public class DaoAuthenticationProvider extends AbstractUserDetailsAuthenticationProvider
AuthenticationProvider
implementation that retrieves user details from a
UserDetailsService
.hideUserNotFoundExceptions, logger, messages
Constructor and Description |
---|
DaoAuthenticationProvider() |
Modifier and Type | Method and Description |
---|---|
protected void |
additionalAuthenticationChecks(UserDetails userDetails,
UsernamePasswordAuthenticationToken authentication)
Allows subclasses to perform any additional checks of a returned (or cached)
UserDetails for a given authentication request. |
protected void |
doAfterPropertiesSet() |
protected PasswordEncoder |
getPasswordEncoder() |
protected SaltSource |
getSaltSource() |
protected UserDetailsService |
getUserDetailsService() |
protected UserDetails |
retrieveUser(String username,
UsernamePasswordAuthenticationToken authentication)
Allows subclasses to actually retrieve the
UserDetails from an
implementation-specific location, with the option of throwing an
AuthenticationException immediately if the presented credentials are
incorrect (this is especially useful if it is necessary to bind to a resource as
the user in order to obtain or generate a UserDetails ). |
void |
setPasswordEncoder(Object passwordEncoder)
Sets the PasswordEncoder instance to be used to encode and validate passwords.
|
void |
setSaltSource(SaltSource saltSource)
The source of salts to use when decoding passwords.
|
void |
setUserDetailsService(UserDetailsService userDetailsService) |
afterPropertiesSet, authenticate, createSuccessAuthentication, getPostAuthenticationChecks, getPreAuthenticationChecks, getUserCache, isForcePrincipalAsString, isHideUserNotFoundExceptions, setAuthoritiesMapper, setForcePrincipalAsString, setHideUserNotFoundExceptions, setMessageSource, setPostAuthenticationChecks, setPreAuthenticationChecks, setUserCache, supports
protected void additionalAuthenticationChecks(UserDetails userDetails, UsernamePasswordAuthenticationToken authentication) throws AuthenticationException
AbstractUserDetailsAuthenticationProvider
UserDetails
for a given authentication request. Generally a subclass
will at least compare the Authentication.getCredentials()
with a
UserDetails.getPassword()
. If custom logic is needed to compare additional
properties of UserDetails
and/or
UsernamePasswordAuthenticationToken
, these should also appear in this
method.additionalAuthenticationChecks
in class AbstractUserDetailsAuthenticationProvider
userDetails
- as retrieved from the
AbstractUserDetailsAuthenticationProvider.retrieveUser(String, UsernamePasswordAuthenticationToken)
or
UserCache
authentication
- the current request that needs to be authenticatedAuthenticationException
- AuthenticationException if the credentials could
not be validated (generally a BadCredentialsException
, an
AuthenticationServiceException
)protected void doAfterPropertiesSet() throws Exception
doAfterPropertiesSet
in class AbstractUserDetailsAuthenticationProvider
Exception
protected final UserDetails retrieveUser(String username, UsernamePasswordAuthenticationToken authentication) throws AuthenticationException
AbstractUserDetailsAuthenticationProvider
UserDetails
from an
implementation-specific location, with the option of throwing an
AuthenticationException
immediately if the presented credentials are
incorrect (this is especially useful if it is necessary to bind to a resource as
the user in order to obtain or generate a UserDetails
).
Subclasses are not required to perform any caching, as the
AbstractUserDetailsAuthenticationProvider
will by default cache the
UserDetails
. The caching of UserDetails
does present
additional complexity as this means subsequent requests that rely on the cache will
need to still have their credentials validated, even if the correctness of
credentials was assured by subclasses adopting a binding-based strategy in this
method. Accordingly it is important that subclasses either disable caching (if they
want to ensure that this method is the only method that is capable of
authenticating a request, as no UserDetails
will ever be cached) or
ensure subclasses implement
AbstractUserDetailsAuthenticationProvider.additionalAuthenticationChecks(UserDetails, UsernamePasswordAuthenticationToken)
to compare the credentials of a cached UserDetails
with subsequent
authentication requests.
Most of the time subclasses will not perform credentials inspection in this method,
instead performing it in
AbstractUserDetailsAuthenticationProvider.additionalAuthenticationChecks(UserDetails, UsernamePasswordAuthenticationToken)
so that code related to credentials validation need not be duplicated across two
methods.
retrieveUser
in class AbstractUserDetailsAuthenticationProvider
username
- The username to retrieveauthentication
- The authentication request, which subclasses may
need to perform a binding-based retrieval of the UserDetails
null
- instead an exception should
the thrown)AuthenticationException
- if the credentials could not be validated
(generally a BadCredentialsException
, an
AuthenticationServiceException
or
UsernameNotFoundException
)public void setPasswordEncoder(Object passwordEncoder)
For systems which are already using salted password which are encoded with a
previous release, the encoder should be of type
org.springframework.security.authentication.encoding.PasswordEncoder
.
Otherwise, the recommended approach is to use
org.springframework.security.crypto.password.PasswordEncoder
.
passwordEncoder
- must be an instance of one of the PasswordEncoder
types.protected PasswordEncoder getPasswordEncoder()
public void setSaltSource(SaltSource saltSource)
null
is a valid
value, meaning the DaoAuthenticationProvider
will present
null
to the relevant PasswordEncoder
.
Instead, it is recommended that you use an encoder which uses a random salt and
combines it with the password field. This is the default approach taken in the
org.springframework.security.crypto.password
package.
saltSource
- to use when attempting to decode passwords via the
PasswordEncoder
protected SaltSource getSaltSource()
public void setUserDetailsService(UserDetailsService userDetailsService)
protected UserDetailsService getUserDetailsService()