本文整理汇总了Java中org.springframework.security.config.annotation.SecurityConfigurer类的典型用法代码示例。如果您正苦于以下问题:Java SecurityConfigurer类的具体用法?Java SecurityConfigurer怎么用?Java SecurityConfigurer使用的例子?那么恭喜您, 这里精选的类代码示例或许可以为您提供帮助。
SecurityConfigurer类属于org.springframework.security.config.annotation包,在下文中一共展示了SecurityConfigurer类的4个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Java代码示例。
示例1: configure
import org.springframework.security.config.annotation.SecurityConfigurer; //导入依赖的package包/类
@Override
protected void configure(HttpSecurity http) throws Exception {
http.csrf().disable();
http.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
String[] restEndpointsToSecure = { "api/admin"};
for (String endpoint : restEndpointsToSecure) {
http.authorizeRequests().antMatchers("/" + endpoint + "/**").hasRole(CustomUserDetailsService.ROLE_USER);
}
SecurityConfigurer<DefaultSecurityFilterChain, HttpSecurity> securityConfigurerAdapter = new XAuthTokenConfigurer(userDetailsServiceBean());
http.apply(securityConfigurerAdapter);
}
示例2: configure
import org.springframework.security.config.annotation.SecurityConfigurer; //导入依赖的package包/类
@Override
protected void configure(HttpSecurity http) throws Exception {
http.csrf().disable();
http.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
String[] restEndpointsToSecure = { "news"};
for (String endpoint : restEndpointsToSecure) {
http.authorizeRequests().antMatchers("/" + endpoint + "/**").hasRole(CustomUserDetailsService.ROLE_USER);
}
SecurityConfigurer<DefaultSecurityFilterChain, HttpSecurity> securityConfigurerAdapter = new XAuthTokenConfigurer(userDetailsServiceBean());
http.apply(securityConfigurerAdapter);
}
示例3: securityConfigurer
import org.springframework.security.config.annotation.SecurityConfigurer; //导入依赖的package包/类
@Bean
public SecurityConfigurer securityConfigurer() {
return new SpringSocialConfigurer().connectionAddedRedirectUrl("/").postLoginUrl("/").alwaysUsePostLoginUrl(true);
}
示例4: configure
import org.springframework.security.config.annotation.SecurityConfigurer; //导入依赖的package包/类
@Override
public SecurityConfigurer configure() throws Exception {
LOGGER.info("Configuring an LDAP Identity Provider");
LdapAuthenticationProviderConfigurer<AuthenticationManagerBuilder> ldapAuthenticationProviderConfigurer =
new LdapAuthenticationProviderConfigurer<>();
// Create LDAP context
DefaultSpringSecurityContextSource contextSource = new DefaultSpringSecurityContextSource(
environment.getProperty("context-source-url"));
contextSource.setBase(environment.getProperty("context-source-base"));
contextSource.setUserDn(environment.getProperty("context-source-username"));
contextSource.setPassword(environment.getProperty("context-source-password"));
contextSource.afterPropertiesSet();
String userDNPattern = environment.getProperty("user-dn-pattern");
if (userDNPattern == null || userDNPattern.isEmpty()) {
ldapAuthenticationProviderConfigurer
.userSearchBase(environment.getProperty("user-search-base"))
.userSearchFilter(environment.getProperty("user-search-filter"));
} else {
ldapAuthenticationProviderConfigurer.userDnPatterns(userDNPattern);
}
ldapAuthenticationProviderConfigurer
.groupSearchBase(environment.getProperty("group-search-base", ""))
.groupSearchFilter(environment.getProperty("group-search-filter", "(uniqueMember={0})"))
.groupRoleAttribute(environment.getProperty("group-role-attribute", "cn"))
.rolePrefix("");
DefaultLdapAuthoritiesPopulator populator = new DefaultLdapAuthoritiesPopulator(contextSource,
environment.getProperty("group-search-base", ""));
populator.setRolePrefix("");
ldapAuthenticationProviderConfigurer.ldapAuthoritiesPopulator(populator).contextSource(contextSource);
// set up LDAP mapper
UserDetailsContextPropertiesMapper userDetailsContextPropertiesMapper = new UserDetailsContextPropertiesMapper();
userDetailsContextPropertiesMapper.setEnvironment(environment);
userDetailsContextPropertiesMapper.afterPropertiesSet();
ldapAuthenticationProviderConfigurer.userDetailsContextMapper(userDetailsContextPropertiesMapper);
return ldapAuthenticationProviderConfigurer;
}