Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, password and session management.
Shiro has core components, namely Subject, SecurityManager and Realms
Subject: equivalent to the "user of the current operation" "This user is not necessarily a specific person, but an abstract concept, indicating anything that interacts with the current program, such as crawlers, scripts, etc. All Subjects are bound to the SecurityManager, and all interactions with the Subject will be delegated to the SecurityManager; the Subject can be considered as a facade; the SecurityManager is the actual executor.
SecurityManager: This is the core of the shiro framework. All security-related operations will interact with it. It manages all Subjects.
Realms: Acts as a "bridge" between Shiro and application security data. When performing authentication (login) and authorization (access control) verification on users, SecurityManager needs to obtain the corresponding information from Realm. Compare the user's identity to determine whether the user's identity is legitimate; it is also necessary to obtain the user's corresponding role/authority from Realm to verify whether the user can perform operations.
1.2.1. Maven configuration
org.apache.shiro shiro-spring-boot-starter 1.7.1 com.github.theborakompanioni thymeleaf-extras-shiro 2.0.0 org.apache.shiro shiro-ehcache 1.7.1
shiro is used with jsp by default, and here is shiro integrates thymeleaf All jar packages that need to be imported into shiro to integrate thymeleaf
1.2.2. Classes that need to be implemented for integration
Generally speaking, integration only needs to complete two classes Just implement it
One is ShiroConfig and the other is CustomerRealm
If you need to add shiro cache and it is not the built-in cache but the redis cache, you still need Write the other two classes
One is RedisCache and the other is RedisCacheManager
package com.yuwen.config; import at.pollux.thymeleaf.shiro.dialect.ShiroDialect; import com.yuwen.shiro.cache.RedisCacheManager; import com.yuwen.shiro.realm.CustomerRealm; import org.apache.shiro.authc.credential.HashedCredentialsMatcher; import org.apache.shiro.realm.Realm; import org.apache.shiro.spring.web.ShiroFilterFactoryBean; import org.apache.shiro.web.mgt.DefaultWebSecurityManager; import org.springframework.beans.factory.annotation.Qualifier; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import java.util.HashMap; import java.util.Map; @Configuration public class ShiroConfig { //让页面shiro标签生效 @Bean public ShiroDialect shiroDialect(){ return new ShiroDialect(); } //1、创建shiroFilter 负责拦截所有请求 @Bean public ShiroFilterFactoryBean shiroFilterFactoryBean(DefaultWebSecurityManager defaultWebSecurityManager){ ShiroFilterFactoryBean factoryBean = new ShiroFilterFactoryBean(); //给filter设置安全管理 factoryBean.setSecurityManager(defaultWebSecurityManager); //配置系统的受限资源 //配置系统公共资源 全部都能访问的设置anon MapBecause it is generally unsafe to set plain text passwords in the database, I will set the password here. With md5 encryption, my encryption method is: password = password salt hashing times and then MD5 encryption. So when creating a custom realm here, you need to set a matcher so that the password can be matched successfully when logging in. 1.2.5 , Implementation of CustomerRealmmap = new HashMap<>(); map.put("//m.sbmmt.com/m/main","authc");//请求这个资源需要认证和授权 authc表示需要认证后才能访问 map.put("//m.sbmmt.com/m/admin","roles[admin]"); //表示admin角色才能访问 roles[]表示需要什么角色才能访问 map.put("//m.sbmmt.com/m/manage","perms[user:*:*]"); //表示需要user:*:*权限才能访问 perms[]表示需要什么权限才能访问 //访问需要认证的页面如果未登录会跳转到/login路由进行登陆 factoryBean.setLoginUrl("/login"); //访问未授权页面会自动跳转到/unAuth路由 factoryBean.setUnauthorizedUrl("/unAuth"); factoryBean.setFilterChainDefinitionMap(map); return factoryBean; } //2、创建安全管理器 @Bean public DefaultWebSecurityManager defaultWebSecurityManager(@Qualifier("getRealm") Realm realm){ DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager(); //给安全管理器设置 securityManager.setRealm(realm); return securityManager; } //3、创建自定义的realm @Bean public Realm getRealm(){ CustomerRealm customerRealm = new CustomerRealm(); //修改凭证校验匹配器 HashedCredentialsMatcher credentialsMatcher = new HashedCredentialsMatcher(); //设置加密算法为md5 credentialsMatcher.setHashAlgorithmName("MD5"); //设置散列次数 credentialsMatcher.setHashIterations(1024); customerRealm.setCredentialsMatcher(credentialsMatcher); return customerRealm; } }
package com.yuwen.shiro.realm; import com.yuwen.pojo.User; import com.yuwen.pojo.vo.ViewPerms; import com.yuwen.pojo.vo.ViewRole; import com.yuwen.service.UserService; import com.yuwen.shiro.salt.MyByteSource; import org.apache.shiro.authc.AuthenticationException; import org.apache.shiro.authc.AuthenticationInfo; import org.apache.shiro.authc.AuthenticationToken; import org.apache.shiro.authc.SimpleAuthenticationInfo; import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.authz.SimpleAuthorizationInfo; import org.apache.shiro.realm.AuthorizingRealm; import org.apache.shiro.subject.PrincipalCollection; import org.apache.shiro.util.CollectionUtils; import org.springframework.util.ObjectUtils; import javax.annotation.Resource; import java.util.List; //自定义realm public class CustomerRealm extends AuthorizingRealm { @Resource private UserService userService; //授权 @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { //获取身份信息 String primaryPrincipal = (String)principalCollection.getPrimaryPrincipal(); //根据主身份信息获取角色 和 权限信息 ListThis authentication will be automatically called when logging in. If an error occurs during verification, an exception will be reported. I received the exception in the controller layer and processed it When logging in in the controller layer Exception handlingroles = userService.findRolesByUsername(primaryPrincipal); if (!CollectionUtils.isEmpty(roles)){ SimpleAuthorizationInfo simpleAuthorizationInfo = new SimpleAuthorizationInfo(); roles.forEach(viewRole -> { simpleAuthorizationInfo.addRole(viewRole.getName()); //权限信息 List perms = userService.findPermsByRoleId(viewRole.getName()); if (!CollectionUtils.isEmpty(perms)){ perms.forEach(viewPerms -> { simpleAuthorizationInfo.addStringPermission(viewPerms.getPName()); }); } }); return simpleAuthorizationInfo; } return null; } //认证 @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException { //获取登入的身份信息 String principal = (String) authenticationToken.getPrincipal(); User user = userService.findByUsername(principal); if (!ObjectUtils.isEmpty(user)){ //ByteSource.Util.bytes(user.getSalt()) 通过这个工具将盐传入 //如果身份认证验证成功,返回一个AuthenticationInfo实现; return new SimpleAuthenticationInfo(user.getUsername(),user.getPassword(),new MyByteSource(user.getSalt()),this.getName()); } return null; } }
@PostMapping("/login") public String login(String username,String password){ //获取主体对象 Subject subject = SecurityUtils.getSubject(); try { //自动调用CustomerRealm 类中的身份验证方法 subject.login(new UsernamePasswordToken(username,password)); return "index"; }catch (UnknownAccountException e){ //接收异常并处理 e.printStackTrace(); model.addAttribute("msg","用户名有误,请重新登录"); }catch (IncorrectCredentialsException e){//接收异常并处理 e.printStackTrace(); model.addAttribute("msg","密码有误,请重新登录"); } return "login"; }1.2.6, shiro cache configuration defines the shiro cache. After a user logs in, his user information and roles/permissions do not need to be checked every time, which can improve Efficiency Default cache configuration Enable cache management in the getRealm() method in ShiroConfig
@Bean public Realm getRealm(){ CustomerRealm customerRealm = new CustomerRealm(); //开启缓存管理 customerRealm.setCacheManager(new EhCacheManager()); //开启全局缓存 customerRealm.setCachingEnabled(true); //开启认证缓存 customerRealm.setAuthenticationCachingEnabled(true); customerRealm.setAuthenticationCacheName("authenticationCache"); //开启权限缓存 customerRealm.setAuthorizationCachingEnabled(true); customerRealm.setAuthorizationCacheName("authorizationCache"); return customerRealm; }The cache integrated with reids will not be explained here, but is placed in the source code Check it out for yourself, the source code is below 1.2.7, homepage index.html settings Use tags here to determine which areas require authentication or what roles or permissions are required to access
1.3. Simple test 1.3.1. Test of all permissions of admin role 1.3. 2. Test without role and permission 1.3.3. Test without role and permission首页 index
退出 用户:
显示认证通过内容
没有认证时 显示
admin角色 显示
具有用户模块的"user:*:*"权限 显示
The above is the detailed content of How SpringBoot integrates Shiro to implement permission control. For more information, please follow other related articles on the PHP Chinese website!