The jaxrs-jwt quickstart demonstrates a JAX-RS secured application using JSON Web Tokens (JWT) with Elytron.
This quickstart demonstrates how to secure a JAX-RS service with JWTs using the Elytron subsystem.
There are 4 resource endpoints, plus another one for generating JWTs.
-
/rest/public- Requires no authentication. -
/rest/customer- Can be accessed by users withcustomerrole authority. -
/rest/admin- Can be accessed by users withadminrole authority. -
/rest/claims- Can be accessed by any authenticated user and demonstrates how to extract token claims. -
/rest/token-POSTendpoint for generating tokens from provided credentials.
|
Note
|
This quickstart asserts only few JWT claims for demonstration purposes. In your application, you should use all claims required by the specification you are using. |
Elytron uses RS256 (SHA256withRSA), RS384 (SHA384withRSA), and RS512 (SHA512withRSA) asymmetric keys for signing JWTs. The keys must be in PKCS#8 format.
You can generate your own RS256 key pair using java keytool.
-
Open a terminal and navigate to the {productName} server
configurationdirectory:For Linux: standalone/configuration For Windows: standalone\configuration -
Create a keystore for your server using the following command:
$>keytool -genkey -alias alias -keyalg RSA -keysize 2048 -keystore jwt.keystore -storepass secret -keypass secret What is your first and last name? [Unknown]: localhost What is the name of your organizational unit? [Unknown]: wildfly What is the name of your organization? [Unknown]: jboss What is the name of your City or Locality? [Unknown]: Raleigh What is the name of your State or Province? [Unknown]: Carolina What is the two-letter country code for this unit? [Unknown]: US Is CN=localhost, OU=wildfly, O=jboss, L=Raleigh, ST=Carolina, C=US correct? [no]: yes
You configure the security domain by running JBoss CLI commands. For your convenience, this quickstart batches the commands into a configure-elytron.cli script provided in the root directory of this quickstart.
-
Before you begin, make sure you do the following:
-
Back up the {productName} standalone server configuration as described above.
-
Start the {productName} server with the standalone default profile as described above.
-
-
Review the
configure-elytron.clifile in the root of this quickstart directory. This script adds the configuration that enables Elytron security for the quickstart deployment. Comments in the script describe the purpose of each block of commands.ImportantThis script contains placeholder PEM public key to make the deployment of this quickstart easy. DO not use this key for anything but testing purposes! You must generate your own key pair for your own application. -
Open a new terminal, navigate to the root directory of this quickstart, and run the following command, replacing
{jbossHomeName}with the path to your server:$ {jbossHomeName}/bin/jboss-cli.sh --connect --file=configure-elytron.cliNoteFor Windows, use the {jbossHomeName}\bin\jboss-cli.batscript. -
Stop the {productName} server.
After stopping the server, open the {jbossHomeName}/standalone/configuration/standalone.xml file and review the changes.
-
The following
token-realmwas added to thesecurity-realmselement in theelytronsubsystem.<token-realm name="jwt-realm" principal-claim="sub"> <jwt issuer="quickstart-jwt-issuer" audience="jwt-audience" key-store="jwt-key-store" certificate="alias"/> </token-realm>
-
The following
security-domainwas added, which uses thejwt-realm.<security-domain name="jwt-domain" default-realm="jwt-realm" permission-mapper="default-permission-mapper"> <realm name="jwt-realm" role-decoder="groups-to-roles"/> </security-domain>
-
The following HTTP authentication factory was added, which uses
BEARER_TOKENand thejwt-realm.<http-authentication-factory name="jwt-http-authentication" http-server-mechanism-factory="global" security-domain="jwt-domain"> <mechanism-configuration> <mechanism mechanism-name="BEARER_TOKEN"> <mechanism-realm realm-name="jwt-realm"/> </mechanism> </mechanism-configuration> </http-authentication-factory>
-
The application security domain in the Undertow subsystem is configured to use the new HTTP authentication factory.
<application-security-domains> <application-security-domain name="other" http-authentication-factory="jwt-http-authentication"/> </application-security-domains>
-
Finally, the application security domain in the EJB subsystem is configured to use the
jwt-domain.<application-security-domains> <application-security-domain name="other" security-domain="jwt-domain"/> </application-security-domains>
Before you run the client, make sure you have already successfully deployed the REST to the server in the previous step.
Type the following command to execute the client in client directory.
$ mvn exec:javaWhen you run the mvn exec:java command, you see the following output.
------------------------------
Testing admin
------------------------------
Obtaining JWT...
Accessing /protected...
Status: 200
{"path":"protected","result":"Hello admin!"}
Accessing /public...
Status: 200
{"path":"public","result":"Hello admin!"}
Accessing /customer...
Status: 403
Accessing /claims...
Status: 200
{"sub":"admin","aud":["jwt-audience"],"iss":"quickstart-jwt-issuer","groups":["admin"],"exp":1519336360000}
------------------------------
Testing customer
------------------------------
Obtaining JWT...
Accessing /protected...
Status: 403
Accessing /public...
Status: 200
{"path":"public","result":"Hello customer!"}
Accessing /customer...
Status: 200
{"path":"customer","result":"Hello customer!"}
Accessing /claims...
Status: 200
{"sub":"customer","aud":["jwt-audience"],"iss":"quickstart-jwt-issuer","groups":["customer"],"exp":1519336360000}
------------------------------
Testing without token
------------------------------
Accessing /protected...
Status: 401
Accessing /public...
Status: 200
{"path":"public","result":"Hello anonymous!"}
Accessing /customer...
Status: 401
Accessing /claims...
Status: 204The client tries to test service functionality using 3 identities.
-
admin- this user belongs to groupadmin, which gives him rights to access/rest/protected -
customer- this user belongs to groupcustomer, which gives him rights to access/rest/customer -
no credentials provided - the client tries to access all endpoints, but can only access unprotected
/rest/public
The endpoint /rest/claims demonstrates a way, how you could extract token claims for further manipulation.
../shared-doc/undeploy-the-quickstart.adoc :restoreScriptName: restore-configuration.cli ../shared-doc/restore-standalone-server-configuration.adoc
This script reverts the changes made to the undertow and elytron subsystem.You should see the following result when you run the script.
The batch executed successfully
process-state: reload-required