oauth2授权码登录源码php,OAuth2四种授权登录之授权码模式获取TOKEN

学习地址:

https://www.majiaxueyuan.com/uc/play/65

Oauth2.0的一些简单介绍:

https://blog.csdn.net/qq_28198181/article/details/100523474

如果要处理使用授权码模式

需要配置两个地方:

1.将授权码模式放进去

import org.springframework.context.annotation.Bean;

import org.springframework.context.annotation.Configuration;

import org.springframework.http.HttpMethod;

import org.springframework.security.authentication.AuthenticationManager;

import org.springframework.security.authentication.AuthenticationProvider;

import org.springframework.security.authentication.dao.DaoAuthenticationProvider;

import org.springframework.security.core.Authentication;

import org.springframework.security.core.AuthenticationException;

import org.springframework.security.core.userdetails.User;

import org.springframework.security.core.userdetails.UserDetailsService;

import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;

import org.springframework.security.crypto.password.PasswordEncoder;

import org.springframework.security.oauth2.config.annotation.configurers.ClientDetailsServiceConfigurer;

import org.springframework.security.oauth2.config.annotation.web.configuration.AuthorizationServerConfigurerAdapter;

import org.springframework.security.oauth2.config.annotation.web.configuration.EnableAuthorizationServer;

import org.springframework.security.oauth2.config.annotation.web.configurers.AuthorizationServerEndpointsConfigurer;

import org.springframework.security.oauth2.config.annotation.web.configurers.AuthorizationServerSecurityConfigurer;

import org.springframework.security.provisioning.InMemoryUserDetailsManager;

/**

* @author : HYXT_ZouQiJun

* @createTime : 2019/9/3 15:33

* @descrption :

*/

@Configuration

@EnableAuthorizationServer

public class AuthorizationServerConfig extends AuthorizationServerConfigurerAdapter {

//accessToken 过期

private int accessTokenValiditySecond = 60 * 60 * 2; //2小时

private int refreshTokenValiditySecond = 60 * 60 * 24 * 7; // 7 天

//添加商户信息

public void configure(ClientDetailsServiceConfigurer configurer) throws Exception {

//withClient Appid

configurer.inMemory().withClient("yyy_client").secret(passwordEncoder().encode("yyy_secret")) //设置用户 和密码

//这里放入了授权码模式

.authorizedGrantTypes("password","authorization_code","client_credentials","refresh_token").scopes("all") //设置权限类型,用密码,客户端,刷新的token 权限为所有人

.accessTokenValiditySeconds(accessTokenValiditySecond)

.refreshTokenValiditySeconds(refreshTokenValiditySecond);

}

//定义授权和令牌端点和令牌服务

public void configure(AuthorizationServerEndpointsConfigurer endpointsConfigurer){

//刷新令牌时需要的认证管理和用户信息来源

endpointsConfigurer.authenticationManager(authenticationManager()).allowedTokenEndpointRequestMethods(HttpMethod.GET,HttpMethod.POST);

endpointsConfigurer.authenticationManager(authenticationManager());

endpointsConfigurer.userDetailsService(userDetailsService());

}

@Override

public void configure(AuthorizationServerSecurityConfigurer oauthServer) throws Exception {

//允许表单认证

oauthServer.allowFormAuthenticationForClients();

//允许 check_token 访问

oauthServer.checkTokenAccess("permitAll()");

}

@Bean

AuthenticationManager authenticationManager() {

AuthenticationManager authenticationManager = new AuthenticationManager() {

public Authentication authenticate(Authentication authentication) throws AuthenticationException {

return daoAuhthenticationProvider().authenticate(authentication);

}

};

return authenticationManager;

}

@Bean

public AuthenticationProvider daoAuhthenticationProvider() {

DaoAuthenticationProvider daoAuthenticationProvider = new DaoAuthenticationProvider();

daoAuthenticationProvider.setUserDetailsService(userDetailsService());

daoAuthenticationProvider.setHideUserNotFoundExceptions(false);

daoAuthenticationProvider.setPasswordEncoder(passwordEncoder());

return daoAuthenticationProvider;

}

// 设置添加用户信息,正常应该从数据库中读取

@Bean

UserDetailsService userDetailsService() {

InMemoryUserDetailsManager userDetailsService = new InMemoryUserDetailsManager();

userDetailsService.createUser(User.withUsername("user_1").password(passwordEncoder().encode("123456"))

.authorities("ROLE_USER").build());

userDetailsService.createUser(User.withUsername("user_2").password(passwordEncoder().encode("123456"))

.authorities("ROLE_USER").build());

return userDetailsService;

}

@Bean

PasswordEncoder passwordEncoder() {

// 加密方式

PasswordEncoder passwordEncoder = new BCryptPasswordEncoder();

return passwordEncoder;

}

}

2.需要配置一个security,不然会报错

@Component

public class SecurityConfig extends WebSecurityConfigurerAdapter {

//暂时什么都没写

}

3.测试一下

首先需要获取到认证的code 才能通过code 得到token

将程序类启动:

@SpringBootApplication

public class SSOApplication {

public static void main(String[] args) {

SpringApplication.run(SSOApplication.class, args);

}

}

这个连接是自己写了个路径

http://localhost:8080/oauth/authorize?response_type=code&client_id=yyy_client&redirect_uri=http://www.4399.com

访问路径 Security会先让你输入用户名和密码

b1209a1ce86b04e731a85e32ba98a4e9.png

我们将后台写死的user和password

会跳转到我们原来进入的路径。选择允许

a15527e831c5e4a1b8c74e2634879417.png

点击认证后会跳转到4399页面 地址栏会附带code

7da6786f312418d2082c52902ea7c775.png

我们通过postman 去访问oauth下的token

http://localhost:8080/oauth/token

如下:

44e33a9adb72df3fcbf90b70099c7a0d.png

如下得到了token值

注意:token只有一次 如果要下一次的话得重新获取code码

f65a035169e319d4397cda266fc13e87.png

重新从authorize中获取

c4251c19b4f94efc357318230864cb7d.png

7b5d23cb3b1886c5955b13d139b0b9f1.png

可以看到即便code不一致但是token是一致的

简单记录一下 以后补充现在不会的

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值