Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Difference between @Secured vs @RolesAllowed in Spring? And the concept of Role Based Security?

I am studying Spring Security and I have the following doubts related the difference between the use of the @Secured annotation and the @RolesAllowed annotation.

I know that both have to been used at method level, on my study material I found the followings 2 examples:

  • @RolesAllowed annotation:

    import javax.annotation.security.RolesAllowed;    
    public class ItemManager {
        @RolesAllowed("ROLE_MEMBER")
        public Item findItem(long itemNumber) {
            ...
        }
    }
    
  • @Secured annotation:

    import org.springframework.security.annotation.Secured;
    public class ItemManager {
        @Secured("ROLE_MEMBER")
        public Item findItem(long itemNumber) {
            ...
        }
    }
    

It seems to me that these 2 annotations works in the same way. What are the differences? What am I missing?

Another doubt that I have is: what exactly represent the ROLE_MEMBER?

I think that this is something like role based security, so it could mean something like: only if the user is a member it could access to the annoted resource (is it correct?). But where and how is definied the fact that the user have setted this role (it is a member)? How exactly works?

Tnx

like image 782
AndreaNobili Avatar asked Apr 03 '15 15:04

AndreaNobili


People also ask

What's the difference between @secured and @PreAuthorize in Spring Security?

The difference between @Secured and @PreAuthorize are as follows : The main difference between @Secured and @PreAuthorize is that @PreAuthorize can work with Spring EL. We can access methods and properties of SecurityExpressionRoot while using @PreAuthorize but not with @Secured.

Which annotation is equivalent to Spring's @secured but comes from a standard javax package and allows the use of Spring expression language SpEL )?

@Secured annotation is a legacy Spring Security 2 annotation that can be used to configure method security. It supports more than only role-based security, but does not support using Spring Expression Language (SpEL) to specify security constraints.

Which security feature is used to convert the exceptions of Spring Security into the?

ExceptionTranslationFilter –Responsible for converting SpringSecurity exceptions to HTTP responses.

What is jsr250Enabled?

The jsr250Enabled property allows us to use the @RoleAllowed annotation.


2 Answers

@Secured and @RolesAllowed are the same. They do the same operation in Spring.

But

  • @RolesAllowed - Standard annotation of Java.

    Java has defined Java Specification Request, basically change requests for the Java language, libraries and other components. For the development of annotations, they have provided JSR 250. @RolesAllowed is included in it. This link contains further info in JSR 250

  • @Secured - Spring security annotation

ROLE_MEMBER is the role which is set to the security user details.

Refer this example from my current project. Here I'm using the user data object and mapping the roles given to the user to the security user details.

public class CustomUserDetails implements UserDetails {
...
...
... 

    @Override
    public Collection<? extends GrantedAuthority> getAuthorities() {
        Collection<GrantedAuthority> grantedAuthorities = new ArrayList<GrantedAuthority>();
        for (Role role : this.user.getRoles()){
            grantedAuthorities.add(new SimpleGrantedAuthority(role.getRole()));
        }
        return grantedAuthorities;
    }
}

These roles are then set for the security approvals using the @Secured or @RolesAllowed or @PreAuthorize("hasRole('ROLE_USER')") for the methods.

By design it's good to put the security in the Service layer. So when I'm securing my service actions, I check for the roles, not for the users.

This way, we can focus on the business logic and the security for the business logic via small security units called roles.

Then I assign the roles to the user. Users can have multiple roles. So you have to see the relationship here. Users are given the roles. And roles are given the access to the business logic. Users are given the access to the business logic via the roles. This concept is called, Role Based Access Control.

And in complex situations we can also manage hierarchical roles. Where one role has many other roles. But in the UserDetails, we have to flatten the role hierarchy and provide the list of roles to the Spring framework to process.

like image 173
Faraj Farook Avatar answered Sep 22 '22 01:09

Faraj Farook


The accepted answer completely answers the question (heh), but I think this is a good place to say how to enable method level security in Spring.

The only thing You need to add is the @EnableGlobalMethodSecurity annotation on a configuration class (see the example) with the following properties set to true (default is false)

  • securedEnabled (enables Spring's Secured annotation.),
  • jsr250Enabled (enables the JSR-250 standard java security annotations, like RolesAllowed),
  • prePostEnabled (enables Spring's PreAuthorize and PostAuthorize annotations).

Example of annotation usage:

@EnableGlobalMethodSecurity(
    securedEnabled = true,
    jsr250Enabled = true,
    prePostEnabled = true)
public class SecurityConfig extends WebSecurityConfigurerAdapter {
// ...
@Override
protected void configure(HttpSecurity http) throws Exception {
    http
        .authorizeRequests()
        .anyRequest().fullyAuthenticated()
        .and()
        .formLogin(); // You probably need more than this
}

@Override
public void configure(AuthenticationManagerBuilder auth) throws Exception {
    // your authentication manager config here
}

For more detailed example, see Spring Security Method Level Annotations Example.

like image 24
Aleksandar Avatar answered Sep 25 '22 01:09

Aleksandar