Handle Brute Force Attack in java spring rest api security with oauth2 implementation












0














I am using java spring security for my REST api using implicit oauth2 implementation. However alike in java spring security for MVC, i am not able to find/implement custom failureHandler for REST API security configuration for implementing logic to handle login attempts. Can you please suggest how can i implement the same.



@EnableWebSecurity
@EnableGlobalMethodSecurity(prePostEnabled=true)
public class SecurityConfig extends WebSecurityConfigurerAdapter {
.....
@Override
protected void configure(HttpSecurity http) throws Exception {
http
.csrf().disable()
.authorizeRequests()
.antMatchers("/api/**").permitAll()
.antMatchers("/rest/**").permitAll()
.antMatchers("/secureapi/**").authenticated()
.and()
.formLogin() //New added need to check
.and()
.exceptionHandling().authenticationEntryPoint(getBasicAuthEntryPoint())
.and()
.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
}
}


Authorization Server:



@EnableAuthorizationServer
public class AuthorizationServerConfig extends AuthorizationServerConfigurerAdapter {
.....
@Override
public void configure(ClientDetailsServiceConfigurer configurer) throws Exception {
configurer
.inMemory()
.withClient(CLIENT_ID)
.secret(CLIENT_SECRET)
.authorizedGrantTypes(GRANT_TYPE, AUTHORIZATION_CODE, REFRESH_TOKEN, IMPLICIT )
.scopes(SCOPE_READ, SCOPE_WRITE, TRUST)
.accessTokenValiditySeconds(ACCESS_TOKEN_VALIDITY_SECONDS)
.refreshTokenValiditySeconds(REFRESH_TOKEN_VALIDITY_SECONDS);
}

@Override
public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
endpoints.tokenStore(tokenStore).authenticationManager(authenticationManager).tokenEnhancer(CustomTokenEnhancer);
}

@Override
public void configure(AuthorizationServerSecurityConfigurer oauthServer) throws Exception {
oauthServer.realm(REALM+"/client");
}
}
}


Resource Server:



@EnableResourceServer
public class ResourceServerConfig extends ResourceServerConfigurerAdapter {

private static final String RESOURCE_ID = "resource_id";

@Override
public void configure(ResourceServerSecurityConfigurer resources) {
resources.resourceId(RESOURCE_ID).stateless(false);
}

@Override
public void configure(HttpSecurity http) throws Exception {
http.
anonymous().disable()
.authorizeRequests()
.antMatchers("/secureapi/**").authenticated()
.and().exceptionHandling()
.accessDeniedHandler(new OAuth2AccessDeniedHandler());
}

}









share|improve this question



























    0














    I am using java spring security for my REST api using implicit oauth2 implementation. However alike in java spring security for MVC, i am not able to find/implement custom failureHandler for REST API security configuration for implementing logic to handle login attempts. Can you please suggest how can i implement the same.



    @EnableWebSecurity
    @EnableGlobalMethodSecurity(prePostEnabled=true)
    public class SecurityConfig extends WebSecurityConfigurerAdapter {
    .....
    @Override
    protected void configure(HttpSecurity http) throws Exception {
    http
    .csrf().disable()
    .authorizeRequests()
    .antMatchers("/api/**").permitAll()
    .antMatchers("/rest/**").permitAll()
    .antMatchers("/secureapi/**").authenticated()
    .and()
    .formLogin() //New added need to check
    .and()
    .exceptionHandling().authenticationEntryPoint(getBasicAuthEntryPoint())
    .and()
    .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
    }
    }


    Authorization Server:



    @EnableAuthorizationServer
    public class AuthorizationServerConfig extends AuthorizationServerConfigurerAdapter {
    .....
    @Override
    public void configure(ClientDetailsServiceConfigurer configurer) throws Exception {
    configurer
    .inMemory()
    .withClient(CLIENT_ID)
    .secret(CLIENT_SECRET)
    .authorizedGrantTypes(GRANT_TYPE, AUTHORIZATION_CODE, REFRESH_TOKEN, IMPLICIT )
    .scopes(SCOPE_READ, SCOPE_WRITE, TRUST)
    .accessTokenValiditySeconds(ACCESS_TOKEN_VALIDITY_SECONDS)
    .refreshTokenValiditySeconds(REFRESH_TOKEN_VALIDITY_SECONDS);
    }

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
    endpoints.tokenStore(tokenStore).authenticationManager(authenticationManager).tokenEnhancer(CustomTokenEnhancer);
    }

    @Override
    public void configure(AuthorizationServerSecurityConfigurer oauthServer) throws Exception {
    oauthServer.realm(REALM+"/client");
    }
    }
    }


    Resource Server:



    @EnableResourceServer
    public class ResourceServerConfig extends ResourceServerConfigurerAdapter {

    private static final String RESOURCE_ID = "resource_id";

    @Override
    public void configure(ResourceServerSecurityConfigurer resources) {
    resources.resourceId(RESOURCE_ID).stateless(false);
    }

    @Override
    public void configure(HttpSecurity http) throws Exception {
    http.
    anonymous().disable()
    .authorizeRequests()
    .antMatchers("/secureapi/**").authenticated()
    .and().exceptionHandling()
    .accessDeniedHandler(new OAuth2AccessDeniedHandler());
    }

    }









    share|improve this question

























      0












      0








      0







      I am using java spring security for my REST api using implicit oauth2 implementation. However alike in java spring security for MVC, i am not able to find/implement custom failureHandler for REST API security configuration for implementing logic to handle login attempts. Can you please suggest how can i implement the same.



      @EnableWebSecurity
      @EnableGlobalMethodSecurity(prePostEnabled=true)
      public class SecurityConfig extends WebSecurityConfigurerAdapter {
      .....
      @Override
      protected void configure(HttpSecurity http) throws Exception {
      http
      .csrf().disable()
      .authorizeRequests()
      .antMatchers("/api/**").permitAll()
      .antMatchers("/rest/**").permitAll()
      .antMatchers("/secureapi/**").authenticated()
      .and()
      .formLogin() //New added need to check
      .and()
      .exceptionHandling().authenticationEntryPoint(getBasicAuthEntryPoint())
      .and()
      .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
      }
      }


      Authorization Server:



      @EnableAuthorizationServer
      public class AuthorizationServerConfig extends AuthorizationServerConfigurerAdapter {
      .....
      @Override
      public void configure(ClientDetailsServiceConfigurer configurer) throws Exception {
      configurer
      .inMemory()
      .withClient(CLIENT_ID)
      .secret(CLIENT_SECRET)
      .authorizedGrantTypes(GRANT_TYPE, AUTHORIZATION_CODE, REFRESH_TOKEN, IMPLICIT )
      .scopes(SCOPE_READ, SCOPE_WRITE, TRUST)
      .accessTokenValiditySeconds(ACCESS_TOKEN_VALIDITY_SECONDS)
      .refreshTokenValiditySeconds(REFRESH_TOKEN_VALIDITY_SECONDS);
      }

      @Override
      public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenStore(tokenStore).authenticationManager(authenticationManager).tokenEnhancer(CustomTokenEnhancer);
      }

      @Override
      public void configure(AuthorizationServerSecurityConfigurer oauthServer) throws Exception {
      oauthServer.realm(REALM+"/client");
      }
      }
      }


      Resource Server:



      @EnableResourceServer
      public class ResourceServerConfig extends ResourceServerConfigurerAdapter {

      private static final String RESOURCE_ID = "resource_id";

      @Override
      public void configure(ResourceServerSecurityConfigurer resources) {
      resources.resourceId(RESOURCE_ID).stateless(false);
      }

      @Override
      public void configure(HttpSecurity http) throws Exception {
      http.
      anonymous().disable()
      .authorizeRequests()
      .antMatchers("/secureapi/**").authenticated()
      .and().exceptionHandling()
      .accessDeniedHandler(new OAuth2AccessDeniedHandler());
      }

      }









      share|improve this question













      I am using java spring security for my REST api using implicit oauth2 implementation. However alike in java spring security for MVC, i am not able to find/implement custom failureHandler for REST API security configuration for implementing logic to handle login attempts. Can you please suggest how can i implement the same.



      @EnableWebSecurity
      @EnableGlobalMethodSecurity(prePostEnabled=true)
      public class SecurityConfig extends WebSecurityConfigurerAdapter {
      .....
      @Override
      protected void configure(HttpSecurity http) throws Exception {
      http
      .csrf().disable()
      .authorizeRequests()
      .antMatchers("/api/**").permitAll()
      .antMatchers("/rest/**").permitAll()
      .antMatchers("/secureapi/**").authenticated()
      .and()
      .formLogin() //New added need to check
      .and()
      .exceptionHandling().authenticationEntryPoint(getBasicAuthEntryPoint())
      .and()
      .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
      }
      }


      Authorization Server:



      @EnableAuthorizationServer
      public class AuthorizationServerConfig extends AuthorizationServerConfigurerAdapter {
      .....
      @Override
      public void configure(ClientDetailsServiceConfigurer configurer) throws Exception {
      configurer
      .inMemory()
      .withClient(CLIENT_ID)
      .secret(CLIENT_SECRET)
      .authorizedGrantTypes(GRANT_TYPE, AUTHORIZATION_CODE, REFRESH_TOKEN, IMPLICIT )
      .scopes(SCOPE_READ, SCOPE_WRITE, TRUST)
      .accessTokenValiditySeconds(ACCESS_TOKEN_VALIDITY_SECONDS)
      .refreshTokenValiditySeconds(REFRESH_TOKEN_VALIDITY_SECONDS);
      }

      @Override
      public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenStore(tokenStore).authenticationManager(authenticationManager).tokenEnhancer(CustomTokenEnhancer);
      }

      @Override
      public void configure(AuthorizationServerSecurityConfigurer oauthServer) throws Exception {
      oauthServer.realm(REALM+"/client");
      }
      }
      }


      Resource Server:



      @EnableResourceServer
      public class ResourceServerConfig extends ResourceServerConfigurerAdapter {

      private static final String RESOURCE_ID = "resource_id";

      @Override
      public void configure(ResourceServerSecurityConfigurer resources) {
      resources.resourceId(RESOURCE_ID).stateless(false);
      }

      @Override
      public void configure(HttpSecurity http) throws Exception {
      http.
      anonymous().disable()
      .authorizeRequests()
      .antMatchers("/secureapi/**").authenticated()
      .and().exceptionHandling()
      .accessDeniedHandler(new OAuth2AccessDeniedHandler());
      }

      }






      java spring spring-security oauth-2.0






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Nov 20 at 17:28









      Diwas Sapkota

      233




      233





























          active

          oldest

          votes











          Your Answer






          StackExchange.ifUsing("editor", function () {
          StackExchange.using("externalEditor", function () {
          StackExchange.using("snippets", function () {
          StackExchange.snippets.init();
          });
          });
          }, "code-snippets");

          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "1"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53398401%2fhandle-brute-force-attack-in-java-spring-rest-api-security-with-oauth2-implement%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown






























          active

          oldest

          votes













          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes
















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Stack Overflow!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.





          Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


          Please pay close attention to the following guidance:


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53398401%2fhandle-brute-force-attack-in-java-spring-rest-api-security-with-oauth2-implement%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Costa Masnaga

          Fotorealismo

          Sidney Franklin