Backend/spring

[Spring Security] Spring Security๋ž€?

dddzr 2025. 2. 16. 22:25

๐Ÿ“Œ 1. Spring Security๋ž€?

Spring Security๋Š” Spring Framework์˜ ์„œ๋ธŒ ํ”„๋กœ์ ํŠธ๋กœ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์ธ์ฆ(Authentication)๊ณผ ๊ถŒํ•œ ๋ถ€์—ฌ(Authorization)๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ

 

๐Ÿ›  Spring Security ํ•ต์‹ฌ ๊ธฐ๋Šฅ

๐Ÿ”น 1. ์ธ์ฆ(Authentication)
์‚ฌ์šฉ์ž๊ฐ€ ๋ˆ„๊ตฌ์ธ์ง€ ํ™•์ธํ•˜๋Š” ๊ณผ์ •.

 

๐Ÿ‘‰ Spring Security์—์„œ ์ง€์›ํ•˜๋Š” ์ธ์ฆ ๋ฐฉ์‹

  • ํผ ๋กœ๊ทธ์ธ (formLogin()) – ID/PW ์ž…๋ ฅ ํ›„ ์„ธ์…˜ ๊ธฐ๋ฐ˜ ๋กœ๊ทธ์ธ
  • HTTP Basic ์ธ์ฆ (httpBasic()) – ๊ฐ„๋‹จํ•œ API ์ธ์ฆ ๋ฐฉ์‹ (ID/PW Base64 ์ธ์ฝ”๋”ฉ)
  • JWT ๊ธฐ๋ฐ˜ ์ธ์ฆ – ํ† ํฐ์„ ์ด์šฉํ•œ ์ธ์ฆ ๋ฐฉ์‹
  • OAuth2 ๋กœ๊ทธ์ธ (oauth2Login()) – Google, GitHub ๊ฐ™์€ ์†Œ์…œ ๋กœ๊ทธ์ธ
  • LDAP ์ธ์ฆ – ๊ธฐ์—… ํ™˜๊ฒฝ์—์„œ ๋งŽ์ด ์‚ฌ์šฉํ•˜๋Š” ์ธ์ฆ ๋ฐฉ์‹
  • SAML ์ธ์ฆ – ์‹ฑ๊ธ€ ์‚ฌ์ธ์˜จ(SSO) ๊ตฌํ˜„ ๊ฐ€๋Šฅ

 

๐Ÿ”น 2. ๊ถŒํ•œ ๋ถ€์—ฌ(Authorization)
์‚ฌ์šฉ์ž๊ฐ€ ํŠน์ • ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ๊ถŒํ•œ์ด ์žˆ๋Š”์ง€ ํ™•์ธ ๋ฐ ์ œํ•œ.

 

๐Ÿ”น 3. ๋ณด์•ˆ ํ•„ํ„ฐ ์ฒด์ธ(Security Filter Chain)
๋‹ค์–‘ํ•œ ๋ณด์•ˆ ํ•„ํ„ฐ๋ฅผ ์ฒด์ธ ํ˜•ํƒœ๋กœ ๊ตฌ์„ฑํ•˜์—ฌ ์š”์ฒญ์„ ์ฒ˜๋ฆฌ. Spring Security์˜ ๋ชจ๋“  ์š”์ฒญ์€ ์ด ํ•„ํ„ฐ ์ฒด์ธ์„ ํ†ต๊ณผํ•œ๋‹ค.

 

๐Ÿ‘‰ Spring Security์˜ ์ฃผ์š” ํ•„ํ„ฐ ๋™์ž‘ ํ๋ฆ„
  1๏ธโƒฃ SecurityContextPersistenceFilter – ๊ธฐ์กด ์ธ์ฆ ์ •๋ณด ๋ณต์›
  2๏ธโƒฃ UsernamePasswordAuthenticationFilter – ๊ธฐ๋ณธ ๋กœ๊ทธ์ธ ์ฒ˜๋ฆฌ (ID/PW)
  3๏ธโƒฃ BasicAuthenticationFilter – HTTP Basic ์ธ์ฆ ์ฒ˜๋ฆฌ
  4๏ธโƒฃ BearerTokenAuthenticationFilter – JWT ํ† ํฐ ์ธ์ฆ ์ฒ˜๋ฆฌ
  5๏ธโƒฃ ExceptionTranslationFilter – ์ธ์ฆ/๊ถŒํ•œ ์˜ค๋ฅ˜ ์ฒ˜๋ฆฌ
  6๏ธโƒฃ FilterSecurityInterceptor – ์ตœ์ข… ๊ถŒํ•œ ์ฒดํฌ

 

*๊ฐ ์š”์ฒญ์€ ๋ณด์•ˆ ํ•„ํ„ฐ ์ฒด์ธ์„ ๊ฑฐ์ณ์•ผ ํ•˜๋ฉฐ, JWT ์ธ์ฆ์„ ์‚ฌ์šฉํ•˜๋ฉด UsernamePasswordAuthenticationFilter ๋Œ€์‹  BearerTokenAuthenticationFilter๊ฐ€ ๋™์ž‘ํ•œ๋‹ค!

 

๐Ÿ”น 4. CSRF ๋ณดํ˜ธ
Cross-Site Request Forgery ๊ณต๊ฒฉ ๋ฐฉ์–ด ๊ธฐ๋Šฅ์„ ์ œ๊ณต.

 

๐Ÿ”น 5. ์„ธ์…˜ ๊ด€๋ฆฌ
์‚ฌ์šฉ์ž์˜ ์„ธ์…˜์„ ๊ด€๋ฆฌ์„ธ์…˜ ๊ด€๋ จ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต.

 

๐Ÿ”น 6.OAuth 2.0 ๋ฐ OpenID Connect ์ง€์›
์™ธ๋ถ€ ์ธ์ฆ ์ œ๊ณต์ž(์˜ˆ: Google, Facebook)๋ฅผ ํ™œ์šฉํ•œ ์ธ์ฆ์„ ์‰ฝ๊ฒŒ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ๋‹ค.

 

*OAuth2

  • "์ธ๊ฐ€(Authorization)"๋ฅผ ๋‹ด๋‹นํ•˜๋Š” ํ”„๋กœํ† ์ฝœ
  • ์•ก์„ธ์Šค ํ† ํฐ์„ ํ†ตํ•ด ๋ฆฌ์†Œ์Šค ์ ‘๊ทผ ๊ถŒํ•œ์„ ๋ถ€์—ฌ

*OpenID Connect (OIDC)

  • "์ธ์ฆ(Authentication)"๊นŒ์ง€ ํฌํ•จํ•˜๋Š” OAuth2 ํ™•์žฅ ํ”„๋กœํ† ์ฝœ
  • ID ํ† ํฐ์„ ์ด์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž ์ •๋ณด ์ œ๊ณต (sub, email ๋“ฑ)

๐Ÿ“Œ2. ์„ค์ • ๋ฐฉ๋ฒ•

โœ… 2-1. ์˜์กด์„ฑ ์ถ”๊ฐ€

๐Ÿ“– build.gradle

implementation 'org.springframework.boot:spring-boot-starter-security'

 

โœ… 2-2. ํ•„ํ„ฐ ์ฒด์ธ ์ž‘์„ฑ (Spring Security 5.7 ์ดํ›„)

Spring Security 5.7๋ถ€ํ„ฐ๋Š” WebSecurityConfigurerAdapter๊ฐ€ Deprecated๋˜์—ˆ๊ณ ,
SecurityFilterChain์„ ์‚ฌ์šฉํ•˜์—ฌ ๋ณด์•ˆ ์„ค์ •์„ ๊ตฌ์„ฑํ•ด์•ผ ํ•œ๋‹ค!

 

๐Ÿ“– ๊ธฐ๋ณธ ํ˜•ํƒœ ์˜ˆ์‹œ

  • .authorizeHttpRequests()์„ ์‚ฌ์šฉํ•˜์—ฌ ์ ‘๊ทผ ๊ถŒํ•œ์„ ์„ค์ •!
@Configuration
public class SecurityConfig {

    @Bean
    public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
        http
            .csrf(csrf -> csrf.disable()) // CSRF ๋น„ํ™œ์„ฑํ™”
                .formLogin(form -> form.disable()) // ๊ธฐ๋ณธ ๋กœ๊ทธ์ธ ํผ ๋น„ํ™œ์„ฑํ™”
            //.formLogin(Customizer.withDefaults()); // ๊ธฐ๋ณธ ๋กœ๊ทธ์ธ ํผ ์‚ฌ์šฉ
                .httpBasic(basic -> basic.disable()); // HTTP Basic ์ธ์ฆ ๋น„ํ™œ์„ฑํ™”
                
        http
            .authorizeHttpRequests(auth -> auth
                .requestMatchers("/public/**").permitAll() // ์ธ์ฆ x
                .requestMatchers("/user/**").hasAnyRole("USER", "ADMIN")
                .requestMatchers("/admin/**").hasRole("ADMIN")
                .anyRequest().authenticated() //๋‚˜๋จธ์ง€ ์š”์ฒญ, ์–ด๋– ํ•œ ์—ญํ• ์ด๋ผ๋„ ์žˆ์œผ๋ฉด ํ†ต๊ณผ
                .and()
                .oauth2ResourceServer().jwt() // JWT ์ธ์ฆ (ํด๋ผ์ด์–ธํŠธ๊ฐ€ ์š”์ฒญํ•  ๋•Œ Authorization ํ—ค๋”์— JWT ํ† ํฐ์„ ํฌํ•จํ•ด์•ผ ์ ‘๊ทผ ๊ฐ€๋Šฅ)
                .and()
                .oauth2Login(); // OAuth2 ๋กœ๊ทธ์ธ ์‚ฌ์šฉ (๊ตฌ๊ธ€, ๊นƒํ—ˆ๋ธŒ ๊ฐ™์€ OAuth2 ๋กœ๊ทธ์ธ ๋ฐฉ์‹์„ ์‚ฌ์šฉ)
            )
        return http.build();
      }
}

 

 

โญ 5.7 ์ด์ „ ๋ฐฉ์‹

๐Ÿ”ฅ SecurityFilterChain vs configure 

ํŠน์ง• SecurityFilterChain ๋ฐฉ์‹ configure ๋ฐฉ์‹
์ง€์› ๋ฒ„์ „ Spring Security 5.7+ Spring Security 4.x - 5.6.x
๊ตฌํ˜„ ๋ฐฉ์‹ Bean ์ •์˜ (@Bean ๋ฐ SecurityFilterChain) WebSecurityConfigurerAdapter ์ƒ์†
๊ถŒ์žฅ ์—ฌ๋ถ€ โœ… Spring Security์—์„œ ์ ๊ทน ๊ถŒ์žฅ โŒ Spring Security 5.7๋ถ€ํ„ฐ Deprecated
์„ค์ • ์Šคํƒ€์ผ ํ•จ์ˆ˜ํ˜•, ๋ชจ๋“ˆํ™” ๊ฐ€๋Šฅ ๋‹จ์ผ ๋ฉ”์„œ๋“œ ๋‚ด์— ์„ค์ • ์ง‘์ค‘
ํ…Œ์ŠคํŠธ ํŽธ์˜์„ฑ ํ…Œ์ŠคํŠธ ๋ฐ ์„ค์ • ์žฌ์‚ฌ์šฉ์— ์œ ๋ฆฌ ํ…Œ์ŠคํŠธ๋ณด๋‹ค๋Š” ์ดˆ๊ธฐ ํ•™์Šต์— ์นœ์ˆ™

 

๐Ÿ“– ๊ธฐ๋ณธ ํ˜•ํƒœ ์˜ˆ์‹œ

import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;

@EnableWebSecurity
public class SecurityConfig extends WebSecurityConfigurerAdapter {

    @Override
    protected void configure(HttpSecurity http) throws Exception {
        http.csrf().disable()
            .authorizeRequests()
            .antMatchers("/public/**").permitAll()
			.anyRequest().authenticated()
    }
}

 

โœ… 2-3. ์ธ์ฆ ๊ตฌํ˜„ ๋ฐฉ์‹

2-2์—์„œ ์ž‘์„ฑํ•œ ํ•„ํ„ฐ ์ฒด์ธ์—์„œ ์ ‘๊ทผ ๊ถŒํ•œ์„ ์„ค์ •ํ–ˆ๋Š”๋ฐ, ์ธ์ฆ์— ์‚ฌ์šฉํ•  ์ •๋ณด๊ฐ€ ํ•„์š”ํ•˜๋‹ค.

์–ด๋–ป๊ฒŒ ์ธ์ฆํ• ๊นŒ?

 

๐Ÿ”ฅ  ๋น„๊ต ์š”์•ฝ

๋ฐฉ์‹ ํŠน์ง• ์ ์šฉ ๋ฐฉ์‹
UserDetailsService ์ด์šฉ DB์—์„œ ์‚ฌ์šฉ์ž ์ •๋ณด ์กฐํšŒํ•˜์—ฌ ์ธ์ฆ userDetailsService ํ™œ์šฉ
OAuth2 ๋กœ๊ทธ์ธ Google, GitHub ๊ฐ™์€ ์†Œ์…œ ๋กœ๊ทธ์ธ ์ง€์› .oauth2Login() ์‚ฌ์šฉ
JWT ์ž๋™ ๊ฒ€์ฆ (RSA ๋ฐฉ์‹ โญ• and JWK Set URL โญ•) ํ† ํฐ๋งŒ์œผ๋กœ ์ธ์ฆ (DB ์กฐํšŒ ๋ถˆํ•„์š”) .oauth2ResourceServer().jwt()

JWT ์ง์ ‘ ๊ฒ€์ฆ (RSA ๋ฐฉ์‹ โŒ or JWK Set URL โŒ) ํ† ํฐ๋งŒ์œผ๋กœ ์ธ์ฆ, ์ง์ ‘ ํ† ํฐ ๊ฒ€์ฆ ํ•„ํ„ฐ ๊ตฌํ˜„ JwtAuthenticationFilter ์ง์ ‘ ์ž‘์„ฑ ํ›„ addFilterBefore() ์ถ”๊ฐ€

 

โœ… 2-3-1.  UserDetailsService๋ฅผ ์ด์šฉํ•œ ์ธ์ฆ ๋ฐฉ์‹

  • ๊ธฐ๋ณธ์ ์ธ DB ๊ธฐ๋ฐ˜์˜ ์ธ์ฆ ๋ฐฉ์‹ (์˜ˆ: ID/PW ๋กœ๊ทธ์ธ)
  • UserDetailsService๋ฅผ ์ด์šฉํ•ด DB์—์„œ ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ์กฐํšŒํ•˜์—ฌ ์ธ์ฆ

 

๐Ÿ“– UserDetailsService ์‚ฌ์šฉ ์˜ˆ์‹œ

  • UserDetailsService๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ DB์—์„œ ์กฐํšŒ ํ›„ ์ธ์ฆ
  • ๊ธฐ๋ณธ ๋กœ๊ทธ์ธ ํผ(formLogin)์„ ํ™œ์„ฑํ™”ํ•˜์—ฌ ์ธ์ฆ ์ˆ˜ํ–‰
@Configuration
public class SecurityConfig {

    @Bean
    public SecurityFilterChain securityFilterChain(HttpSecurity http, UserDetailsService userDetailsService) throws Exception {
        http
            .csrf(csrf -> csrf.disable())
            .authorizeHttpRequests(auth -> auth
                .requestMatchers("/public/**").permitAll()
                .anyRequest().authenticated()
            )
            .formLogin(Customizer.withDefaults()) // ๊ธฐ๋ณธ ๋กœ๊ทธ์ธ ํผ ํ™œ์„ฑํ™”
            .userDetailsService(userDetailsService); // UserDetailsService ์‚ฌ์šฉ
        
        return http.build();
    }

    @Bean
    public UserDetailsService userDetailsService() {
        return username -> {
            if ("admin".equals(username)) {
                return User.withUsername(username)
                        .password("{noop}password") // {noop} -> ์ธ์ฝ”๋”ฉ ์—†์ด ์‚ฌ์šฉ
                        .roles("ADMIN")
                        .build();
            }

            throw new UsernameNotFoundException("User not found");
        };
    }
}

 

 

โœ… 2-3-2. OAuth2 ๋กœ๊ทธ์ธ ๋ฐฉ์‹

  • Google, GitHub ๋“ฑ OAuth2๋ฅผ ํ†ตํ•œ ์†Œ์…œ ๋กœ๊ทธ์ธ ๋ฐฉ์‹
  • Spring Security์—์„œ ๊ธฐ๋ณธ ์ œ๊ณตํ•˜๋Š” OAuth2 ๋กœ๊ทธ์ธ ๊ธฐ๋Šฅ ์‚ฌ์šฉ
  • /oauth2/authorization/{provider} ์—”๋“œํฌ์ธํŠธ๋กœ OAuth2 ๋กœ๊ทธ์ธ ๊ฐ€๋Šฅ

 

๐Ÿ“– OAuth2 ๋กœ๊ทธ์ธ ๋ฐฉ์‹ ์˜ˆ์‹œ

@Configuration
public class SecurityConfig {

    @Bean
    public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
        http
            .csrf(csrf -> csrf.disable())
            .authorizeHttpRequests(auth -> auth
                .requestMatchers("/public/**").permitAll()
                .anyRequest().authenticated()
            )
            .oauth2Login(Customizer.withDefaults()); // OAuth2 ๋กœ๊ทธ์ธ ํ™œ์„ฑํ™”       

        return http.build();
    }
}

 

โœ…โญ JWT ๊ฒ€์ฆ ๋ฐฉ์‹๋น„๊ต & JWT ์ƒ์„ฑ ์˜ˆ์‹œ ์ฝ”๋“œ

๐Ÿ”— JWT ๋ž€? (์ƒ์„ฑ & ๊ฒ€์ฆ ์ฝ”๋“œ ์˜ˆ์‹œ)

 

๐Ÿ”ฅJWT ๊ฒ€์ฆ ๋ฐฉ์‹ ๋น„๊ต

๋ฐฉ์‹ JWK Set ์ œ๊ณต (RSA ๊ธฐ๋ฐ˜) HS256 ๋ฐฉ์‹
๊ฒ€์ฆ ๋ฐฉ์‹ oauth2ResourceServer().jwt()๋กœ ์ž๋™ ๊ฒ€์ฆ ๊ฐ€๋Šฅ ์ˆ˜๋™์œผ๋กœ ํ•„ํ„ฐ์—์„œ JWT ๊ฒ€์ฆ
๋ณด์•ˆ์„ฑ ๊ณต๊ฐœ ํ‚ค/๊ฐœ์ธ ํ‚ค ๋ถ„๋ฆฌ ๊ฐ€๋Šฅ → ์•ˆ์ „ํ•จ SECRET_KEY๊ฐ€ ์œ ์ถœ๋˜๋ฉด JWT๋ฅผ ์œ„์กฐ ๊ฐ€๋Šฅ
๊ตฌํ˜„ ๋‚œ์ด๋„ JWK ์ œ๊ณต์ด ํ•„์š” (/.well-known/jwks.json) SECRET_KEY๋งŒ ์žˆ์œผ๋ฉด ๊ฐ„๋‹จ
์„ฑ๋Šฅ RSA ์„œ๋ช… ๊ฒ€์ฆ์ด๋ฏ€๋กœ ์•ฝ๊ฐ„ ๋Š๋ฆผ HS256์€ ๋น ๋ฆ„
OAuth 2.0 ํ˜ธํ™˜์„ฑ OAuth 2.0 ํ‘œ์ค€ ์ง€์› OAuth 2.0 ํ‘œ์ค€ ๋ฐฉ์‹ ์•„๋‹˜
์ ์šฉ ์‚ฌ๋ก€ OAuth2 / OIDC ์ธ์ฆ์ด ํ•„์š”ํ•œ ๊ฒฝ์šฐ ๊ฐ„๋‹จํ•œ ๋‚ด๋ถ€ ์ธ์ฆ ์‹œ์Šคํ…œ

 

๐Ÿš€ ์ฐธ๊ณ 

  • RSA๊ธฐ๋ฐ˜ ํ† ํฐ์€ ๊ฒ€์ฆ์„œ๋ฒ„(ex.gateway)์—์„œ ๊ฐ„๋‹จํžˆ ๊ฒ€์ฆ But, ์ธ์ฆ์„œ๋ฒ„(ex.auth-service) ๊ตฌํ˜„์ด ์–ด๋ ค์›€!!
  • ๊ฒ€์ƒ‰ํ•˜๋ฉด ๋Œ€๋ถ€๋ถ„ ๋Œ€์นญํ‚ค ๋ฐฉ์‹์„ ์‚ฌ์šฉํ•œ๋‹ค. ๋‚˜๋„ ์ผ๋‹จ ๋Œ€์นญํ‚ค ๋ฐฉ์‹์„ ์ด์šฉํ–ˆ๊ณ  ๋น„๋Œ€์นญํ‚ค ๋ฐฉ์‹์€ ์ถ”๊ฐ€ ํ•™์Šต์ด ํ•„์š”ํ•  ๋“ฏ!!

 

โœ… 2-3-3.  JWT ์ž๋™ ๊ฒ€์ฆ ๋ฐฉ์‹

  • JWT(Json Web Token)๋ฅผ ์ด์šฉํ•œ ์ธ์ฆ ๋ฐฉ์‹
  • ์„œ๋ฒ„๊ฐ€ DB ์กฐํšŒ ์—†์ด ํ† ํฐ ๊ฒ€์ฆ๋งŒ์œผ๋กœ ์ธ์ฆ ๊ฐ€๋Šฅ
  • *JWK Set๋ฅผ ์ด์šฉ

 

โญ JWK Set(JSON Web Key Set)๋ž€?

  • JWK Set(JWKS)์€ JWT ์„œ๋ช…์„ ๊ฒ€์ฆํ•  ๊ณต๊ฐœ ํ‚ค๋“ค์„ JSON ํ˜•ํƒœ๋กœ ์ œ๊ณตํ•˜๋Š” ํ‘œ์ค€ ํ˜•์‹.
  • ๋ณดํ†ต OAuth2 ์„œ๋ฒ„ ๋˜๋Š” OpenID Connect(OIDC) ์ธ์ฆ ์„œ๋ฒ„๊ฐ€ ๊ณต๊ฐœ ํ‚ค๋ฅผ JWK Set ํ˜•์‹์˜ URL๋กœ ์ œ๊ณตํ•ด.

 

๐Ÿ” ์–ธ์ œ ์‚ฌ์šฉํ• ๊นŒ?

  โžก๏ธ ๊ณต๊ฐœํ‚ค์™€ ๊ณต๊ฐœํ‚ค ์ œ๊ณต URL( JWK Set URL(jwks_uri) )์ด ์žˆ์„ ๋•Œ!!

  • ์™ธ๋ถ€ JWT ์ œ๊ณต ์„œ๋น„์Šค ์ด์šฉํ•  ๋•Œ.
  • ์ง์ ‘ RSA๋ฐฉ์‹์œผ๋กœ JWT ์ƒ์„ฑ ๋ฐ JWK Set ์—”๋“œํฌ์ธํŠธ ๊ตฌํ˜„ ํ–ˆ์„ ๋•Œ.

 

๐Ÿ“– JWT ๊ฒ€์ฆ ๋ฐฉ์‹ ์˜ˆ์‹œ

@Configuration
public class SecurityConfig {

    @Bean
    public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
        http
            .csrf(csrf -> csrf.disable())
            .authorizeHttpRequests(auth -> auth
                .requestMatchers("/public/**").permitAll()
                .anyRequest().authenticated()
            )
	// ์•„๋ž˜ 2๊ฐœ ๋ฐฉ๋ฒ• ์ค‘ ํƒ1
            .oauth2ResourceServer(oauth2 -> oauth2.jwt()); // ์„ค์ • ํŒŒ์ผ์—์„œ issuer-uri ์„ค์ •
            .oauth2ResourceServer(oauth2 -> oauth2.jwtjwt -> jwt.jwkSetUri({๊ณต๊ฐœํ‚ค์ œ๊ณตURI})); // jwkSetUri ์ง€์ •
        return http.build();
    }
}

 

 

๐Ÿ“– application.yml - issuer-uri ์„ค์ • ์˜ˆ์‹œ

  • SecurityConfig์—์„œ .jwkSetUri()๋ฅผ ์ƒ๋žตํ–ˆ์„ ๋•Œ
  • Spring Security๋Š” ์ž๋™์œผ๋กœ{issuer-uri}/.well-known/openid-configuration์„ ์š”์ฒญํ•ด์„œ OpenID ์„ค์ •์„ ๊ฐ€์ ธ์˜ด
spring:
  security:
    oauth2:
      resourceserver:
        jwt:
          issuer-uri: https://auth.example.com

 

 

๐Ÿ“– ์ธ์ฆ ์„œ๋ฒ„ ์‘๋‹ต ์˜ˆ์‹œ

  โžก๏ธ Spring Security๋Š” ์—ฌ๊ธฐ์„œ jwks_uri ๊ฐ’์„ ์ฐพ์•„์„œ JWK Set์„ ๊ฐ€์ ธ์˜จ๋‹ค!

{
  "issuer": "https://auth.example.com",
  "jwks_uri": "https://auth.example.com/.well-known/jwks.json"
}

 

โœ… 2-3-3.  JWT ์ง์ ‘ ๊ฒ€์ฆ ๋ฐฉ์‹

  • JWT๋ฅผ ์ง์ ‘ ๊ฒ€์ฆํ•˜๋Š” ํ•„ํ„ฐ๋ฅผ ์ž‘์„ฑํ•ด์•ผ ํ•œ๋‹ค.
  • JwtAuthenticationFilter๋ฅผ ๋งŒ๋“ค์–ด์„œ JWT๋ฅผ ๊ฒ€์ฆ ํ›„ SecurityContext์— ๋“ฑ๋ก

 

๐Ÿ” ์–ธ์ œ ์‚ฌ์šฉํ• ๊นŒ?

  • HS256 ๊ฐ™์€ ๋Œ€์นญํ‚ค ๋ฐฉ์‹์œผ๋กœ JWT ์„œ๋ช…ํ•˜๋Š” ๊ฒฝ์šฐ.
  • JWT๋ฅผ ์ž์ฒด ๋ฐœํ–‰, RSA ๋ฐฉ์‹์ด์ง€๋งŒ ๊ณต๊ฐœํ‚ค์ œ๊ณต API๊ตฌํ˜„ํ•˜์ง€ ์•Š์•˜์„ ๋•Œ.

 

๐Ÿ“– JWT ๊ฒ€์ฆ(์‚ฌ์šฉ์ž ์ •์˜ ํ•„ํ„ฐ ์‚ฌ์šฉ) ์˜ˆ์‹œ

@Configuration
public class SecurityConfig {

    @Bean
    public SecurityFilterChain securityFilterChain(HttpSecurity http, JwtAuthenticationFilter jwtAuthenticationFilter) throws Exception {
        http
            .csrf(csrf -> csrf.disable())
            .authorizeHttpRequests(auth -> auth
                .requestMatchers("/auth/**").permitAll()
                .anyRequest().authenticated()
            )
            .addFilterBefore(jwtAuthenticationFilter, UsernamePasswordAuthenticationFilter.class); // JWT ํ•„ํ„ฐ ์ถ”๊ฐ€

        return http.build();
    }
}

 

๐Ÿ“– JWT ํ•„ํ„ฐ ์˜ˆ์‹œ

@Component
public class JwtAuthenticationFilter extends OncePerRequestFilter {

    private final String SECRET_KEY = "my-secret-key";

    @Override
    protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain chain)
            throws ServletException, IOException {
            
        String token = resolveToken(request);
        
        if (token != null && validateToken(token)) {
            Claims claims = getClaims(token);
            String username = claims.getSubject();

            UsernamePasswordAuthenticationToken authentication =
                    new UsernamePasswordAuthenticationToken(username, null, null);
            SecurityContextHolder.getContext().setAuthentication(authentication);
        }
        chain.doFilter(request, response);
    }

    private String resolveToken(HttpServletRequest request) {
        String bearerToken = request.getHeader("Authorization");
        if (bearerToken != null && bearerToken.startsWith("Bearer ")) {
            return bearerToken.substring(7);
        }
        return null;
    }

    private Claims getClaims(String token) {
        return Jwts.parserBuilder()
                .setSigningKey(SECRET_KEY.getBytes())
                .build()
                .parseClaimsJws(token)
                .getBody();
    }

    private boolean validateToken(String token) {
        try { // JWT์˜ ํ˜•์‹(Header.Payload.Signature ํ˜•ํƒœ์ธ์ง€) & ์„œ๋ช… & ๋งŒ๋ฃŒ ๊ฒ€์ฆ
           Jwts.parserBuilder().setSigningKey(SECRET_KEY.getBytes()).build().parseClaimsJws(token);
            return true;
        } catch (Exception e) {
            return false;
        }
    }

}

 

โœ… 2-4. ์„ธ์…˜ ๋ณด์•ˆ ์„ค์ •

๐Ÿ›  ์„ธ์…˜ ๊ด€๋ จ ์ฃผ์š” ๋ณด์•ˆ ๊ธฐ๋Šฅ

๐Ÿ”น ์„ธ์…˜ ๊ณ ์ • ๊ณต๊ฒฉ ๋ฐฉ์ง€: ๋กœ๊ทธ์ธ ์‹œ ๊ธฐ์กด ์„ธ์…˜ ID๋ฅผ ์œ ์ง€ํ•˜์ง€ ์•Š๊ณ , ์ƒˆ๋กœ์šด ์„ธ์…˜์œผ๋กœ ๊ต์ฒดํ•˜๋Š” ๊ธฐ๋Šฅ

๐Ÿ”น ๋™์‹œ ๋กœ๊ทธ์ธ ์ฐจ๋‹จ: ๊ฐ™์€ ๊ณ„์ •์œผ๋กœ ์—ฌ๋Ÿฌ ๊ฐœ์˜ ์„ธ์…˜์„ ์œ ์ง€ํ•˜์ง€ ๋ชปํ•˜๋„๋ก ์ œํ•œ

๐Ÿ”น ์„ธ์…˜ ์ €์žฅ์†Œ ์„ค์ •: ์„ธ์…˜์„ ์„œ๋ฒ„ ๋ฉ”๋ชจ๋ฆฌ(RAM), ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค(DB), Redis ๋“ฑ์— ์ €์žฅ ๊ฐ€๋Šฅ

 

๐Ÿ“– ์„ธ์…˜ ๋ณด์•ˆ ์„ค์ • ์˜ˆ์ œ

import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.web.session.HttpSessionEventPublisher;

@Configuration
public class SecurityConfig {

    @Bean
    public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
        http
            .sessionManagement(session -> session
                // โœ” ์„ธ์…˜ ๊ณ ์ • ๊ณต๊ฒฉ ๋ฐฉ์ง€: ๋กœ๊ทธ์ธ ์‹œ ์ƒˆ๋กœ์šด ์„ธ์…˜ ์ƒ์„ฑ
                .sessionFixation().migrateSession()
                // โœ” ๋™์‹œ ๋กœ๊ทธ์ธ ์ฐจ๋‹จ: ํ•œ ๊ณ„์ •์œผ๋กœ ํ•œ ๋ฒˆ๋งŒ ๋กœ๊ทธ์ธ ๊ฐ€๋Šฅ
                .maximumSessions(1)
                .maxSessionsPreventsLogin(true) // true๋ฉด ๊ธฐ์กด ์„ธ์…˜ ์œ ์ง€, false๋ฉด ์ƒˆ๋กœ์šด ๋กœ๊ทธ์ธ ํ—ˆ์šฉ
            );
        return http.build();
    }

    // โœ” ๋™์‹œ ๋กœ๊ทธ์ธ ๊ฐ์ง€๋ฅผ ์œ„ํ•œ ์„ธ์…˜ ์ด๋ฒคํŠธ ๋ฆฌ์Šค๋„ˆ ๋“ฑ๋ก
    @Bean
    public HttpSessionEventPublisher httpSessionEventPublisher() {
        return new HttpSessionEventPublisher();
    }

}

 

'Backend > spring' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€

web vs webflux  (0) 2025.02.23
[Spring Security] Spring Security ์ž„์‹œ ๊ณ„์ •  (0) 2025.02.23
DTO ์ž‘์„ฑ ๋ฐฉ๋ฒ• - Array ๋ฐ Object ํƒ€์ž…  (0) 2024.11.18
MyBatis ์—ฐ๊ฒฐ (Spring DAO ์ž‘์„ฑ ๋ฐฉ๋ฒ•)  (0) 2024.10.30
Spring WebSocket  (0) 2024.03.01