|
25 | 25 | xmlns:util="http://www.springframework.org/schema/util"
|
26 | 26 | xsi:schemaLocation="http://www.springframework.org/schema/security/oauth2 http://www.springframework.org/schema/security/spring-security-oauth2-2.0.xsd
|
27 | 27 | http://www.springframework.org/schema/mvc http://www.springframework.org/schema/mvc/spring-mvc-4.3.xsd
|
28 |
| -http://www.springframework.org/schema/security http://www.springframework.org/schema/security/spring-security-3.2.xsd |
| 28 | +http://www.springframework.org/schema/security http://www.springframework.org/schema/security/spring-security-4.2.xsd |
29 | 29 | http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-4.3.xsd
|
30 | 30 | http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util-4.3.xsd
|
31 | 31 | http://www.springframework.org/schema/tx http://www.springframework.org/schema/tx/spring-tx-4.3.xsd
|
|
86 | 86 | <security:custom-filter ref="clientCredentialsEndpointFilter" after="BASIC_AUTH_FILTER" />
|
87 | 87 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
88 | 88 | <security:access-denied-handler ref="oauthAccessDeniedHandler" />
|
| 89 | +<security:csrf disabled="true"/> |
89 | 90 | </security:http>
|
90 | 91 |
|
91 | 92 | <!-- Allow open access to discovery endpoints -->
|
92 | 93 | <security:http pattern="/#{T(org.mitre.openid.connect.web.JWKSetPublishingEndpoint).URL}**" use-expressions="true" entry-point-ref="http403EntryPoint" create-session="stateless">
|
93 | 94 | <security:intercept-url pattern="/#{T(org.mitre.openid.connect.web.JWKSetPublishingEndpoint).URL}**" access="permitAll"/>
|
94 | 95 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
| 96 | +<security:csrf disabled="true"/> |
95 | 97 | </security:http>
|
96 | 98 | <security:http pattern="/#{T(org.mitre.discovery.web.DiscoveryEndpoint).WELL_KNOWN_URL}/**" use-expressions="true" entry-point-ref="http403EntryPoint" create-session="stateless">
|
97 | 99 | <security:intercept-url pattern="/#{T(org.mitre.discovery.web.DiscoveryEndpoint).WELL_KNOWN_URL}/**" access="permitAll"/>
|
98 | 100 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
| 101 | +<security:csrf disabled="true"/> |
99 | 102 | </security:http>
|
100 | 103 |
|
101 | 104 | <!-- Allow open access to all static resources -->
|
102 | 105 | <security:http pattern="/resources/**" use-expressions="true" entry-point-ref="http403EntryPoint" create-session="stateless">
|
103 | 106 | <security:intercept-url pattern="/resources/**" access="permitAll"/>
|
104 | 107 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
| 108 | +<security:csrf disabled="true"/> |
105 | 109 | </security:http>
|
106 | 110 |
|
107 | 111 | <!-- OAuth-protect API and other endpoints -->
|
108 | 112 | <security:http pattern="/#{T(org.mitre.openid.connect.web.DynamicClientRegistrationEndpoint).URL}/**" use-expressions="true" entry-point-ref="oauthAuthenticationEntryPoint" create-session="stateless">
|
109 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 113 | +<security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> |
110 | 114 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
111 | 115 | <security:expression-handler ref="oauthWebExpressionHandler" />
|
112 | 116 | <security:intercept-url pattern="/register/**" access="permitAll"/>
|
| 117 | +<security:csrf disabled="true"/> |
113 | 118 | </security:http>
|
114 | 119 |
|
115 | 120 | <security:http pattern="/#{T(org.mitre.openid.connect.web.ProtectedResourceRegistrationEndpoint).URL}/**" use-expressions="true" entry-point-ref="oauthAuthenticationEntryPoint" create-session="stateless">
|
116 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 121 | +<security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> |
117 | 122 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
118 | 123 | <security:expression-handler ref="oauthWebExpressionHandler" />
|
119 | 124 | <security:intercept-url pattern="/resource/**" access="permitAll"/>
|
| 125 | +<security:csrf disabled="true"/> |
120 | 126 | </security:http>
|
121 | 127 |
|
122 | 128 | <security:http pattern="/#{T(org.mitre.uma.web.ResourceSetRegistrationEndpoint).URL}/**" use-expressions="true" entry-point-ref="oauthAuthenticationEntryPoint" create-session="never">
|
123 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 129 | +<security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> |
124 | 130 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
125 | 131 | <security:expression-handler ref="oauthWebExpressionHandler" />
|
| 132 | +<security:csrf disabled="true"/> |
126 | 133 | </security:http>
|
127 | 134 |
|
128 | 135 | <security:http pattern="/#{T(org.mitre.uma.web.PermissionRegistrationEndpoint).URL}/**" use-expressions="true" entry-point-ref="oauthAuthenticationEntryPoint" create-session="never">
|
129 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 136 | +<security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> |
130 | 137 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
131 | 138 | <security:expression-handler ref="oauthWebExpressionHandler" />
|
| 139 | +<security:csrf disabled="true"/> |
132 | 140 | </security:http>
|
133 | 141 |
|
134 | 142 | <security:http pattern="/#{T(org.mitre.uma.web.AuthorizationRequestEndpoint).URL}/**" use-expressions="true" entry-point-ref="oauthAuthenticationEntryPoint" create-session="never">
|
135 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 143 | +<security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> |
136 | 144 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
137 | 145 | <security:expression-handler ref="oauthWebExpressionHandler" />
|
| 146 | +<security:csrf disabled="true"/> |
138 | 147 | </security:http>
|
139 | 148 |
|
140 | 149 | <security:http pattern="/#{T(org.mitre.openid.connect.web.UserInfoEndpoint).URL}**" use-expressions="true" entry-point-ref="oauthAuthenticationEntryPoint" create-session="stateless">
|
141 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 150 | +<security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> |
142 | 151 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
143 | 152 | <security:expression-handler ref="oauthWebExpressionHandler" />
|
| 153 | +<security:csrf disabled="true"/> |
144 | 154 | </security:http>
|
145 | 155 |
|
146 | 156 | <security:http pattern="/#{T(org.mitre.openid.connect.web.RootController).API_URL}/**" use-expressions="true" entry-point-ref="oauthAuthenticationEntryPoint" create-session="never">
|
147 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 157 | +<security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> |
148 | 158 | <security:expression-handler ref="oauthWebExpressionHandler" />
|
| 159 | +<security:csrf disabled="true"/> |
149 | 160 | </security:http>
|
150 | 161 |
|
151 | 162 | <security:http pattern="/#{T(org.mitre.oauth2.web.IntrospectionEndpoint).URL}**"
|
|
154 | 165 | create-session="stateless"
|
155 | 166 | authentication-manager-ref="clientAuthenticationManager">
|
156 | 167 | <security:http-basic entry-point-ref="oauthAuthenticationEntryPoint" />
|
157 |
| -<security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> |
| 168 | +<!-- <security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> --> |
158 | 169 | <security:custom-filter ref="clientAssertionEndpointFilter" after="PRE_AUTH_FILTER" /> <!-- this one has to go first -->
|
159 | 170 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
160 | 171 | <security:custom-filter ref="clientCredentialsEndpointFilter" after="BASIC_AUTH_FILTER" />
|
| 172 | +<security:csrf disabled="true"/> |
161 | 173 | </security:http>
|
162 | 174 |
|
163 | 175 | <security:http pattern="/#{T(org.mitre.oauth2.web.RevocationEndpoint).URL}**"
|
|
166 | 178 | create-session="stateless"
|
167 | 179 | authentication-manager-ref="clientAuthenticationManager">
|
168 | 180 | <security:http-basic entry-point-ref="oauthAuthenticationEntryPoint" />
|
169 |
| -<!-- <security:custom-filter ref="resourceServerFilter" before="PRE_AUTH_FILTER" /> --> |
| 181 | +<!-- <security:custom-filter ref="resourceServerFilter" after="CHANNEL_FILTER" /> --> |
170 | 182 | <security:custom-filter ref="clientAssertionEndpointFilter" after="PRE_AUTH_FILTER" /> <!-- this one has to go first -->
|
171 | 183 | <security:custom-filter ref="corsFilter" after="SECURITY_CONTEXT_FILTER" />
|
172 | 184 | <security:custom-filter ref="clientCredentialsEndpointFilter" after="BASIC_AUTH_FILTER" />
|
| 185 | +<security:csrf disabled="true"/> |
173 | 186 | </security:http>
|
174 | 187 |
|
175 | 188 | <bean id="oauthAuthenticationEntryPoint" class="org.springframework.security.oauth2.provider.error.OAuth2AuthenticationEntryPoint">
|
|
0 commit comments