Keycloak Authenticator SPI 示例不起作用

Yel*_*own 5 java authentication keycloak

我按照演练为 keycloak(版本 4.8.3)设置自定义身份验证器 spi。我几乎只使用从这里获得的示例代码。我只更改了,pom以便我可以编译项目并使用mvn clean install wildfly:deploy. 它有效......我可以在 keycloak 中配置新的身份验证流程,更新浏览器流程并设置所需的操作。但如果我想在我的应用程序中使用新的身份验证,我会收到以下消息:Invalid username or password。在控制台中我得到以下输出:

\n
17:12:20,721 WARN  [org.keycloak.events] (default task-1) type=REFRESH_TOKEN_ERROR, realmId=master, clientId=security-admin-console, userId=null, ipAddress=127.0.0.1, error=invalid_token, grant_type=refresh_token, client_auth_method=client-secret\n17:13:50,514 WARN  [org.keycloak.services] (default task-4) KC-SERVICES0013: Failed authentication: org.keycloak.authentication.AuthenticationFlowException: authenticator: secret-question-authenticator\n        at org.keycloak.authentication.DefaultAuthenticationFlow.processFlow(DefaultAuthenticationFlow.java:194)\n        at org.keycloak.authentication.AuthenticationProcessor.authenticateOnly(AuthenticationProcessor.java:910)\n        at org.keycloak.authentication.AuthenticationProcessor.authenticate(AuthenticationProcessor.java:779)\n        at org.keycloak.protocol.AuthorizationEndpointBase.handleBrowserAuthenticationRequest(AuthorizationEndpointBase.java:139)\n        at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.buildAuthorizationCodeAuthorizationResponse(AuthorizationEndpoint.java:419)\n        at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.process(AuthorizationEndpoint.java:152)\n        at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.buildGet(AuthorizationEndpoint.java:108)\n        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n        at java.lang.reflect.Method.invoke(Method.java:498)\n        at org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.java:140)\n        at org.jboss.resteasy.core.ResourceMethodInvoker.internalInvokeOnTarget(ResourceMethodInvoker.java:509)\n        at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTargetAfterFilter(ResourceMethodInvoker.java:399)\n        at org.jboss.resteasy.core.ResourceMethodInvoker.lambda$invokeOnTarget$0(ResourceMethodInvoker.java:363)\n        at org.jboss.resteasy.core.interception.PreMatchContainerRequestContext.filter(PreMatchContainerRequestContext.java:358)\n        at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceMethodInvoker.java:365)\n        at org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:337)\n        at org.jboss.resteasy.core.ResourceLocatorInvoker.invokeOnTargetObject(ResourceLocatorInvoker.java:137)\n        at org.jboss.resteasy.core.ResourceLocatorInvoker.invoke(ResourceLocatorInvoker.java:106)\n        at org.jboss.resteasy.core.ResourceLocatorInvoker.invokeOnTargetObject(ResourceLocatorInvoker.java:132)\n        at org.jboss.resteasy.core.ResourceLocatorInvoker.invoke(ResourceLocatorInvoker.java:100)\n        at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:443)\n        at org.jboss.resteasy.core.SynchronousDispatcher.lambda$invoke$4(SynchronousDispatcher.java:233)\n        at org.jboss.resteasy.core.SynchronousDispatcher.lambda$preprocess$0(SynchronousDispatcher.java:139)\n        at org.jboss.resteasy.core.interception.PreMatchContainerRequestContext.filter(PreMatchContainerRequestContext.java:358)\n        at org.jboss.resteasy.core.SynchronousDispatcher.preprocess(SynchronousDispatcher.java:142)\n        at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:219)\n        at org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:227)\n        at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n        at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n        at javax.servlet.http.HttpServlet.service(HttpServlet.java:791)\n        at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:74)\n        at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:129)\n        at org.keycloak.services.filters.KeycloakSessionServletFilter.doFilter(KeycloakSessionServletFilter.java:90)\n        at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)\n        at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)\n        at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)\n        at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)\n        at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)\n        at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)\n        at org.wildfly.extension.undertow.security.SecurityContextAssociationHandler.handleRequest(SecurityContextAssociationHandler.java:78)\n        at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n        at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:132)\n        at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)\n        at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n        at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)\n        at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)\n        at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java:60)\n        at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java:77)\n        at io.undertow.security.handlers.NotificationReceiverHandler.handleRequest(NotificationReceiverHandler.java:50)\n        at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)\n        at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n        at org.wildfly.extension.undertow.security.jacc.JACCContextIdHandler.handleRequest(JACCContextIdHandler.java:61)\n        at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n        at org.wildfly.extension.undertow.deployment.GlobalRequestControllerHandler.handleRequest(GlobalRequestControllerHandler.java:68)\n        at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n        at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:292)\n        at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:81)\n        at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:138)\n        at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:135)\n        at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)\n        at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)\n        at org.wildfly.extension.undertow.security.SecurityContextThreadSetupAction.lambda$create$0(SecurityContextThreadSetupAction.java:105)\n        at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n        at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n        at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n        at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n        at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:272)\n        at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:81)\n        at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:104)\n        at io.undertow.server.Connectors.executeRootHandler(Connectors.java:360)\n        at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:830)\n        at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)\n        at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1985)\n        at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1487)\n        at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1378)\n        at java.lang.Thread.run(Thread.java:748)\n\n17:13:50,523 WARN  [org.keycloak.events] (default task-4) type=LOGIN_ERROR, realmId=Test, clientId=test, userId=null, ipAddress=192.168.1.123, error=invalid_user_credentials, auth_method=openid-connect, auth_type=code, response_type=code, redirect_uri=http://localhost:8080/sso/login, code_id=102f9drs-15d2-4e68-b123-38c092640da7, response_mode=query\n
Run Code Online (Sandbox Code Playgroud)\n

我在github上查找了文件DefaultAuthenticationFlow.java:194,它似乎是一个RuntimeException:

\n
throw new RuntimeException("Unable to find factory for AuthenticatorFactory: " + model.getAuthenticator() + " did you forget to declare it in a META-INF/services file?");\n
Run Code Online (Sandbox Code Playgroud)\n

我真的不知道该怎么办。我包含示例项目中的 META-INF/服务。

\n

在此输入图像描述

\n

知道这里可能有什么问题吗?

\n

更新:

\n

这是我的授权。流量设置:

\n

在此输入图像描述

\n

绑定 \xc2\xbb 浏览器流程:设置为测试

\n

更新:

\n

我用这样的东西作为我自己的验证器。

\n
public class TestAuthenticator extends UsernamePasswordForm {\n\n    @Override\n    public void action(AuthenticationFlowContext context) {\n        MultivaluedMap<String, String> formData = context.getHttpRequest().getDecodedFormParameters();\n        if (formData.containsKey("cancel")) {\n            context.cancelLogin();\n            return;\n        }\n        if (!validateTestForm(context, formData))\n            return;\n\n        context.success();\n    }\n\n    private boolean validateTestForm(AuthenticationFlowContext context, MultivaluedMap<String, String> formData) {\n        String username = formData.getFirst(AuthenticationManager.FORM_USERNAME);\n        String password = formData.getFirst(CredentialRepresentation.PASSWORD);\n\n        // remove leading and trailing whitespace\n        username = username.trim();\n\n        context.getEvent().detail(Details.USERNAME, username);\n        context.getAuthenticationSession().setAuthNote(AbstractUsernameFormAuthenticator.ATTEMPTED_USERNAME, username);\n\n        if (username == null) {\n            context.getEvent().error(Errors.USERNAME_MISSING);\n            Response challengeResponse = challenge(context, Messages.INVALID_USER);\n            context.failureChallenge(AuthenticationFlowError.INVALID_USER, challengeResponse);\n            return false;\n        }\n        UserModel user;\n        try {\n            // Check if this user exists\n            user = KeycloakModelUtils.findUserByNameOrEmail(context.getSession(), context.getRealm(), username);\n            if (user != null) {\n                // do your own thing here ...\n                validateUserAndPassword(context, formData);\n            } \n        } catch (ModelDuplicateException mde) {\n            ServicesLogger.LOGGER.modelDuplicateException(mde);\n\n            // Could happen during federation import\n            if (mde.getDuplicateFieldName() != null && mde.getDuplicateFieldName().equals(UserModel.EMAIL)) {\n                setDuplicateUserChallenge(context, Errors.EMAIL_IN_USE, Messages.EMAIL_EXISTS,\n                        AuthenticationFlowError.INVALID_USER);\n            } else {\n                setDuplicateUserChallenge(context, Errors.USERNAME_IN_USE, Messages.USERNAME_EXISTS,\n                        AuthenticationFlowError.INVALID_USER);\n            }\n\n            return false;\n        }\n        if (user == null) {\n            testInvalidUser(context, user);\n            return false;\n        }\n\n        if (!enabledUser(context, user))\n            return false;\n\n        context.setUser(user);\n        return true;\n    }\n\n}\n\npublic class TestAuthenticatorFactory implements AuthenticatorFactory, ConfigurableAuthenticatorFactory {\n\n    public static final String PROVIDER_ID = "test-authenticator";\n    private static final TestAuthenticator SINGLETON = new TestAuthenticator();\n\n    @Override\n    public String getId() {\n        return PROVIDER_ID;\n    }\n\n    @Override\n    public Authenticator create(KeycloakSession session) {\n        return SINGLETON;\n    }\n\n\n    private static AuthenticationExecutionModel.Requirement[] REQUIREMENT_CHOICES = {\n            AuthenticationExecutionModel.Requirement.REQUIRED, AuthenticationExecutionModel.Requirement.DISABLED };\n\n    @Override\n    public AuthenticationExecutionModel.Requirement[] getRequirementChoices() {\n        return REQUIREMENT_CHOICES;\n    }\n\n    @Override\n    public boolean isUserSetupAllowed() {\n        return true;\n    }\n\n    @Override\n    public boolean isConfigurable() {\n        return true;\n    }\n\n    @Override\n    public List<ProviderConfigProperty> getConfigProperties() {\n        return Collections.emptyList();\n    }\n\n    @Override\n    public String getHelpText() {\n        return "Help";\n    }\n\n    @Override\n    public String getDisplayType() {\n        return "Test Authenticator";\n    }\n\n    @Override\n    public String getReferenceCategory() {\n        return PasswordCredentialModel.TYPE;\n    }\n\n    @Override\n    public void init(Config.Scope config) {\n    }\n\n    @Override\n    public void postInit(KeycloakSessionFactory factory) {\n    }\n\n    @Override\n    public void close() {\n    }\n\n}\n
Run Code Online (Sandbox Code Playgroud)\n

小智 3

对于谁想要一个例子:

https://github.com/mfandre/KeycloakSPI/

此示例创建一个到用户存储的 SPI...这个想法类似于在 LDAP 中对用户进行身份验证,但在本示例中,我们将在 RestAPI 中进行身份验证并将用户带到 keycloak!