Yel*_*own 5 java authentication keycloak
我按照演练为 keycloak(版本 4.8.3)设置自定义身份验证器 spi。我几乎只使用从这里获得的示例代码。我只更改了,pom以便我可以编译项目并使用mvn clean install wildfly:deploy. 它有效......我可以在 keycloak 中配置新的身份验证流程,更新浏览器流程并设置所需的操作。但如果我想在我的应用程序中使用新的身份验证,我会收到以下消息:Invalid username or password。在控制台中我得到以下输出:
17:12:20,721 WARN [org.keycloak.events] (default task-1) type=REFRESH_TOKEN_ERROR, realmId=master, clientId=security-admin-console, userId=null, ipAddress=127.0.0.1, error=invalid_token, grant_type=refresh_token, client_auth_method=client-secret\n17:13:50,514 WARN [org.keycloak.services] (default task-4) KC-SERVICES0013: Failed authentication: org.keycloak.authentication.AuthenticationFlowException: authenticator: secret-question-authenticator\n at org.keycloak.authentication.DefaultAuthenticationFlow.processFlow(DefaultAuthenticationFlow.java:194)\n at org.keycloak.authentication.AuthenticationProcessor.authenticateOnly(AuthenticationProcessor.java:910)\n at org.keycloak.authentication.AuthenticationProcessor.authenticate(AuthenticationProcessor.java:779)\n at org.keycloak.protocol.AuthorizationEndpointBase.handleBrowserAuthenticationRequest(AuthorizationEndpointBase.java:139)\n at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.buildAuthorizationCodeAuthorizationResponse(AuthorizationEndpoint.java:419)\n at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.process(AuthorizationEndpoint.java:152)\n at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.buildGet(AuthorizationEndpoint.java:108)\n at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\n at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)\n at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\n at java.lang.reflect.Method.invoke(Method.java:498)\n at org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.java:140)\n at org.jboss.resteasy.core.ResourceMethodInvoker.internalInvokeOnTarget(ResourceMethodInvoker.java:509)\n at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTargetAfterFilter(ResourceMethodInvoker.java:399)\n at org.jboss.resteasy.core.ResourceMethodInvoker.lambda$invokeOnTarget$0(ResourceMethodInvoker.java:363)\n at org.jboss.resteasy.core.interception.PreMatchContainerRequestContext.filter(PreMatchContainerRequestContext.java:358)\n at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceMethodInvoker.java:365)\n at org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:337)\n at org.jboss.resteasy.core.ResourceLocatorInvoker.invokeOnTargetObject(ResourceLocatorInvoker.java:137)\n at org.jboss.resteasy.core.ResourceLocatorInvoker.invoke(ResourceLocatorInvoker.java:106)\n at org.jboss.resteasy.core.ResourceLocatorInvoker.invokeOnTargetObject(ResourceLocatorInvoker.java:132)\n at org.jboss.resteasy.core.ResourceLocatorInvoker.invoke(ResourceLocatorInvoker.java:100)\n at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:443)\n at org.jboss.resteasy.core.SynchronousDispatcher.lambda$invoke$4(SynchronousDispatcher.java:233)\n at org.jboss.resteasy.core.SynchronousDispatcher.lambda$preprocess$0(SynchronousDispatcher.java:139)\n at org.jboss.resteasy.core.interception.PreMatchContainerRequestContext.filter(PreMatchContainerRequestContext.java:358)\n at org.jboss.resteasy.core.SynchronousDispatcher.preprocess(SynchronousDispatcher.java:142)\n at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:219)\n at org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:227)\n at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)\n at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)\n at javax.servlet.http.HttpServlet.service(HttpServlet.java:791)\n at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:74)\n at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:129)\n at org.keycloak.services.filters.KeycloakSessionServletFilter.doFilter(KeycloakSessionServletFilter.java:90)\n at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)\n at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)\n at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)\n at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)\n at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)\n at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)\n at org.wildfly.extension.undertow.security.SecurityContextAssociationHandler.handleRequest(SecurityContextAssociationHandler.java:78)\n at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:132)\n at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)\n at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)\n at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)\n at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java:60)\n at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java:77)\n at io.undertow.security.handlers.NotificationReceiverHandler.handleRequest(NotificationReceiverHandler.java:50)\n at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)\n at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n at org.wildfly.extension.undertow.security.jacc.JACCContextIdHandler.handleRequest(JACCContextIdHandler.java:61)\n at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n at org.wildfly.extension.undertow.deployment.GlobalRequestControllerHandler.handleRequest(GlobalRequestControllerHandler.java:68)\n at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)\n at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:292)\n at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:81)\n at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:138)\n at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:135)\n at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)\n at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)\n at org.wildfly.extension.undertow.security.SecurityContextThreadSetupAction.lambda$create$0(SecurityContextThreadSetupAction.java:105)\n at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java:1502)\n at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:272)\n at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:81)\n at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:104)\n at io.undertow.server.Connectors.executeRootHandler(Connectors.java:360)\n at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:830)\n at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)\n at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:1985)\n at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1487)\n at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1378)\n at java.lang.Thread.run(Thread.java:748)\n\n17:13:50,523 WARN [org.keycloak.events] (default task-4) type=LOGIN_ERROR, realmId=Test, clientId=test, userId=null, ipAddress=192.168.1.123, error=invalid_user_credentials, auth_method=openid-connect, auth_type=code, response_type=code, redirect_uri=http://localhost:8080/sso/login, code_id=102f9drs-15d2-4e68-b123-38c092640da7, response_mode=query\nRun Code Online (Sandbox Code Playgroud)\n我在github上查找了文件DefaultAuthenticationFlow.java:194,它似乎是一个RuntimeException:
\nthrow new RuntimeException("Unable to find factory for AuthenticatorFactory: " + model.getAuthenticator() + " did you forget to declare it in a META-INF/services file?");\nRun Code Online (Sandbox Code Playgroud)\n我真的不知道该怎么办。我包含示例项目中的 META-INF/服务。
\n\n知道这里可能有什么问题吗?
\n这是我的授权。流量设置:
\n\n绑定 \xc2\xbb 浏览器流程:设置为测试
\n我用这样的东西作为我自己的验证器。
\npublic class TestAuthenticator extends UsernamePasswordForm {\n\n @Override\n public void action(AuthenticationFlowContext context) {\n MultivaluedMap<String, String> formData = context.getHttpRequest().getDecodedFormParameters();\n if (formData.containsKey("cancel")) {\n context.cancelLogin();\n return;\n }\n if (!validateTestForm(context, formData))\n return;\n\n context.success();\n }\n\n private boolean validateTestForm(AuthenticationFlowContext context, MultivaluedMap<String, String> formData) {\n String username = formData.getFirst(AuthenticationManager.FORM_USERNAME);\n String password = formData.getFirst(CredentialRepresentation.PASSWORD);\n\n // remove leading and trailing whitespace\n username = username.trim();\n\n context.getEvent().detail(Details.USERNAME, username);\n context.getAuthenticationSession().setAuthNote(AbstractUsernameFormAuthenticator.ATTEMPTED_USERNAME, username);\n\n if (username == null) {\n context.getEvent().error(Errors.USERNAME_MISSING);\n Response challengeResponse = challenge(context, Messages.INVALID_USER);\n context.failureChallenge(AuthenticationFlowError.INVALID_USER, challengeResponse);\n return false;\n }\n UserModel user;\n try {\n // Check if this user exists\n user = KeycloakModelUtils.findUserByNameOrEmail(context.getSession(), context.getRealm(), username);\n if (user != null) {\n // do your own thing here ...\n validateUserAndPassword(context, formData);\n } \n } catch (ModelDuplicateException mde) {\n ServicesLogger.LOGGER.modelDuplicateException(mde);\n\n // Could happen during federation import\n if (mde.getDuplicateFieldName() != null && mde.getDuplicateFieldName().equals(UserModel.EMAIL)) {\n setDuplicateUserChallenge(context, Errors.EMAIL_IN_USE, Messages.EMAIL_EXISTS,\n AuthenticationFlowError.INVALID_USER);\n } else {\n setDuplicateUserChallenge(context, Errors.USERNAME_IN_USE, Messages.USERNAME_EXISTS,\n AuthenticationFlowError.INVALID_USER);\n }\n\n return false;\n }\n if (user == null) {\n testInvalidUser(context, user);\n return false;\n }\n\n if (!enabledUser(context, user))\n return false;\n\n context.setUser(user);\n return true;\n }\n\n}\n\npublic class TestAuthenticatorFactory implements AuthenticatorFactory, ConfigurableAuthenticatorFactory {\n\n public static final String PROVIDER_ID = "test-authenticator";\n private static final TestAuthenticator SINGLETON = new TestAuthenticator();\n\n @Override\n public String getId() {\n return PROVIDER_ID;\n }\n\n @Override\n public Authenticator create(KeycloakSession session) {\n return SINGLETON;\n }\n\n\n private static AuthenticationExecutionModel.Requirement[] REQUIREMENT_CHOICES = {\n AuthenticationExecutionModel.Requirement.REQUIRED, AuthenticationExecutionModel.Requirement.DISABLED };\n\n @Override\n public AuthenticationExecutionModel.Requirement[] getRequirementChoices() {\n return REQUIREMENT_CHOICES;\n }\n\n @Override\n public boolean isUserSetupAllowed() {\n return true;\n }\n\n @Override\n public boolean isConfigurable() {\n return true;\n }\n\n @Override\n public List<ProviderConfigProperty> getConfigProperties() {\n return Collections.emptyList();\n }\n\n @Override\n public String getHelpText() {\n return "Help";\n }\n\n @Override\n public String getDisplayType() {\n return "Test Authenticator";\n }\n\n @Override\n public String getReferenceCategory() {\n return PasswordCredentialModel.TYPE;\n }\n\n @Override\n public void init(Config.Scope config) {\n }\n\n @Override\n public void postInit(KeycloakSessionFactory factory) {\n }\n\n @Override\n public void close() {\n }\n\n}\nRun Code Online (Sandbox Code Playgroud)\n
小智 3
对于谁想要一个例子:
https://github.com/mfandre/KeycloakSPI/
此示例创建一个到用户存储的 SPI...这个想法类似于在 LDAP 中对用户进行身份验证,但在本示例中,我们将在 RestAPI 中进行身份验证并将用户带到 keycloak!