spring-security-pac4j | pac4j security library to Spring Security | Authentication library
kandi X-RAY | spring-security-pac4j Summary
kandi X-RAY | spring-security-pac4j Summary
The spring-security-pac4j project is an easy and powerful security library for Spring Security web applications and web services (with or without Spring Boot). It supports authentication and authorization, but also advanced features like session fixation and CSRF protection. It's based on Java 11, Spring Security 5 and on the pac4j security engine v5. It's available under the Apache 2 license. OAuth - SAML - CAS - OpenID Connect - HTTP - Google App Engine - Kerberos - LDAP - SQL - JWT - MongoDB - CouchDB - IP address - REST API. Roles/permissions - Anonymous/remember-me/(fully) authenticated - Profile type, attribute - CORS - CSRF - Security headers - IP address, HTTP method.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Saves the profiles
- Compute the Spring Security Authentication from Pac4j profiles
- Performs the login
- Compares this token to another RememberMeToken
- Builds a list of authorities from a list of profiles
- Returns a hashCode instance for the profiles
- Removes all profiles
- Initializes the security bridge
- Get the main profile of the authenticated user
- Returns the profile name
- Returns a string representation of this object
spring-security-pac4j Key Features
spring-security-pac4j Examples and Code Snippets
Community Discussions
Trending Discussions on spring-security-pac4j
QUESTION
I'm working on a java Spring Boot project that manages users and sessions internally. It relies on OIDC, AWS Cognito being the Identity Provider, for sign-in and, I would hope, sign-out of the users. What I understand from the OIDC Spec for backchannel logout is that:
I must provide an endpoint for logout in my backend application. I am using Pac4J as my OIDC library in a java Spring Boot application, and have enabled the
logout
endpoint as per the Pac4J Spring Security documentationThe Identity Provider AWS Cognito should send a request to the logout endpoint if the user is signed out from the Identity Provider
When I receive a valid call (as per the OIDC spec) on this endpoint, I must destroy the user's session with my application.
However, the user being logged out of the Identity Provider (AWS Cognito) does not seem to result in a call to the logout endpoint of my application.
I am unable to find documentation for this backchannel behaviour in the AWS Cognito docs.
- Have I understood the backchannel logout correctly?
- Is this currently unsupported as OIDC logout is still (as of March 12, 2019) in draft status?
ANSWER
Answered 2019-Mar-13 at 17:02I contacted the main developer of Pac4J who was very prompt to reply.
AWS Cognito:
- Currently does not seem to support backchannel logout
Pac4J:
- Backchannel logout is currently not supported by the library for OIDC, and it isn't on the roadmap either: https://groups.google.com/forum/?fromgroups#!topic/pac4j-users/SD_IgKVZWvM, the /logout referenced in the documentation is for internal (to the app) logout + (if configured) forwarding a logout request to the identity provider. It is NOT a OIDC-backchannel-logout endpoint.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install spring-security-pac4j
You can use spring-security-pac4j like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the spring-security-pac4j component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page