Java Code Examples for org.springframework.security.config.annotation.web.builders.HttpSecurity#cors()
The following examples show how to use
org.springframework.security.config.annotation.web.builders.HttpSecurity#cors() .
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source File: InsightsSecurityConfigurationAdapterSAML.java From Insights with Apache License 2.0 | 6 votes |
@Override protected void configure(HttpSecurity http) throws Exception { LOG.debug("message Inside InsightsSecurityConfigurationAdapterSAML,HttpSecurity **** {} ", ApplicationConfigProvider.getInstance().getAutheticationProtocol()); if (AUTH_TYPE.equalsIgnoreCase(ApplicationConfigProvider.getInstance().getAutheticationProtocol())) { LOG.debug("message Inside SAMLAuthConfig, check http security **** "); http.cors(); http.csrf().ignoringAntMatchers(AuthenticationUtils.CSRF_IGNORE) .csrfTokenRepository(authenticationUtils.csrfTokenRepository()) .and().addFilterAfter(new InsightsCustomCsrfFilter(), CsrfFilter.class); http.exceptionHandling().authenticationEntryPoint(samlEntryPoint()); http.addFilterBefore(metadataGeneratorFilter(), ChannelProcessingFilter.class).addFilterAfter(samlFilter(), BasicAuthenticationFilter.class); http.anonymous().disable().authorizeRequests().antMatchers("/error").permitAll().antMatchers("/admin/**") .access("hasAuthority('Admin')").antMatchers("/saml/**").permitAll() // .antMatchers("/user/insightsso/**").permitAll() ///logout .anyRequest().authenticated(); http.logout().logoutSuccessUrl("/"); } }
Example 2
Source File: InsightsSecurityConfigurationAdapterKerberos.java From Insights with Apache License 2.0 | 6 votes |
@Override protected void configure(HttpSecurity http) throws Exception { LOG.debug("message Inside InsightsSecurityConfigurationAdapterKerberos,HttpSecurity **** {} ", ApplicationConfigProvider.getInstance().getAutheticationProtocol()); if (AUTH_TYPE.equalsIgnoreCase(ApplicationConfigProvider.getInstance().getAutheticationProtocol())) { LOG.debug("message Inside SAMLAuthConfig, check http security **** "); http.cors(); http.csrf().ignoringAntMatchers(AuthenticationUtils.CSRF_IGNORE) .csrfTokenRepository(authenticationUtils.csrfTokenRepository()) .and().addFilterAfter(new InsightsCustomCsrfFilter(), CsrfFilter.class); http.exceptionHandling().authenticationEntryPoint(spnegoEntryPoint()); http.addFilterAfter(kerberosFilter(), BasicAuthenticationFilter.class); http.anonymous().disable().authorizeRequests().antMatchers("/error").permitAll().antMatchers("/admin/**") .access("hasAuthority('Admin')").antMatchers("/saml/**").permitAll() //.antMatchers("/user/insightsso/**").permitAll() ///logout .anyRequest().authenticated(); http.logout().logoutSuccessUrl("/"); } }
Example 3
Source File: ResourceServerExampleApplication.java From samples-java-spring with Apache License 2.0 | 5 votes |
@Override protected void configure(HttpSecurity http) throws Exception { http.authorizeRequests() .anyRequest().authenticated() .and() .oauth2ResourceServer().jwt(); // process CORS annotations http.cors(); // force a non-empty response body for 401's to make the response more browser friendly Okta.configureResourceServer401ResponseBody(http); }
Example 4
Source File: WebSecurityConfig.java From tutorials with MIT License | 5 votes |
@Override protected void configure(HttpSecurity http) throws Exception { http .authorizeRequests() .anyRequest().authenticated() .and() .httpBasic(); http.cors(); //disable this line to reproduce the CORS 401 }
Example 5
Source File: SecurityConfig.java From cloud-service with MIT License | 4 votes |
@Override protected void configure(HttpSecurity http) throws Exception { http.csrf().disable(); http.headers().frameOptions().sameOrigin(); http.cors(); }
Example 6
Source File: SecurityConfig.java From Spring-Security-Third-Edition with MIT License | 4 votes |
/** * HTTP Security configuration * * <pre><http auto-config="true"></pre> is equivalent to: * <pre> * <http> * <form-login /> * <http-basic /> * <logout /> * </http> * </pre> * * Which is equivalent to the following JavaConfig: * * <pre> * http.formLogin() * .and().httpBasic() * .and().logout(); * </pre> * * @param http HttpSecurity configuration. * @throws Exception Authentication configuration exception * * @see <a href="http://docs.spring.io/spring-security/site/migrate/current/3-to-4/html5/migrate-3-to-4-jc.html"> * Spring Security 3 to 4 migration</a> */ @Override protected void configure(final HttpSecurity http) throws Exception { // http // .cors().and().csrf().disable() // .authorizeRequests() // .anyRequest().authenticated().and().httpBasic(); // Matching http.httpBasic().and() .authorizeRequests() .antMatchers("/").permitAll() .antMatchers("/signup/*").permitAll() .antMatchers("/errors/**").permitAll() .antMatchers("/events/").hasRole("ADMIN") .antMatchers("/**").hasRole("USER") ; // CSRF is enabled by default, with Java Config http.csrf().disable(); http.cors(); }