๐Ÿ”ฅ Spring Security: Authentication & Authorization Simplified ๐Ÿ”ฅ

Shubham RaiyaniShubham Raiyani
5 min read

๐Ÿ“Œ 1. Authentication Components

๐Ÿ”น 1.1 Authentication (Interface)

๐Ÿ”น Purpose: Represents the current logged-in user.
๐Ÿ”น Where to use: When you need to get user details inside your app.
๐Ÿ”น Best Practice: Always fetch authentication using SecurityContextHolder.

๐Ÿ“Œ

Spring Security is a framework that helps secure your web applications by handling authentication (who you are) and authorization (what you can do).

This guide breaks down all key components, explaining:
โœ… What they do
โœ… Where and when to use them
โœ… Best practices in real-world applications


๐Ÿ“Œ 1. Authentication Basics

Authentication is the process of verifying who you are when accessing an application. In Spring Security, this is handled by different components that work together.


๐Ÿ”น 1.1 Authentication (Interface)

๐Ÿ”น What it does: Stores user details after login.
๐Ÿ”น Where to use it: When you need to know who is logged in.
๐Ÿ”น Best practice: Always fetch from SecurityContextHolder.

๐Ÿ“Œ Example:

javaCopyEditAuthentication authentication = SecurityContextHolder.getContext().getAuthentication();
System.out.println(authentication.getName()); // Logged-in username

This ensures only authenticated users access specific resources.


๐Ÿ”น 1.2 AuthenticationManager (Interface)

๐Ÿ”น What it does: Validates login credentials.
๐Ÿ”น Where to use it: When a user submits their username and password.
๐Ÿ”น Best practice: Use it inside a service instead of directly in controllers.

๐Ÿ“Œ Example Implementation:

javaCopyEdit@Bean
public AuthenticationManager authenticationManager(UserDetailsService userDetailsService) {
    DaoAuthenticationProvider provider = new DaoAuthenticationProvider();
    provider.setUserDetailsService(userDetailsService);
    provider.setPasswordEncoder(new BCryptPasswordEncoder());
    return new ProviderManager(provider);
}

This ensures secure authentication logic.


๐Ÿ”น 1.3 AuthenticationProvider (Interface)

๐Ÿ”น What it does: Checks credentials against a database.
๐Ÿ”น Where to use it: Inside authentication logic (e.g., JWT, OAuth2).
๐Ÿ”น Best practice: Use DaoAuthenticationProvider for database-based login.

๐Ÿ“Œ Example:

javaCopyEdit@Bean
public AuthenticationProvider authenticationProvider(){
    DaoAuthenticationProvider provider = new DaoAuthenticationProvider();
    provider.setPasswordEncoder(new BCryptPasswordEncoder());
    provider.setUserDetailsService(userDetailsService);
    return provider;
}

This provides a secure way to verify users.


๐Ÿ“Œ 2. Managing Users in Spring Security

To authenticate users, Spring Security needs a way to load user details.


๐Ÿ”น 2.1 UserDetails (Interface)

๐Ÿ”น What it does: Represents a user in the system.
๐Ÿ”น Where to use it: Used by UserDetailsService to load users from DB.
๐Ÿ”น Best practice: Implement in a separate class to avoid exposing sensitive data.

๐Ÿ“Œ Example Implementation:

javaCopyEditpublic class CustomUserDetails implements UserDetails {
    private User user;

    public CustomUserDetails(User user) {
        this.user = user;
    }

    @Override
    public String getUsername() {
        return user.getUsername();
    }

    @Override
    public String getPassword() {
        return user.getPassword();
    }

    @Override
    public Collection<? extends GrantedAuthority> getAuthorities() {
        return Collections.singleton(new SimpleGrantedAuthority(user.getRole()));
    }
}

This keeps user management flexible and secure.


๐Ÿ”น 2.2 UserDetailsService (Interface)

๐Ÿ”น What it does: Fetches user details from a database.
๐Ÿ”น Where to use it: Inside authentication providers (DaoAuthenticationProvider).
๐Ÿ”น Best practice: Fetch only necessary user details for better performance.

๐Ÿ“Œ Example Implementation:

javaCopyEdit@Service
public class UserDetailsServiceImpl implements UserDetailsService {
    private final UserRepository userRepository;

    public UserDetailsServiceImpl(UserRepository userRepository) {
        this.userRepository = userRepository;
    }

    @Override
    public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {
        User user = userRepository.findByUsername(username)
                .orElseThrow(() -> new UsernameNotFoundException("User not found"));
        return new CustomUserDetails(user);
    }
}

This ensures users are securely retrieved from the database.


๐Ÿ“Œ 3. Securing Endpoints in Spring Security

After authenticating users, we need to control what they can access.


๐Ÿ”น 3.1 SecurityFilterChain (Interface)

๐Ÿ”น What it does: Defines security rules (who can access what).
๐Ÿ”น Where to use it: In the @Configuration class.
๐Ÿ”น Best practice: Keep rules modular and well-organized.

๐Ÿ“Œ Example Implementation:

javaCopyEdit@Bean
public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
    http.csrf().disable()
        .authorizeRequests()
        .antMatchers("/api/auth/**").permitAll()  // Public endpoints
        .anyRequest().authenticated()  // Secure all other endpoints
        .and()
        .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
    return http.build();
}

This ensures unauthenticated users cannot access protected resources.


๐Ÿ”น 3.2 HttpSecurity (Class)

๐Ÿ”น What it does: Configures authentication, session management, CORS, CSRF, etc.
๐Ÿ”น Where to use it: Inside SecurityFilterChain.
๐Ÿ”น Best practice: Disable CSRF for APIs but enable it for web forms.

๐Ÿ“Œ Example:

javaCopyEdit@Bean
public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
    http.csrf().disable()
        .authorizeRequests()
        .antMatchers("/public/**").permitAll()
        .antMatchers("/admin/**").hasRole("ADMIN")
        .anyRequest().authenticated()
        .and()
        .httpBasic();
    return http.build();
}

This controls who can access what parts of the application.


๐Ÿ“Œ 4. Token-Based Authentication (JWT)

Instead of using sessions, modern applications use JWT tokens for authentication.


๐Ÿ”น 4.1 OncePerRequestFilter (Abstract Class)

๐Ÿ”น What it does: Ensures JWT validation happens only once per request.
๐Ÿ”น Where to use it: Before UsernamePasswordAuthenticationFilter.
๐Ÿ”น Best practice: Keep it lightweight to avoid performance issues.

๐Ÿ“Œ Example:

javaCopyEdit@Component
public class JwtRequestFilter extends OncePerRequestFilter {
    @Override
    protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response,
                                    FilterChain chain) throws ServletException, IOException {
        String token = extractJwtFromRequest(request);
        // Validate token and set authentication in SecurityContextHolder
        chain.doFilter(request, response);
    }
}

This ensures JWT authentication is properly enforced.


๐Ÿ“Œ 5. Handling Errors in Security

To provide a better user experience, Spring Security allows custom error handling.


๐Ÿ”น 5.1 AuthenticationEntryPoint (Interface)

๐Ÿ”น What it does: Handles 401 Unauthorized errors.
๐Ÿ”น Where to use it: Inside SecurityFilterChain.
๐Ÿ”น Best practice: Return meaningful error messages.

๐Ÿ“Œ Example:

javaCopyEdit@Component
public class JwtAuthenticationEntryPoint implements AuthenticationEntryPoint {
    @Override
    public void commence(HttpServletRequest request, HttpServletResponse response,
                         AuthenticationException authException) throws IOException {
        response.sendError(HttpServletResponse.SC_UNAUTHORIZED, "Unauthorized access");
    }
}

๐Ÿ”น 5.2 AccessDeniedHandler (Interface)

๐Ÿ”น What it does: Handles 403 Forbidden errors.
๐Ÿ”น Where to use it: Inside SecurityFilterChain.
๐Ÿ”น Best practice: Log security violations.

๐Ÿ“Œ Example:

javaCopyEdit@Component
public class CustomAccessDeniedHandler implements AccessDeniedHandler {
    @Override
    public void handle(HttpServletRequest request, HttpServletResponse response,
                       AccessDeniedException accessDeniedException) throws IOException {
        response.sendError(HttpServletResponse.SC_FORBIDDEN, "Access Denied");
    }
}

โœ… Conclusion

Spring Security is flexible and powerful. Follow these best practices:
โœ” Use UserDetailsService for database authentication.
โœ” Use JWT for secure token-based authentication.
โœ” Define clear access rules using SecurityFilterChain.

Let me know if you need more details! ๐Ÿš€

0
Subscribe to my newsletter

Read articles from Shubham Raiyani directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Shubham Raiyani
Shubham Raiyani