DEV Community

Cover image for Spring Security: Implementing JWT Authentication in Your Java Application
Igor Venturelli
Igor Venturelli

Posted on • Originally published at igventurelli.io

Spring Security: Implementing JWT Authentication in Your Java Application

In the modern world of web development, securing your applications is of paramount importance. One of the most effective ways to do this in a Spring Boot application is by using JSON Web Tokens (JWT). This blog post will guide you through the essentials of Spring Boot, JWT, and how to implement JWT authentication using Spring Security. We'll also touch on the differences between JWT and opaque tokens and provide code examples.

What is Spring Boot?

Spring Boot is an open-source framework designed to simplify the development of Java applications. It provides a range of features that make it easy to create stand-alone, production-grade Spring-based applications with minimal configuration. With embedded servers and various starter dependencies, Spring Boot allows developers to get their applications up and running quickly and efficiently.

What is JWT?

JSON Web Tokens (JWT) are a compact, URL-safe means of representing claims between two parties. A JWT is essentially a string of characters that can be used to securely transmit information between a client and a server. JWTs are commonly used for authentication and authorization purposes in web applications.

Why JWT Tokens are the Standard for Authentication

JWT tokens have become the standard for authentication due to their simplicity, security, and flexibility. They are self-contained, meaning they contain all the necessary information for authentication, which reduces the need for server-side session storage. JWTs are also stateless, making them ideal for distributed systems and microservices architectures.

Introduction to Spring Security

Spring Security is a powerful and customizable authentication and access control framework for Java applications. It is part of the larger Spring framework and provides comprehensive security services for Java applications. Spring Security handles various security concerns, including authentication, authorization, and protection against common vulnerabilities.

Opaque Tokens vs. JWT

Opaque tokens and JWTs are two different types of tokens used for authentication. Opaque tokens are random strings with no inherent meaning, and their validity must be verified by querying the authorization server. In contrast, JWTs are self-contained and contain all the necessary information for authentication, which allows them to be validated without a server-side call.

Implementing JWT Authentication in Spring Boot

Let's dive into implementing JWT authentication in a Spring Boot application. We'll go through the essential components and provide code examples to help you get started.

Step 1: Add Dependencies

First, add the necessary dependencies to your pom.xml file.

<dependencies>
    <dependency>
        <groupId>org.springframework.boot</groupId>
        <artifactId>spring-boot-starter-security</artifactId>
    </dependency>
    <dependency>
        <groupId>io.jsonwebtoken</groupId>
        <artifactId>jjwt</artifactId>
        <version>0.9.1</version>
    </dependency>
    <dependency>
        <groupId>org.springframework.boot</groupId>
        <artifactId>spring-boot-starter-web</artifactId>
    </dependency>
</dependencies>
Enter fullscreen mode Exit fullscreen mode

Step 2: Configure Spring Security

Create a configuration class to configure Spring Security.

@Configuration
@EnableWebSecurity
public class SecurityConfig extends WebSecurityConfigurerAdapter {

    @Override
    protected void configure(HttpSecurity http) throws Exception {
        http.csrf().disable()
            .authorizeRequests()
            .antMatchers("/api/auth/**").permitAll()
            .anyRequest().authenticated()
            .and()
            .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);

        // Add JWT token filter
        http.addFilterBefore(jwtAuthenticationFilter(), UsernamePasswordAuthenticationFilter.class);
    }

    @Bean
    public JWTAuthenticationFilter jwtAuthenticationFilter() {
        return new JWTAuthenticationFilter();
    }
}
Enter fullscreen mode Exit fullscreen mode

Step 3: Create JWT Utility Class

Create a utility class to generate and validate JWT tokens.

@Component
public class JwtUtil {

    private static final String SECRET_KEY = "your_secret_key";

    public String generateToken(UserDetails userDetails) {
        return Jwts.builder()
            .setSubject(userDetails.getUsername())
            .setIssuedAt(new Date())
            .setExpiration(new Date(System.currentTimeMillis() + 1000 * 60 * 60 * 10))
            .signWith(SignatureAlgorithm.HS256, SECRET_KEY)
            .compact();
    }

    public String extractUsername(String token) {
        return Jwts.parser().setSigningKey(SECRET_KEY).parseClaimsJws(token).getBody().getSubject();
    }

    public boolean validateToken(String token, UserDetails userDetails) {
        final String username = extractUsername(token);
        return username.equals(userDetails.getUsername()) && !isTokenExpired(token);
    }

    private boolean isTokenExpired(String token) {
        return Jwts.parser().setSigningKey(SECRET_KEY).parseClaimsJws(token).getBody().getExpiration().before(new Date());
    }
}
Enter fullscreen mode Exit fullscreen mode

Step 4: Implement JWT Authentication Filter

Create a filter to intercept requests and validate the JWT token.

public class JWTAuthenticationFilter extends OncePerRequestFilter {

    @Autowired
    private JwtUtil jwtUtil;

    @Autowired
    private UserDetailsService userDetailsService;

    @Override
    protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) throws ServletException, IOException {
        final String authorizationHeader = request.getHeader("Authorization");

        String username = null;
        String jwt = null;

        if (authorizationHeader != null && authorizationHeader.startsWith("Bearer ")) {
            jwt = authorizationHeader.substring(7);
            username = jwtUtil.extractUsername(jwt);
        }

        if (username != null && SecurityContextHolder.getContext().getAuthentication() == null) {
            UserDetails userDetails = this.userDetailsService.loadUserByUsername(username);
            if (jwtUtil.validateToken(jwt, userDetails)) {
                UsernamePasswordAuthenticationToken authenticationToken = new UsernamePasswordAuthenticationToken(userDetails, null, userDetails.getAuthorities());
                authenticationToken.setDetails(new WebAuthenticationDetailsSource().buildDetails(request));
                SecurityContextHolder.getContext().setAuthentication(authenticationToken);
            }
        }

        filterChain.doFilter(request, response);
    }
}
Enter fullscreen mode Exit fullscreen mode

Step 5: Create Authentication Controller

Create a controller to handle authentication requests.

@RestController
@RequestMapping("/api/auth")
public class AuthController {

    @Autowired
    private AuthenticationManager authenticationManager;

    @Autowired
    private JwtUtil jwtUtil;

    @Autowired
    private UserDetailsService userDetailsService;

    @PostMapping("/login")
    public ResponseEntity<?> createAuthenticationToken(@RequestBody AuthRequest authRequest) throws Exception {
        try {
            authenticationManager.authenticate(new UsernamePasswordAuthenticationToken(authRequest.getUsername(), authRequest.getPassword()));
        } catch (BadCredentialsException e) {
            throw new Exception("Incorrect username or password", e);
        }

        final UserDetails userDetails = userDetailsService.loadUserByUsername(authRequest.getUsername());
        final String jwt = jwtUtil.generateToken(userDetails);

        return ResponseEntity.ok(new AuthResponse(jwt));
    }
}
Enter fullscreen mode Exit fullscreen mode

Step 6: Create Authentication Request and Response Classes

Create request and response classes for authentication.

public class AuthRequest {

    private String username;
    private String password;

    // Getters and setters
}

public class AuthResponse {

    private String jwt;

    public AuthResponse(String jwt) {
        this.jwt = jwt;
    }

    // Getter
}
Enter fullscreen mode Exit fullscreen mode

Conclusion

Implementing JWT authentication in a Spring Boot application using Spring Security ensures robust and secure access control. By understanding the basics of Spring Boot, JWT, and Spring Security, you can effectively secure your applications. With the provided code examples, you can quickly set up JWT authentication and enhance the security of your Spring Boot applications.


Let’s connect!

📧 Don't Miss a Post! Subscribe to my Newsletter!
➡️ LinkedIn
🚩 Original Post
☕ Buy me a Coffee

Top comments (0)