Java EE 7 / JAX-RS 2.0: Simple REST API Authentication & Authorization with Custom HTTP Header--reference
REST has made a lot of conveniences when it comes to implementing web services with the already available HTTP protocol at its disposal. By just firing GET, POST and other HTTP methods through the designated URL, you’ll sure to get something done through a response out of a REST service. But whatever conveniences which REST has given to the developers, the subject of security and access control should always be addressed. This article will show you how to implement simple user based authentication with the use of HTTP Headers and JAX-RS 2.0 interceptors.
Authenticator
Let’s begin with an authenticator class. This DemoAuthenticator with the codes below provides the necessary methods for authenticating any users which is request access to the REST web service. Please read through the codes and the comments are there to guide the understanding.
Codes for DemoAuthenticator:
package com.developerscrappad.business;
import java.util.HashMap;
import java.util.Map;
import java.util.UUID;
import java.security.GeneralSecurityException;
import javax.security.auth.login.LoginException;
public final class DemoAuthenticator {
private static DemoAuthenticator authenticator = null;
// A user storage which stores <username, password>
private final Map<String, String> usersStorage = new HashMap();
// A service key storage which stores <service_key, username>
private final Map<String, String> serviceKeysStorage = new HashMap();
// An authentication token storage which stores <service_key, auth_token>.
private final Map<String, String> authorizationTokensStorage = new HashMap();
private DemoAuthenticator() {
// The usersStorage pretty much represents a user table in the database
usersStorage.put( "username1", "passwordForUser1" );
usersStorage.put( "username2", "passwordForUser2" );
usersStorage.put( "username3", "passwordForUser3" );
/**
* Service keys are pre-generated by the system and is given to the
* authorized client who wants to have access to the REST API. Here,
* only username1 and username2 is given the REST service access with
* their respective service keys.
*/
serviceKeysStorage.put( "f80ebc87-ad5c-4b29-9366-5359768df5a1", "username1" );
serviceKeysStorage.put( "3b91cab8-926f-49b6-ba00-920bcf934c2a", "username2" );
}
public static DemoAuthenticator getInstance() {
if ( authenticator == null ) {
authenticator = new DemoAuthenticator();
}
return authenticator;
}
public String login( String serviceKey, String username, String password ) throws LoginException {
if ( serviceKeysStorage.containsKey( serviceKey ) ) {
String usernameMatch = serviceKeysStorage.get( serviceKey );
if ( usernameMatch.equals( username ) && usersStorage.containsKey( username ) ) {
String passwordMatch = usersStorage.get( username );
if ( passwordMatch.equals( password ) ) {
/**
* Once all params are matched, the authToken will be
* generated and will be stored in the
* authorizationTokensStorage. The authToken will be needed
* for every REST API invocation and is only valid within
* the login session
*/
String authToken = UUID.randomUUID().toString();
authorizationTokensStorage.put( authToken, username );
return authToken;
}
}
}
throw new LoginException( "Don't Come Here Again!" );
}
/**
* The method that pre-validates if the client which invokes the REST API is
* from a authorized and authenticated source.
*
* @param serviceKey The service key
* @param authToken The authorization token generated after login
* @return TRUE for acceptance and FALSE for denied.
*/
public boolean isAuthTokenValid( String serviceKey, String authToken ) {
if ( isServiceKeyValid( serviceKey ) ) {
String usernameMatch1 = serviceKeysStorage.get( serviceKey );
if ( authorizationTokensStorage.containsKey( authToken ) ) {
String usernameMatch2 = authorizationTokensStorage.get( authToken );
if ( usernameMatch1.equals( usernameMatch2 ) ) {
return true;
}
}
}
return false;
}
/**
* This method checks is the service key is valid
*
* @param serviceKey
* @return TRUE if service key matches the pre-generated ones in service key
* storage. FALSE for otherwise.
*/
public boolean isServiceKeyValid( String serviceKey ) {
return serviceKeysStorage.containsKey( serviceKey );
}
public void logout( String serviceKey, String authToken ) throws GeneralSecurityException {
if ( serviceKeysStorage.containsKey( serviceKey ) ) {
String usernameMatch1 = serviceKeysStorage.get( serviceKey );
if ( authorizationTokensStorage.containsKey( authToken ) ) {
String usernameMatch2 = authorizationTokensStorage.get( authToken );
if ( usernameMatch1.equals( usernameMatch2 ) ) {
/**
* When a client logs out, the authentication token will be
* remove and will be made invalid.
*/
authorizationTokensStorage.remove( authToken );
return;
}
}
}
throw new GeneralSecurityException( "Invalid service key and authorization token match." );
}
}
General Code Explanation:
Generally, there are only a few important items that makes up the authenticator and that that is: service key, authorization token, username and password. The username and password will commonly go in pairs.
Service Key
The service key may be new to some readers; in some public REST API service, a service key and sometimes known as API key, is generated by the system and then sends to the user/client (either through email or other means) that is permitted to access the REST service. So besides login into the REST service with just mere username and password, the system will also check on the service key if the user/client is permitted to access the REST APIs. The usernames, passwords and service keys are all predefined in the codes above for now only demo purpose.
Authorization Token
Upon authentication (through the login() method), the system will then generate an authorization token for the authenticated user. This token is passed back to the user/client through HTTP response and is to be used for any REST API invocation later. The user/client will have to find a way to store and use it throughout the login session. We’ll look at that later.
Required HTTP Headers Name Definition
Moving forward, instead of having the service key and authorization token to be passed to the server-side app as HTTP parameters (Form or Query), we’ll have it pass as HTTP Headers. This is to allow the request to be first filtered before being processed by the targeted REST method. The names for the HTTP Headers are below:
HTTP Header Name | Description |
---|---|
service_key | The service key that enables a HTTP client to access the REST Web Services. This is the first layer of authenticating and authorizing the HTTP Request. |
auth_token | The token generated upon username/password authentication, which is to be used for any REST Web Service calls (except for the authentication method shown later). |
REST API Implementation
For convenience and further code error reduction, let’s put the HTTP Header names into an interface as static final variables for the use in the rest of the classes.
Codes for DemoHTTPHeaderNames.java:
package com.developerscrappad.intf;
public interface DemoHTTPHeaderNames {
public static final String SERVICE_KEY = "service_key";
public static final String AUTH_TOKEN = "auth_token";
}
For the implementation of the authentication process and other demo methods, the methods’ signature are defined in DemoBusinessRESTResourceProxy, along with the appropriate HTTP Methods, parameters and the business implementation is defined in DemoBusinessRESTResource.
Codes for DemoBusinessRESTResourceProxy.java:
package com.developerscrappad.intf;
import java.io.Serializable;
import javax.ejb.Local;
import javax.ws.rs.FormParam;
import javax.ws.rs.GET;
import javax.ws.rs.POST;
import javax.ws.rs.Path;
import javax.ws.rs.Produces;
import javax.ws.rs.core.Context;
import javax.ws.rs.core.HttpHeaders;
import javax.ws.rs.core.MediaType;
import javax.ws.rs.core.Response;
@Local
@Path( "demo-business-resource" )
public interface DemoBusinessRESTResourceProxy extends Serializable {
@POST
@Path( "login" )
@Produces( MediaType.APPLICATION_JSON )
public Response login(
@Context HttpHeaders httpHeaders,
@FormParam( "username" ) String username,
@FormParam( "password" ) String password );
@GET
@Path( "demo-get-method" )
@Produces( MediaType.APPLICATION_JSON )
public Response demoGetMethod();
@POST
@Path( "demo-post-method" )
@Produces( MediaType.APPLICATION_JSON )
public Response demoPostMethod();
@POST
@Path( "logout" )
public Response logout(
@Context HttpHeaders httpHeaders
);
}
Codes for DemoBusinessRESTResource.java:
package com.developerscrappad.business;
import com.developerscrappad.intf.DemoBusinessRESTResourceProxy;
import com.developerscrappad.intf.DemoHTTPHeaderNames;
import java.security.GeneralSecurityException;
import javax.ejb.Stateless;
import javax.json.Json;
import javax.json.JsonObject;
import javax.json.JsonObjectBuilder;
import javax.security.auth.login.LoginException;
import javax.ws.rs.FormParam;
import javax.ws.rs.core.CacheControl;
import javax.ws.rs.core.Context;
import javax.ws.rs.core.HttpHeaders;
import javax.ws.rs.core.Response;
@Stateless( name = "DemoBusinessRESTResource", mappedName = "ejb/DemoBusinessRESTResource" )
public class DemoBusinessRESTResource implements DemoBusinessRESTResourceProxy {
private static final long serialVersionUID = -6663599014192066936L;
@Override
public Response login(
@Context HttpHeaders httpHeaders,
@FormParam( "username" ) String username,
@FormParam( "password" ) String password ) {
DemoAuthenticator demoAuthenticator = DemoAuthenticator.getInstance();
String serviceKey = httpHeaders.getHeaderString( DemoHTTPHeaderNames.SERVICE_KEY );
try {
String authToken = demoAuthenticator.login( serviceKey, username, password );
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "auth_token", authToken );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.OK ).entity( jsonObj.toString() ).build();
} catch ( final LoginException ex ) {
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "message", "Problem matching service key, username and password" );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.UNAUTHORIZED ).entity( jsonObj.toString() ).build();
}
}
@Override
public Response demoGetMethod() {
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "message", "Executed demoGetMethod" );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.OK ).entity( jsonObj.toString() ).build();
}
@Override
public Response demoPostMethod() {
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "message", "Executed demoPostMethod" );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.ACCEPTED ).entity( jsonObj.toString() ).build();
}
@Override
public Response logout(
@Context HttpHeaders httpHeaders ) {
try {
DemoAuthenticator demoAuthenticator = DemoAuthenticator.getInstance();
String serviceKey = httpHeaders.getHeaderString( DemoHTTPHeaderNames.SERVICE_KEY );
String authToken = httpHeaders.getHeaderString( DemoHTTPHeaderNames.AUTH_TOKEN );
demoAuthenticator.logout( serviceKey, authToken );
return getNoCacheResponseBuilder( Response.Status.NO_CONTENT ).build();
} catch ( final GeneralSecurityException ex ) {
return getNoCacheResponseBuilder( Response.Status.INTERNAL_SERVER_ERROR ).build();
}
}
private Response.ResponseBuilder getNoCacheResponseBuilder( Response.Status status ) {
CacheControl cc = new CacheControl();
cc.setNoCache( true );
cc.setMaxAge( -1 );
cc.setMustRevalidate( true );
return Response.status( status ).cacheControl( cc );
}
}
The login() method is to authenticate the username, the password and also the right service key. After login(), the authorization token will be generated and returned to the client. The client will have to use it for any other methods invocation later on. The demoGetMethod() and the demoPostMethod() are just dummy methods which returns a JSON message for demo purpose, but with a special condition that a valid authorization token must be present. The logout() method is to log the user out of the REST service; user is identified by the “auth_token“.
The service key and the authorization token will be made available to the REST service methods through:
@Context HttpHeaders httpHeaders
The httpHeaders, an instance of javax.ws.rs.core.HttpHeaders, is an object that contains the header name and values for the use of the application further on. But in order to get the REST service to accept the HTTP Header, something needs to be done first through both the REST request interceptor and the response interceptor.
Authentication With HTTP Headers Through JAX-RS 2.0 Interceptors
Due to certain security limitation, just don’t hope that any HTTP headers could be passed using any REST client and expect the REST service to accept it. It just doesn’t work that way.
In order to make a specific header to be accepted in the REST service, we have to define the acceptance of HTTP Header very specifically in the response filter interceptor.
Codes for DemoRESTResponseFilter.java:
package com.developerscrappad.interceptors;
import com.developerscrappad.intf.DemoHTTPHeaderNames;
import java.io.IOException;
import java.util.logging.Logger;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerResponseContext;
import javax.ws.rs.container.ContainerResponseFilter;
import javax.ws.rs.container.PreMatching;
import javax.ws.rs.ext.Provider;
@Provider
@PreMatching
public class DemoRESTResponseFilter implements ContainerResponseFilter {
private final static Logger log = Logger.getLogger( DemoRESTResponseFilter.class.getName() );
@Override
public void filter( ContainerRequestContext requestCtx, ContainerResponseContext responseCtx ) throws IOException {
log.info( "Filtering REST Response" );
responseCtx.getHeaders().add( "Access-Control-Allow-Origin", "*" ); // You may further limit certain client IPs with Access-Control-Allow-Origin instead of '*'
responseCtx.getHeaders().add( "Access-Control-Allow-Credentials", "true" );
responseCtx.getHeaders().add( "Access-Control-Allow-Methods", "GET, POST, DELETE, PUT" );
responseCtx.getHeaders().add( "Access-Control-Allow-Headers", DemoHTTPHeaderNames.SERVICE_KEY + ", " + DemoHTTPHeaderNames.AUTH_TOKEN );
}
}
DemoRESTResponseFilter is a JAX-RS 2.0 interceptor which implements ContainerResponseFilter. Don’t forget to annotate it with both @Provide and @PreMatching. In order to allow certain specific custom HTTP headers to be accepted, the header name “Access-Control-Allow-Headers” follow by the value of custom headers with “,” as the separator must be added as part of the custom headers value. This is the way to inform the browser or REST client of the custom headers allowed. The rest of the headers are for CORS, which you can read more in one of our articles Java EE 7 / JAX-RS 2.0 – CORS on REST (How to make REST APIs accessible from a different domain)
Next, to validate and verify the service key and authorization token, we need to extract it out from the HTTP Headers and pre-process it with the request filter interceptor.
Codes for DemoRESTRequestFilter:
package com.developerscrappad.interceptors;
import com.developerscrappad.business.DemoAuthenticator;
import com.developerscrappad.intf.DemoHTTPHeaderNames;
import java.io.IOException;
import java.util.logging.Logger;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerRequestFilter;
import javax.ws.rs.container.PreMatching;
import javax.ws.rs.core.Response;
import javax.ws.rs.ext.Provider;
@Provider
@PreMatching
public class DemoRESTRequestFilter implements ContainerRequestFilter {
private final static Logger log = Logger.getLogger( DemoRESTRequestFilter.class.getName() );
@Override
public void filter( ContainerRequestContext requestCtx ) throws IOException {
String path = requestCtx.getUriInfo().getPath();
log.info( "Filtering request path: " + path );
// IMPORTANT!!! First, Acknowledge any pre-flight test from browsers for this case before validating the headers (CORS stuff)
if ( requestCtx.getRequest().getMethod().equals( "OPTIONS" ) ) {
requestCtx.abortWith( Response.status( Response.Status.OK ).build() );
return;
}
// Then check is the service key exists and is valid.
DemoAuthenticator demoAuthenticator = DemoAuthenticator.getInstance();
String serviceKey = requestCtx.getHeaderString( DemoHTTPHeaderNames.SERVICE_KEY );
if ( !demoAuthenticator.isServiceKeyValid( serviceKey ) ) {
// Kick anyone without a valid service key
requestCtx.abortWith( Response.status( Response.Status.UNAUTHORIZED ).build() );
return;
}
// For any pther methods besides login, the authToken must be verified
if ( !path.startsWith( "/demo-business-resource/login/" ) ) {
String authToken = requestCtx.getHeaderString( DemoHTTPHeaderNames.AUTH_TOKEN );
// if it isn't valid, just kick them out.
if ( !demoAuthenticator.isAuthTokenValid( serviceKey, authToken ) ) {
requestCtx.abortWith( Response.status( Response.Status.UNAUTHORIZED ).build() );
}
}
}
}
To get the header value, we invoke the getHeaderString() method of the object instance of ContainerRequestContext, for example:
String serviceKey = requestCtx.getHeaderString( "service_key" );
The rest of the codes in DemoRESTRequestFilter is pretty straight forward on validating and verifying the service key and the authorization token.
REST Service Deployment
Don’t forget to have the web.xml for the enablement of REST service define.
Codes for web.xml:
<?xml version="1.0" encoding="UTF-8"?>
<web-app xmlns="http://xmlns.jcp.org/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee http://xmlns.jcp.org/xml/ns/javaee/web-app_3_1.xsd"
version="3.1">
<!-- Common JAX-RS Servlet Definition -->
<servlet>
<servlet-name>javax.ws.rs.core.Application</servlet-name>
<load-on-startup>1</load-on-startup>
</servlet>
<servlet-mapping>
<servlet-name>javax.ws.rs.core.Application</servlet-name>
<url-pattern>/rest-api/*</url-pattern>
</servlet-mapping>
</web-app>
For this demo, I have packaged the compiled codes into a war file naming it RESTSecurityWithHTTPHeaderDemo.war. I have chosen to deploy on Glassfish 4.0 on the domain developerscrappad.com (the domain of this blog). If you are going through everything in this tutorial, you may choose a different domain of your own. The REST API URLs will be in the format of:
http://<domain>:<port>/RESTSecurityWithHTTPHeaderDemo/rest-api/path/method-path/
. Anyway, the summary of the URLs for the test client which I’m using are:
Method | REST URL | HTTP Method |
DemoBusinessRESTResourceProxy.login() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/login/ | POST |
DemoBusinessRESTResourceProxy.demoGetMethod() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-get-method/ | GET |
DemoBusinessRESTResourceProxy.demoPostMethod() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-post-method/ | POST |
DemoBusinessRESTResourceProxy.logout() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/logout/ | POST |
THE REST Client
Putting it altogether, here’s a REST client which I’ve wrote to test the REST APIs. The REST Client is just a HTML file (specifically HTML5, which supports web storage) that leverages jQuery for REST API calls. What the REST Client does is as follow:
- First, the REST Client will make a REST API call without service key and authorization token. The call will be rejected with HTTP Status 401 (Unauthorized)
- Next, it will perform a login with the specific service key (hard coded for now in the Authenticator.java) for “username2″. Once the authorisation token had been received, it will be stored in the sessionStorage for further use.
- Then, it will call the dummy get and post methods.
- After that, it will pereform a logout
- Once the user is logged-out, the client will then perform a call to to the dummy get and post method, but the access will be denied with HTTP Status 401 due to the expiration of the authorization token.
Codes for rest-auth-test.html:
<html>
<head>
<title>REST Authentication Tester</title>
<meta charset="UTF-8">
</head>
<body>
<div id="logMsgDiv"></div>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script type="text/javascript">
var $ = jQuery.noConflict();
// Disable async
$.ajaxSetup( { async: false } );
// Using Service Key 3b91cab8-926f-49b6-ba00-920bcf934c2a and username2
// This is what happens when there you call the REST APIs without a service key and authorisation token
$.ajax( {
cache: false,
crossDomain: true,
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-post-method/",
type: "POST",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p style='color: red;'>If this is portion is executed, something must be wrong</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
var htmlContent = $( "#logMsgDiv" ).html( )
+ "<p style='color: red;'>This is what happens when there you call the REST APIs without a service key and authorisation token."
+ "<br />HTTP Status: " + xhr.status + ", Unauthorized access to demo-post-method</p>";
$( "#logMsgDiv" ).html( htmlContent );
}
} );
// Performing login with username2 and passwordForUser2
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a"
},
dataType: "json",
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/login/",
type: "POST",
data: {
"username": "username2",
"password": "passwordForUser2"
},
success: function( jsonObj, textStatus, xhr ) {
sessionStorage.auth_token = jsonObj.auth_token;
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>Perform Login. Gotten auth-token as: " + sessionStorage.auth_token + "</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// After login, execute demoteGetMethod with the auth-token obtained
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
dataType: "json",
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-get-method/",
type: "GET",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>After login, execute demoteGetMethod with the auth-token obtained. JSON Message: " + jsonObj.message + "</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// Execute demoPostMethod with the auth-token obtained
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
dataType: "json",
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-post-method/",
type: "POST",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>Execute demoPostMethod with the auth-token obtained. JSON message: " + jsonObj.message + "</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// Let's logout after all the above. No content expected
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/logout/",
type: "POST",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>Let's logout after all the above. No content expected.</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// This is what happens when someone reuses the authorisation token after a user had been logged out
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-get-method/",
type: "GET",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p style='color: red;'>If this is portion is executed, something must be wrong</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
var htmlContent = $( "#logMsgDiv" ).html( )
+ "<p style='color: red;'>This is what happens when someone reuses the authorisation token after a user had been logged out"
+ "<br />HTTP Status: " + xhr.status + ", Unauthorized access to demo-get-method</p>";
$( "#logMsgDiv" ).html( htmlContent );
}
} );
</script>
</body>
</html>
The Result
The rest-auth-test.html need not be packaged with the war file, this is to separate invoking client script from the server-side app to simulate a cross-origin request. To run the rest-auth-test.html, all you need to do is to execute it from a web browser. For me, I have done this through Firefox with the Firebug plugin, and the below is the result:

Result of rest-auth-test.html
It worked pretty well. The first and the last request will be rejected as 401 (Unauthorized) HTTP Status because it was executed before authentication and after logout (invalid auth_token).
Final Words
When it comes to dealing with custom HTTP Headers in a JAX-RS 2.0 application, just remember to have the the custom HTTP Header names to be included as part of “Access-Control-Allow-Headers” in the response filter, e.g.
Access-Control-Allow-Headers: custom_header_name1, custom_header_name2
After that, getting the HTTP Headers could be done easily in the REST Web Service methods with the help of javax.ws.rs.core.HttpHeaders through the REST context. Don’t forget the restriction and impact for CORS, which should be taken care in both REST Request and Response interceptors.
Thank you for reading and hope this article helps.
reference from: http://www.developerscrappad.com/1814/java/java-ee/rest-jax-rs/java-ee-7-jax-rs-2-0-simple-rest-api-authentication-authorization-with-custom-http-header/#sthash.AIH5zIyN.dpuf
Java EE 7 / JAX-RS 2.0: Simple REST API Authentication & Authorization with Custom HTTP Header--reference的更多相关文章
- java ee@ Myeclipse 2015 stable 1.0 完美破解方法
Myeclipse 2015 stable 1.0 完美破解方法 破解步骤: 使用以前的注册机算号,版本选择Blue即可,后续可解锁Spring高级功能,即Bling的所有功能全部具备 1.1 进入m ...
- 使用SIP Servlet为Java EE添加语音功能
会话发起协议(Session Initiation Protocol,SIP)是一种信号传输协议,用于建立.修改和终止两个端点之间的会话.SIP 可用于建立 两方呼叫.多方呼叫,或者甚至 Intern ...
- Java EE—最轻量级的企业框架?
确保高效发展进程的建议 很久以前,J2EE,特别是应用程序服务器被认为过于臃肿和"重量级".对于开发人员来说,使用此技术开发应用程序会非常繁琐且令人沮丧.但是,由于 J2EE 框架 ...
- Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 Web modules
在eclipse里面配置tomcat时候遇到的问题: Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 Web mo ...
- (转)Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 and 6 Web mod
背景:在sts中导入web项目,却不能通过sts中的tomcat来加载该服务,并报出如下错误. “Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4 ...
- Eclipse导入web项目发布项目时报Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 and 6 Web错误解决方案
Eclipse导入web项目后,将web项目加载到server进行发布时,提示Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4, and Java ...
- eclise配置tomcat出现服务Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4 and Java EE 5 Web modules
当部署项目Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4, 1.5 and Java EE 5 Web modules错;解决方案,如下面: 空 ...
- eclipse中Tomcat version 9.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5, 6, 7, and 8 Web modules
eclipse中导入了一个别人的项目,运行时提示没有可以使用的服务器,如下: 查看了下项目属性设置中的服务器,还是提示没有可用服务器: 尝试对部署在已有服务器下的项目Add and Remove... ...
- Spring Boot 2.0 学习笔记(一)——JAVA EE简介
本章内容:JAVA EE>Spring>Spring Boot 一.JAVA EE简介 1.1 Java ee优点:结束了Web开发的技术无序状态,让程序员.架构师用同一种思维去思考如何架 ...
随机推荐
- form WebBrowser自动点击弹出提示框alert、弹出对话框confirm、屏蔽弹出框、屏蔽弹出脚本错误的解决办法
针对WebBrowser控件中自动点击弹出框及禁用脚本提示问题得到如下几种实际情况的解决办法,绝对管用. 1.屏蔽弹出错误脚本 将WebBrowser控件ScriptErrorsSuppressed设 ...
- 前端,移动开发者,UI须懂: 不同设备的之间的尺寸
在开发前端,移动APP,以及设计UI的时候,我们经常会去搜索不同设备之间的尺寸,来开始自己的工作,以保证显示效果达到更好,这里收集了现在常用的设备. 设备更新速度快,有些没罗列的,大家可以谷歌或者百度 ...
- ie8 background css没有显示?——都是空格惹的祸
ie8 background css没有显示?——都是空格惹的祸
- MySql数据库4【命令行赋权操作】
MySQL 赋予用户权限命令的简单格式可概括为:grant 权限 on 数据库对象 to 用户 一.grant 普通数据用户,查询.插入.更新.删除 数据库中所有表数据的权利. grant selec ...
- C#执行oracle返回游标类型的存储过程
存储过程代码为: create or replace procedure proc_test(pCursor OUT pak_pub.ut_cursor) AS begin -- 使用游标 open ...
- Node.js快速入门
Node.js是什么? Node.js是建立在谷歌Chrome的JavaScript引擎(V8引擎)的Web应用程序框架. 它的最新版本是:v0.12.7(在编写本教程时的版本).Node.js在官方 ...
- java中的string字符串中的trim函数的作用
去掉字符串首尾空格 防止不必要的空格导致错误public class test{ public static void main(String[] args) { String str = " ...
- 通用GPIO模拟串口,提供源代码,本人经过测试OK(第一版)
--------------------------serial.h------------------------------------------ #ifndef _SERIAL_H_ #def ...
- qt实现头像上传功能(朝十晚八的博客,一堆帖子)
http://www.cnblogs.com/swarmbees/p/5688885.html
- ArrayList的toArray
ArrayList提供了一个将List转为数组的一个非常方便的方法toArray.toArray有两个重载的方法: 1.list.toArray(); 2.list.toArray(T[] a); ...