Java EE 7 / JAX-RS 2.0: Simple REST API Authentication & Authorization with Custom HTTP Header--reference
REST has made a lot of conveniences when it comes to implementing web services with the already available HTTP protocol at its disposal. By just firing GET, POST and other HTTP methods through the designated URL, you’ll sure to get something done through a response out of a REST service. But whatever conveniences which REST has given to the developers, the subject of security and access control should always be addressed. This article will show you how to implement simple user based authentication with the use of HTTP Headers and JAX-RS 2.0 interceptors.
Authenticator
Let’s begin with an authenticator class. This DemoAuthenticator with the codes below provides the necessary methods for authenticating any users which is request access to the REST web service. Please read through the codes and the comments are there to guide the understanding.
Codes for DemoAuthenticator:
package com.developerscrappad.business;
import java.util.HashMap;
import java.util.Map;
import java.util.UUID;
import java.security.GeneralSecurityException;
import javax.security.auth.login.LoginException;
public final class DemoAuthenticator {
private static DemoAuthenticator authenticator = null;
// A user storage which stores <username, password>
private final Map<String, String> usersStorage = new HashMap();
// A service key storage which stores <service_key, username>
private final Map<String, String> serviceKeysStorage = new HashMap();
// An authentication token storage which stores <service_key, auth_token>.
private final Map<String, String> authorizationTokensStorage = new HashMap();
private DemoAuthenticator() {
// The usersStorage pretty much represents a user table in the database
usersStorage.put( "username1", "passwordForUser1" );
usersStorage.put( "username2", "passwordForUser2" );
usersStorage.put( "username3", "passwordForUser3" );
/**
* Service keys are pre-generated by the system and is given to the
* authorized client who wants to have access to the REST API. Here,
* only username1 and username2 is given the REST service access with
* their respective service keys.
*/
serviceKeysStorage.put( "f80ebc87-ad5c-4b29-9366-5359768df5a1", "username1" );
serviceKeysStorage.put( "3b91cab8-926f-49b6-ba00-920bcf934c2a", "username2" );
}
public static DemoAuthenticator getInstance() {
if ( authenticator == null ) {
authenticator = new DemoAuthenticator();
}
return authenticator;
}
public String login( String serviceKey, String username, String password ) throws LoginException {
if ( serviceKeysStorage.containsKey( serviceKey ) ) {
String usernameMatch = serviceKeysStorage.get( serviceKey );
if ( usernameMatch.equals( username ) && usersStorage.containsKey( username ) ) {
String passwordMatch = usersStorage.get( username );
if ( passwordMatch.equals( password ) ) {
/**
* Once all params are matched, the authToken will be
* generated and will be stored in the
* authorizationTokensStorage. The authToken will be needed
* for every REST API invocation and is only valid within
* the login session
*/
String authToken = UUID.randomUUID().toString();
authorizationTokensStorage.put( authToken, username );
return authToken;
}
}
}
throw new LoginException( "Don't Come Here Again!" );
}
/**
* The method that pre-validates if the client which invokes the REST API is
* from a authorized and authenticated source.
*
* @param serviceKey The service key
* @param authToken The authorization token generated after login
* @return TRUE for acceptance and FALSE for denied.
*/
public boolean isAuthTokenValid( String serviceKey, String authToken ) {
if ( isServiceKeyValid( serviceKey ) ) {
String usernameMatch1 = serviceKeysStorage.get( serviceKey );
if ( authorizationTokensStorage.containsKey( authToken ) ) {
String usernameMatch2 = authorizationTokensStorage.get( authToken );
if ( usernameMatch1.equals( usernameMatch2 ) ) {
return true;
}
}
}
return false;
}
/**
* This method checks is the service key is valid
*
* @param serviceKey
* @return TRUE if service key matches the pre-generated ones in service key
* storage. FALSE for otherwise.
*/
public boolean isServiceKeyValid( String serviceKey ) {
return serviceKeysStorage.containsKey( serviceKey );
}
public void logout( String serviceKey, String authToken ) throws GeneralSecurityException {
if ( serviceKeysStorage.containsKey( serviceKey ) ) {
String usernameMatch1 = serviceKeysStorage.get( serviceKey );
if ( authorizationTokensStorage.containsKey( authToken ) ) {
String usernameMatch2 = authorizationTokensStorage.get( authToken );
if ( usernameMatch1.equals( usernameMatch2 ) ) {
/**
* When a client logs out, the authentication token will be
* remove and will be made invalid.
*/
authorizationTokensStorage.remove( authToken );
return;
}
}
}
throw new GeneralSecurityException( "Invalid service key and authorization token match." );
}
}
General Code Explanation:
Generally, there are only a few important items that makes up the authenticator and that that is: service key, authorization token, username and password. The username and password will commonly go in pairs.
Service Key
The service key may be new to some readers; in some public REST API service, a service key and sometimes known as API key, is generated by the system and then sends to the user/client (either through email or other means) that is permitted to access the REST service. So besides login into the REST service with just mere username and password, the system will also check on the service key if the user/client is permitted to access the REST APIs. The usernames, passwords and service keys are all predefined in the codes above for now only demo purpose.
Authorization Token
Upon authentication (through the login() method), the system will then generate an authorization token for the authenticated user. This token is passed back to the user/client through HTTP response and is to be used for any REST API invocation later. The user/client will have to find a way to store and use it throughout the login session. We’ll look at that later.
Required HTTP Headers Name Definition
Moving forward, instead of having the service key and authorization token to be passed to the server-side app as HTTP parameters (Form or Query), we’ll have it pass as HTTP Headers. This is to allow the request to be first filtered before being processed by the targeted REST method. The names for the HTTP Headers are below:
| HTTP Header Name | Description |
|---|---|
| service_key | The service key that enables a HTTP client to access the REST Web Services. This is the first layer of authenticating and authorizing the HTTP Request. |
| auth_token | The token generated upon username/password authentication, which is to be used for any REST Web Service calls (except for the authentication method shown later). |
REST API Implementation
For convenience and further code error reduction, let’s put the HTTP Header names into an interface as static final variables for the use in the rest of the classes.
Codes for DemoHTTPHeaderNames.java:
package com.developerscrappad.intf;
public interface DemoHTTPHeaderNames {
public static final String SERVICE_KEY = "service_key";
public static final String AUTH_TOKEN = "auth_token";
}
For the implementation of the authentication process and other demo methods, the methods’ signature are defined in DemoBusinessRESTResourceProxy, along with the appropriate HTTP Methods, parameters and the business implementation is defined in DemoBusinessRESTResource.
Codes for DemoBusinessRESTResourceProxy.java:
package com.developerscrappad.intf;
import java.io.Serializable;
import javax.ejb.Local;
import javax.ws.rs.FormParam;
import javax.ws.rs.GET;
import javax.ws.rs.POST;
import javax.ws.rs.Path;
import javax.ws.rs.Produces;
import javax.ws.rs.core.Context;
import javax.ws.rs.core.HttpHeaders;
import javax.ws.rs.core.MediaType;
import javax.ws.rs.core.Response;
@Local
@Path( "demo-business-resource" )
public interface DemoBusinessRESTResourceProxy extends Serializable {
@POST
@Path( "login" )
@Produces( MediaType.APPLICATION_JSON )
public Response login(
@Context HttpHeaders httpHeaders,
@FormParam( "username" ) String username,
@FormParam( "password" ) String password );
@GET
@Path( "demo-get-method" )
@Produces( MediaType.APPLICATION_JSON )
public Response demoGetMethod();
@POST
@Path( "demo-post-method" )
@Produces( MediaType.APPLICATION_JSON )
public Response demoPostMethod();
@POST
@Path( "logout" )
public Response logout(
@Context HttpHeaders httpHeaders
);
}
Codes for DemoBusinessRESTResource.java:
package com.developerscrappad.business;
import com.developerscrappad.intf.DemoBusinessRESTResourceProxy;
import com.developerscrappad.intf.DemoHTTPHeaderNames;
import java.security.GeneralSecurityException;
import javax.ejb.Stateless;
import javax.json.Json;
import javax.json.JsonObject;
import javax.json.JsonObjectBuilder;
import javax.security.auth.login.LoginException;
import javax.ws.rs.FormParam;
import javax.ws.rs.core.CacheControl;
import javax.ws.rs.core.Context;
import javax.ws.rs.core.HttpHeaders;
import javax.ws.rs.core.Response;
@Stateless( name = "DemoBusinessRESTResource", mappedName = "ejb/DemoBusinessRESTResource" )
public class DemoBusinessRESTResource implements DemoBusinessRESTResourceProxy {
private static final long serialVersionUID = -6663599014192066936L;
@Override
public Response login(
@Context HttpHeaders httpHeaders,
@FormParam( "username" ) String username,
@FormParam( "password" ) String password ) {
DemoAuthenticator demoAuthenticator = DemoAuthenticator.getInstance();
String serviceKey = httpHeaders.getHeaderString( DemoHTTPHeaderNames.SERVICE_KEY );
try {
String authToken = demoAuthenticator.login( serviceKey, username, password );
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "auth_token", authToken );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.OK ).entity( jsonObj.toString() ).build();
} catch ( final LoginException ex ) {
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "message", "Problem matching service key, username and password" );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.UNAUTHORIZED ).entity( jsonObj.toString() ).build();
}
}
@Override
public Response demoGetMethod() {
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "message", "Executed demoGetMethod" );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.OK ).entity( jsonObj.toString() ).build();
}
@Override
public Response demoPostMethod() {
JsonObjectBuilder jsonObjBuilder = Json.createObjectBuilder();
jsonObjBuilder.add( "message", "Executed demoPostMethod" );
JsonObject jsonObj = jsonObjBuilder.build();
return getNoCacheResponseBuilder( Response.Status.ACCEPTED ).entity( jsonObj.toString() ).build();
}
@Override
public Response logout(
@Context HttpHeaders httpHeaders ) {
try {
DemoAuthenticator demoAuthenticator = DemoAuthenticator.getInstance();
String serviceKey = httpHeaders.getHeaderString( DemoHTTPHeaderNames.SERVICE_KEY );
String authToken = httpHeaders.getHeaderString( DemoHTTPHeaderNames.AUTH_TOKEN );
demoAuthenticator.logout( serviceKey, authToken );
return getNoCacheResponseBuilder( Response.Status.NO_CONTENT ).build();
} catch ( final GeneralSecurityException ex ) {
return getNoCacheResponseBuilder( Response.Status.INTERNAL_SERVER_ERROR ).build();
}
}
private Response.ResponseBuilder getNoCacheResponseBuilder( Response.Status status ) {
CacheControl cc = new CacheControl();
cc.setNoCache( true );
cc.setMaxAge( -1 );
cc.setMustRevalidate( true );
return Response.status( status ).cacheControl( cc );
}
}
The login() method is to authenticate the username, the password and also the right service key. After login(), the authorization token will be generated and returned to the client. The client will have to use it for any other methods invocation later on. The demoGetMethod() and the demoPostMethod() are just dummy methods which returns a JSON message for demo purpose, but with a special condition that a valid authorization token must be present. The logout() method is to log the user out of the REST service; user is identified by the “auth_token“.
The service key and the authorization token will be made available to the REST service methods through:
@Context HttpHeaders httpHeaders
The httpHeaders, an instance of javax.ws.rs.core.HttpHeaders, is an object that contains the header name and values for the use of the application further on. But in order to get the REST service to accept the HTTP Header, something needs to be done first through both the REST request interceptor and the response interceptor.
Authentication With HTTP Headers Through JAX-RS 2.0 Interceptors
Due to certain security limitation, just don’t hope that any HTTP headers could be passed using any REST client and expect the REST service to accept it. It just doesn’t work that way.
In order to make a specific header to be accepted in the REST service, we have to define the acceptance of HTTP Header very specifically in the response filter interceptor.
Codes for DemoRESTResponseFilter.java:
package com.developerscrappad.interceptors;
import com.developerscrappad.intf.DemoHTTPHeaderNames;
import java.io.IOException;
import java.util.logging.Logger;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerResponseContext;
import javax.ws.rs.container.ContainerResponseFilter;
import javax.ws.rs.container.PreMatching;
import javax.ws.rs.ext.Provider;
@Provider
@PreMatching
public class DemoRESTResponseFilter implements ContainerResponseFilter {
private final static Logger log = Logger.getLogger( DemoRESTResponseFilter.class.getName() );
@Override
public void filter( ContainerRequestContext requestCtx, ContainerResponseContext responseCtx ) throws IOException {
log.info( "Filtering REST Response" );
responseCtx.getHeaders().add( "Access-Control-Allow-Origin", "*" ); // You may further limit certain client IPs with Access-Control-Allow-Origin instead of '*'
responseCtx.getHeaders().add( "Access-Control-Allow-Credentials", "true" );
responseCtx.getHeaders().add( "Access-Control-Allow-Methods", "GET, POST, DELETE, PUT" );
responseCtx.getHeaders().add( "Access-Control-Allow-Headers", DemoHTTPHeaderNames.SERVICE_KEY + ", " + DemoHTTPHeaderNames.AUTH_TOKEN );
}
}
DemoRESTResponseFilter is a JAX-RS 2.0 interceptor which implements ContainerResponseFilter. Don’t forget to annotate it with both @Provide and @PreMatching. In order to allow certain specific custom HTTP headers to be accepted, the header name “Access-Control-Allow-Headers” follow by the value of custom headers with “,” as the separator must be added as part of the custom headers value. This is the way to inform the browser or REST client of the custom headers allowed. The rest of the headers are for CORS, which you can read more in one of our articles Java EE 7 / JAX-RS 2.0 – CORS on REST (How to make REST APIs accessible from a different domain)
Next, to validate and verify the service key and authorization token, we need to extract it out from the HTTP Headers and pre-process it with the request filter interceptor.
Codes for DemoRESTRequestFilter:
package com.developerscrappad.interceptors;
import com.developerscrappad.business.DemoAuthenticator;
import com.developerscrappad.intf.DemoHTTPHeaderNames;
import java.io.IOException;
import java.util.logging.Logger;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerRequestFilter;
import javax.ws.rs.container.PreMatching;
import javax.ws.rs.core.Response;
import javax.ws.rs.ext.Provider;
@Provider
@PreMatching
public class DemoRESTRequestFilter implements ContainerRequestFilter {
private final static Logger log = Logger.getLogger( DemoRESTRequestFilter.class.getName() );
@Override
public void filter( ContainerRequestContext requestCtx ) throws IOException {
String path = requestCtx.getUriInfo().getPath();
log.info( "Filtering request path: " + path );
// IMPORTANT!!! First, Acknowledge any pre-flight test from browsers for this case before validating the headers (CORS stuff)
if ( requestCtx.getRequest().getMethod().equals( "OPTIONS" ) ) {
requestCtx.abortWith( Response.status( Response.Status.OK ).build() );
return;
}
// Then check is the service key exists and is valid.
DemoAuthenticator demoAuthenticator = DemoAuthenticator.getInstance();
String serviceKey = requestCtx.getHeaderString( DemoHTTPHeaderNames.SERVICE_KEY );
if ( !demoAuthenticator.isServiceKeyValid( serviceKey ) ) {
// Kick anyone without a valid service key
requestCtx.abortWith( Response.status( Response.Status.UNAUTHORIZED ).build() );
return;
}
// For any pther methods besides login, the authToken must be verified
if ( !path.startsWith( "/demo-business-resource/login/" ) ) {
String authToken = requestCtx.getHeaderString( DemoHTTPHeaderNames.AUTH_TOKEN );
// if it isn't valid, just kick them out.
if ( !demoAuthenticator.isAuthTokenValid( serviceKey, authToken ) ) {
requestCtx.abortWith( Response.status( Response.Status.UNAUTHORIZED ).build() );
}
}
}
}
To get the header value, we invoke the getHeaderString() method of the object instance of ContainerRequestContext, for example:
String serviceKey = requestCtx.getHeaderString( "service_key" );
The rest of the codes in DemoRESTRequestFilter is pretty straight forward on validating and verifying the service key and the authorization token.
REST Service Deployment
Don’t forget to have the web.xml for the enablement of REST service define.
Codes for web.xml:
<?xml version="1.0" encoding="UTF-8"?>
<web-app xmlns="http://xmlns.jcp.org/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee http://xmlns.jcp.org/xml/ns/javaee/web-app_3_1.xsd"
version="3.1">
<!-- Common JAX-RS Servlet Definition -->
<servlet>
<servlet-name>javax.ws.rs.core.Application</servlet-name>
<load-on-startup>1</load-on-startup>
</servlet>
<servlet-mapping>
<servlet-name>javax.ws.rs.core.Application</servlet-name>
<url-pattern>/rest-api/*</url-pattern>
</servlet-mapping>
</web-app>
For this demo, I have packaged the compiled codes into a war file naming it RESTSecurityWithHTTPHeaderDemo.war. I have chosen to deploy on Glassfish 4.0 on the domain developerscrappad.com (the domain of this blog). If you are going through everything in this tutorial, you may choose a different domain of your own. The REST API URLs will be in the format of:
http://<domain>:<port>/RESTSecurityWithHTTPHeaderDemo/rest-api/path/method-path/
. Anyway, the summary of the URLs for the test client which I’m using are:
| Method | REST URL | HTTP Method |
| DemoBusinessRESTResourceProxy.login() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/login/ | POST |
| DemoBusinessRESTResourceProxy.demoGetMethod() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-get-method/ | GET |
| DemoBusinessRESTResourceProxy.demoPostMethod() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-post-method/ | POST |
| DemoBusinessRESTResourceProxy.logout() | http://developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/logout/ | POST |
THE REST Client
Putting it altogether, here’s a REST client which I’ve wrote to test the REST APIs. The REST Client is just a HTML file (specifically HTML5, which supports web storage) that leverages jQuery for REST API calls. What the REST Client does is as follow:
- First, the REST Client will make a REST API call without service key and authorization token. The call will be rejected with HTTP Status 401 (Unauthorized)
- Next, it will perform a login with the specific service key (hard coded for now in the Authenticator.java) for “username2″. Once the authorisation token had been received, it will be stored in the sessionStorage for further use.
- Then, it will call the dummy get and post methods.
- After that, it will pereform a logout
- Once the user is logged-out, the client will then perform a call to to the dummy get and post method, but the access will be denied with HTTP Status 401 due to the expiration of the authorization token.
Codes for rest-auth-test.html:
<html>
<head>
<title>REST Authentication Tester</title>
<meta charset="UTF-8">
</head>
<body>
<div id="logMsgDiv"></div>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script type="text/javascript">
var $ = jQuery.noConflict();
// Disable async
$.ajaxSetup( { async: false } );
// Using Service Key 3b91cab8-926f-49b6-ba00-920bcf934c2a and username2
// This is what happens when there you call the REST APIs without a service key and authorisation token
$.ajax( {
cache: false,
crossDomain: true,
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-post-method/",
type: "POST",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p style='color: red;'>If this is portion is executed, something must be wrong</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
var htmlContent = $( "#logMsgDiv" ).html( )
+ "<p style='color: red;'>This is what happens when there you call the REST APIs without a service key and authorisation token."
+ "<br />HTTP Status: " + xhr.status + ", Unauthorized access to demo-post-method</p>";
$( "#logMsgDiv" ).html( htmlContent );
}
} );
// Performing login with username2 and passwordForUser2
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a"
},
dataType: "json",
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/login/",
type: "POST",
data: {
"username": "username2",
"password": "passwordForUser2"
},
success: function( jsonObj, textStatus, xhr ) {
sessionStorage.auth_token = jsonObj.auth_token;
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>Perform Login. Gotten auth-token as: " + sessionStorage.auth_token + "</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// After login, execute demoteGetMethod with the auth-token obtained
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
dataType: "json",
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-get-method/",
type: "GET",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>After login, execute demoteGetMethod with the auth-token obtained. JSON Message: " + jsonObj.message + "</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// Execute demoPostMethod with the auth-token obtained
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
dataType: "json",
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-post-method/",
type: "POST",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>Execute demoPostMethod with the auth-token obtained. JSON message: " + jsonObj.message + "</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// Let's logout after all the above. No content expected
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/logout/",
type: "POST",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p>Let's logout after all the above. No content expected.</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
console.log( "HTTP Status: " + xhr.status );
console.log( "Error textStatus: " + textStatus );
console.log( "Error thrown: " + errorThrown );
}
} );
// This is what happens when someone reuses the authorisation token after a user had been logged out
$.ajax( {
cache: false,
crossDomain: true,
headers: {
"service_key": "3b91cab8-926f-49b6-ba00-920bcf934c2a",
"auth_token": sessionStorage.auth_token
},
url: "http://www.developerscrappad.com:8080/RESTSecurityWithHTTPHeaderDemo/rest-api/demo-business-resource/demo-get-method/",
type: "GET",
success: function( jsonObj, textStatus, xhr ) {
var htmlContent = $( "#logMsgDiv" ).html( ) + "<p style='color: red;'>If this is portion is executed, something must be wrong</p>";
$( "#logMsgDiv" ).html( htmlContent );
},
error: function( xhr, textStatus, errorThrown ) {
var htmlContent = $( "#logMsgDiv" ).html( )
+ "<p style='color: red;'>This is what happens when someone reuses the authorisation token after a user had been logged out"
+ "<br />HTTP Status: " + xhr.status + ", Unauthorized access to demo-get-method</p>";
$( "#logMsgDiv" ).html( htmlContent );
}
} );
</script>
</body>
</html>
The Result
The rest-auth-test.html need not be packaged with the war file, this is to separate invoking client script from the server-side app to simulate a cross-origin request. To run the rest-auth-test.html, all you need to do is to execute it from a web browser. For me, I have done this through Firefox with the Firebug plugin, and the below is the result:
Result of rest-auth-test.html
It worked pretty well. The first and the last request will be rejected as 401 (Unauthorized) HTTP Status because it was executed before authentication and after logout (invalid auth_token).
Final Words
When it comes to dealing with custom HTTP Headers in a JAX-RS 2.0 application, just remember to have the the custom HTTP Header names to be included as part of “Access-Control-Allow-Headers” in the response filter, e.g.
Access-Control-Allow-Headers: custom_header_name1, custom_header_name2
After that, getting the HTTP Headers could be done easily in the REST Web Service methods with the help of javax.ws.rs.core.HttpHeaders through the REST context. Don’t forget the restriction and impact for CORS, which should be taken care in both REST Request and Response interceptors.
Thank you for reading and hope this article helps.
reference from: http://www.developerscrappad.com/1814/java/java-ee/rest-jax-rs/java-ee-7-jax-rs-2-0-simple-rest-api-authentication-authorization-with-custom-http-header/#sthash.AIH5zIyN.dpuf
Java EE 7 / JAX-RS 2.0: Simple REST API Authentication & Authorization with Custom HTTP Header--reference的更多相关文章
- java ee@ Myeclipse 2015 stable 1.0 完美破解方法
Myeclipse 2015 stable 1.0 完美破解方法 破解步骤: 使用以前的注册机算号,版本选择Blue即可,后续可解锁Spring高级功能,即Bling的所有功能全部具备 1.1 进入m ...
- 使用SIP Servlet为Java EE添加语音功能
会话发起协议(Session Initiation Protocol,SIP)是一种信号传输协议,用于建立.修改和终止两个端点之间的会话.SIP 可用于建立 两方呼叫.多方呼叫,或者甚至 Intern ...
- Java EE—最轻量级的企业框架?
确保高效发展进程的建议 很久以前,J2EE,特别是应用程序服务器被认为过于臃肿和"重量级".对于开发人员来说,使用此技术开发应用程序会非常繁琐且令人沮丧.但是,由于 J2EE 框架 ...
- Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 Web modules
在eclipse里面配置tomcat时候遇到的问题: Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 Web mo ...
- (转)Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 and 6 Web mod
背景:在sts中导入web项目,却不能通过sts中的tomcat来加载该服务,并报出如下错误. “Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4 ...
- Eclipse导入web项目发布项目时报Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5 and 6 Web错误解决方案
Eclipse导入web项目后,将web项目加载到server进行发布时,提示Tomcat version 7.0 only supports J2EE 1.2, 1.3, 1.4, and Java ...
- eclise配置tomcat出现服务Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4 and Java EE 5 Web modules
当部署项目Tomcat version 6.0 only supports J2EE 1.2, 1.3, 1.4, 1.5 and Java EE 5 Web modules错;解决方案,如下面: 空 ...
- eclipse中Tomcat version 9.0 only supports J2EE 1.2, 1.3, 1.4, and Java EE 5, 6, 7, and 8 Web modules
eclipse中导入了一个别人的项目,运行时提示没有可以使用的服务器,如下: 查看了下项目属性设置中的服务器,还是提示没有可用服务器: 尝试对部署在已有服务器下的项目Add and Remove... ...
- Spring Boot 2.0 学习笔记(一)——JAVA EE简介
本章内容:JAVA EE>Spring>Spring Boot 一.JAVA EE简介 1.1 Java ee优点:结束了Web开发的技术无序状态,让程序员.架构师用同一种思维去思考如何架 ...
随机推荐
- Eclipse启动Tomcat报错,系统缺少本地apr库
Eclipse启动Tomcat报错,系统缺少本地apr库. Tomcat中service.xml中的设置情况. 默认情况是HTTP协议的值:protocol="HTTP/1.1" ...
- PHP随机生成指定时间段的指定个数时间
/** * 生成某个范围内的随机时间 * @param <type> $begintime 起始时间 格式为 Y-m-d H:i:s * @param <type> $endt ...
- +=与join的性能测试
<!DOCTYPE html><html lang="en"><head> <meta charset="UTF-8&qu ...
- c++:参数型别的推导
STL源码剖析--侯捷 总结 尽管现在的很多语言支持参数类型的判别,但是c/c++并不支持这一特性. 但是我们可以通过一些技巧使得c++具有自动判别参数类型的特性. 模板 我们都知道在模板类和模板函数 ...
- 怎么屏蔽F5键刷新功能
window.document.onkeydown=function(){if(event.keyCode==116){//屏蔽F5键,改为只刷新本页面,防止一刷就刷整个窗口event.keyCode ...
- ORACLE PL/SQL异常处理(Exception)学习笔记
1.PL/SQL错误类型 错误类型 报告者 处理方法 编译时错误 PL/SQL编译器 交互式地处理:编译器报告错误,你必须更正这些错误 运行时错误 PL/SQL运行时引擎 程序化地处理:异常由异常处理 ...
- Basic Wall Maze
poj2935:http://poj.org/problem?id=2935 题意:在6*6的格子中,有一些,如果两个格子之间有墙的话,就不能直接相通,问最少要经过几步才能从起点走到终点.并且输出路径 ...
- c++ explicit
C++ explicit关键字用来修饰类的构造函数,表明该构造函数是显式的,既然有"显式"那么必然就有"隐式",那么什么是显示而什么又是隐式的呢? 如果c++类 ...
- 【Linux】鸟哥的Linux私房菜基础学习篇整理(五)
1. type [-tpa] name:查看name命令是否为bash内置命令.参数:type:不加任何参数,type会显示出那么是外部命令还是bash的内置命令:-t:当加入-t参数时,type会通 ...
- Qt入门(10)——调试技术
命令行参数当你运行Qt程序时,你可以指定几个命令行参数来帮助你调试.-nograb 应用程序不再捕获鼠标或者键盘.当程序在Linux下运行在gdb调试器中时这个选项是默认的.-dograb 忽略任何隐 ...