Provides a persistent Remember Me mechanism for OAuth2/OIDC to survive server restarts or work inside clustering environments.
Note
Primarily designed for OIDC and E-Mails
Detailed explanation of why this exists
When a client/user tries to migrate to another instance of the webapp, e.g.
- after it/the server was restarted
- after being redirected to another node inside the cluster
it no longer recognizes the session and with that all authentification data.
There are some approaches for persisting the Session with Spring Boot, however they usually involve serializing and persisting the session.
There are some problems with that:
- The session needs to be serializable
- If using Java Serialization: It's insecure and will always be
- When updating your app the session data might become incompatible (especially when using Java serialization) and migrating it might be extremely difficult
- The sessions can contain a ton of data (and that needs to be store somewhere on the backend)
- If the persistent data/backend is breached, an attacker can easily use this data to login in / steal personal information
- When restoring the session it might be necessary to invoke app-specific logic
⚠ IMPORTANT
Data that should survive restarts/instance-switches (like the contents of a shopping cart) must NOT be stored inside the session!
Store them in a persistent database or something similar
Spring Boot provides Remember-Me authentication.
This is a lot better than using serializing the session, as it doesn't requires lots of serialization and data-storage.
However are still some problem with that:
- You need to revalidate if the client is still allowed to login
- This means communicating with the OIDC server, to get relevant information
- If the OIDC server is down you have a problem because you can't get the required data
- This means communicating with the OIDC server, to get relevant information
- If the persistent data/backend is breached, an attacker can easily use this data to login in
- If the persistent data/backend is breached, the data is useless for the attacker:
- The data is stored on the client which the attacker cannot access easily
- An attacker has to get both: The server encryption key (stored on server) and the client encryption keys (stored in database)
- The encryption keys can easily be rotated (just create a new payload-encryption version, see example configuration below)
- Most logic after the deserialization is not needed; Re-Validation is only required if the client was not seen for a longer time
For more detailed docs have a look at the javadoc of OAuth2CookieRememberMeServices
.
- You need to implement
OAuth2RememberMeUserEnricher
andAuthRememberMeSecretService
- Inside your main
WebSecurity#configure
add:this.cookieRememberMeServices.install(http);
sse:
auth:
remember-me:
payload-encryption:
standard: v2
chacha20:
v2:
nonce: JustForDev_1
aesgcm:
legacy:
init-vector: RandomInitIV
secret-key-length: 16
- If you use clustering you should still use Stick Sessions for the HTTP-Session
- Otherwise a lot of performance might get lost due to the decryption overhead
- The size of a cookie is limited to ~4kB. If you have a ton of data inside the serialized authentication data (e.g. additional OIDC attributes) you might have to trim it down (instruct the OIDC server to send less) or customize the serialization to exclude it.
- By default there are compression mechanism in place to try to keep the serialized data low (usually a cookie has around ~2kB). This includes using
- the bare minimum for JSON attribute-names
- deflate to compress the created JSON
- an overhead-less encryption (e.g. ChaCha20)
- By default there are compression mechanism in place to try to keep the serialized data low (usually a cookie has around ~2kB). This includes using