第一步:导入jar包
<!--shiro权限控制器--> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-core</artifactId> <version>1.2.2</version> </dependency> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-web</artifactId> <version>1.2.2</version> </dependency> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-ehcache</artifactId> <version>1.2.2</version> </dependency> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-spring</artifactId> <version>1.2.2</version> </dependency> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-quartz</artifactId> <version>1.2.2</version> </dependency>
第二步:
配置shiro.xml(myRealm、CustomCredentialsMatcher需要自己实现)
myRealm 需要继承 AuthorizingRealm抽象类
CustomCredentialsMatcher 需要继承SimpleCredentialsMathcer类 实现doCredentialsMatcher方法
<beans xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.springframework.org/schema/beans" xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-4.0.xsd"> <!-- 继承自AuthorizingRealm的自定义Realm,即指定Shiro验证用户登录 --> <bean id="myRealm" class="cn.attendance.common.security.MyRealm"> <property name="credentialsMatcher" ref="passwordMatcher"/> </bean> <bean id="passwordMatcher" class="cn.attendance.common.security.CustomCredentialsMatcher"/> <!-- Shiro默认会使用Servlet容器的Session,可通过sessionMode属性来指定使用Shiro原生Session --> <!-- 即<property name="sessionMode" value="native"/>,详细说明见官方文档 --> <!-- 这里主要是设置自定义的单Realm应用,若有多个Realm,可使用'realms'属性代替 --> <bean id="securityManager" class="org.apache.shiro.web.mgt.DefaultWebSecurityManager"> <property name="realm" ref="myRealm"/> </bean> <!-- Shiro主过滤器本身功能十分强大,其强大之处就在于它支持任何基于URL路径表达式的、自定义的过滤器的执行 --> <!-- Web应用中,Shiro可控制的Web请求必须经过Shiro主过滤器的拦截,Shiro对基于Spring的Web应用提供了完美的支持 --> <bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean"> <!-- Shiro的核心安全接口,这个属性是必须的 --> <property name="securityManager" ref="securityManager"/> <!-- 要求登录时的链接(可根据项目的URL进行替换),非必须的属性,默认会自动寻找Web工程根目录下的"/login.jsp"页面 --> <property name="loginUrl" value="/login"/> <!-- 登录成功后要跳转的连接(本例中此属性用不到,因为登录成功后的处理逻辑在LoginController里硬编码为main.jsp了) --> <!-- <property name="successUrl" value="/system/main"/> --> <!-- 用户访问未对其授权的资源时,所显示的连接 --> <!-- 若想更明显的测试此属性可以修改它的值,如unauthor.jsp,然后用[玄玉]登录后访问/admin/listUser.jsp就看见浏览器会显示unauthor.jsp --> <!--<property name="unauthorizedUrl" value="/error/403.html"/>--> <!-- Shiro连接约束配置,即过滤链的定义 --> <!-- 此处可配合我的这篇文章来理解各个过滤连的作用http://blog.csdn.net/jadyer/article/details/12172839 --> <!-- 下面value值的第一个'/'代表的路径是相对于HttpServletRequest.getContextPath()的值来的 --> <!-- anon:它对应的过滤器里面是空的,什么都没做,这里.do和.jsp后面的*表示参数,比方说login.jsp?main这种 --> <!-- authc:该过滤器下的页面必须验证后才能访问,它是Shiro内置的一个拦截器org.apache.shiro.web.filter.authc.FormAuthenticationFilter --> <property name="filterChainDefinitions"> <value> /static/**=anon /login=anon <!--/user/userinfo=authc--> /user/userinfo=anon </value> </property> </bean> <!-- 保证实现了Shiro内部lifecycle函数的bean执行 --> <bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor"/> </beans>
第三步:
整合spring框架
<!--引入权限管理--> <import resource="spring-shiro.xml"/>
第四步:
扫描二维码关注公众号,回复:
1619095 查看本文章
整合spring-mvc框架
<!--开启切面编程自动代理--> <aop:aspectj-autoproxy proxy-target-class="true"/> <bean class="org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor"> <property name="securityManager" ref="securityManager"/> </bean>
第五步:
在web.xml中配置
<filter> <filter-name>shiroFilter</filter-name> <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class> <async-supported>true</async-supported> <init-param> <!-- 该值缺省为false,表示生命周期由SpringApplicationContext管理,设置为true则表示由ServletContainer管理 --> <param-name>targetFilterLifecycle</param-name> <param-value>true</param-value> </init-param> </filter> <filter-mapping> <filter-name>shiroFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping>
第六步 :
配置全局无权限跳转页面
<!--全局错误页面跳转--> <bean class="org.springframework.web.servlet.handler.SimpleMappingExceptionResolver"> <property name="exceptionMappings"> <props> <!--无权限跳转后的页面--> <prop key="org.apache.shiro.authz.UnauthorizedException">403</prop> </props> </property> </bean>
实例:
1:认证:
(自定义的Realm需要继承AuthorizingRealm类并从写他的两个方法)(CustomerCredentialsMatcher继承SimpleCredentialsMathcer类并重写doCredentialsMatcher方法)
(1)调用subject.login(Token) ->
(2)Realm类中的AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token)方法 ->
(3)强转Token获取用户信息 ->
(4)return Authentication对象 ->
(5)自定义的认证方法CustomerCredentialsMatcher.doCredentialsMatcher方法
2:代码
myRealm:
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException { UsernamePasswordToken usernamePasswordToken = (UsernamePasswordToken) token; String username = usernamePasswordToken.getUsername(); User user = userService.findUserByUserName(username); if(user == null){ return null; }else{ AuthenticationInfo info = new SimpleAuthenticationInfo(user.getUsername(),user.getPassword(),getName()); SecurityUtils.getSubject().getSession().setAttribute("userinfo",user); return info; } }
CustomerCredentials:
public boolean doCredentialsMatch(AuthenticationToken token, AuthenticationInfo info) { try { UsernamePasswordToken usernamePasswordToken = (UsernamePasswordToken) token; String password = String.valueOf(usernamePasswordToken.getPassword()); Object tokenCredentials = MD5Utils.encryptPassword(password); Object accountCredentials = getCredentials(info); return equals(tokenCredentials,accountCredentials); }catch (NoSuchAlgorithmException e) { e.printStackTrace(); } catch (UnsupportedEncodingException e) { e.printStackTrace(); } return false; }
授权代码:
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { String username = (String)principalCollection.getPrimaryPrincipal(); User user = userService.findUserByUserName(username); SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo(); for(Role role :user.getRoleList()){ authorizationInfo.addRole(role.getRole()); for(Permission permission :role.getPermissionList()){ authorizationInfo.addStringPermission(permission.getPermission()); } } return authorizationInfo; }