lomg 发表于 2015-8-2 08:02:22

Apache Shiro 使用手册(三)Shiro 授权

授权即访问控制,它将判断用户在应用程序中对资源是否拥有相应的访问权限。
如,判断一个用户有查看页面的权限,编辑数据的权限,拥有某一按钮的权限,以及是否拥有打印的权限等等。
一、授权的三要素
授权有着三个核心元素:权限、角色和用户。
权限
权限是Apache Shiro安全机制最核心的元素。它在应用程序中明确声明了被允许的行为和表现。一个格式良好好的权限声明可以清晰表达出用户对该资源拥有的权限。
大多数的资源会支持典型的CRUD操作(create,read,update,delete),但是任何操作建立在特定的资源上才是有意义的。因此,权限声明的根本思想就是建立在资源以及操作上。
而我们通过权限声明仅仅能了解这个权限可以在应用程序中做些什么,而不能确定谁拥有此权限。
于是,我们就需要在应用程序中对用户和权限建立关联。
通常的做法就是将权限分配给某个角色,然后将这个角色关联一个或多个用户。
权限声明及粒度
Shiro权限声明通常是使用以冒号分隔的表达式。就像前文所讲,一个权限表达式可以清晰的指定资源类型,允许的操作,可访问的数据。同时,Shiro权限表达式支持简单的通配符,可以更加灵活的进行权限设置。
下面以实例来说明权限表达式。
可查询用户数据
User:view
可查询或编辑用户数据
User:view,edit
可对用户数据进行所有操作
User:* 或 user
可编辑id为123的用户数据
User:edit:123
角色
Shiro支持两种角色模式:
1、传统角色:一个角色代表着一系列的操作,当需要对某一操作进行授权验证时,只需判断是否是该角色即可。这种角色权限相对简单、模糊,不利于扩展。
2、权限角色:一个角色拥有一个权限的集合。授权验证时,需要判断当前角色是否拥有该权限。这种角色权限可以对该角色进行详细的权限描述,适合更复杂的权限设计。
下面将详细描述对两种角色模式的授权实现。
二、授权实现
Shiro支持三种方式实现授权过程:

[*]编码实现
[*]注解实现
[*]JSP Taglig实现
1、基于编码的授权实现
1.1基于传统角色授权实现
当需要验证用户是否拥有某个角色时,可以调用Subject 实例的hasRole*方法验证。



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=Subject%20currentUser%20%3D%20SecurityUtils.getSubject()%3B%0Aif%20(currentUser.hasRole(%22administrator%22))%20%7B%0A%20%20%20%20%2F%2Fshow%20the%20admin%20button%0A%7D%20else%20%7B%0A%20%20%20%20%2F%2Fdon
[*]Subject currentUser = SecurityUtils.getSubject();
[*]if (currentUser.hasRole("administrator")) {
[*]    //show the admin button
[*]} else {
[*]    //don't show the button?Grey it out?
[*]}

相关验证方法如下:
Subject方法描述hasRole(String roleName)当用户拥有指定角色时,返回truehasRoles(List roleNames)按照列表顺序返回相应的一个boolean值数组hasAllRoles(Collection roleNames)如果用户拥有所有指定角色时,返回true
断言支持
Shiro还支持以断言的方式进行授权验证。断言成功,不返回任何值,程序继续执行;断言失败时,将抛出异常信息。使用断言,可以使我们的代码更加简洁。



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=Subject%20currentUser%20%3D%20SecurityUtils.getSubject()%3B%0A%2F%2Fguarantee%20that%20the%20current%20user%20is%20a%20bank%20teller%20and%0A%2F%2Ftherefore%20allowed%20to%20open%20the%20account%3A%0AcurrentUser.checkRole(%22bankTeller%22)%3B%0AopenBankAccount()%3B
[*]Subject currentUser = SecurityUtils.getSubject();
[*]//guarantee that the current user is a bank teller and
[*]//therefore allowed to open the account:
[*]currentUser.checkRole("bankTeller");
[*]openBankAccount();

断言的相关方法:
Subject方法描述checkRole(String roleName)断言用户是否拥有指定角色checkRoles(Collection roleNames)断言用户是否拥有所有指定角色checkRoles(String... roleNames)对上一方法的方法重载
1.2 基于权限角色授权实现
相比传统角色模式,基于权限的角色模式耦合性要更低些,它不会因角色的改变而对源代码进行修改,因此,基于权限的角色模式是更好的访问控制方式。
它的代码实现有以下几种实现方式:
1、基于权限对象的实现
创建org.apache.shiro.authz.Permission的实例,将该实例对象作为参数传递给Subject.isPermitted()进行验证。



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=Permission%20printPermission%20%3D%20new%20PrinterPermission(%22laserjet4400n%22%2C%20%22print%22)%3B%0ASubject%20currentUser%20%3D%20SecurityUtils.getSubject()%3B%0Aif%20(currentUser.isPermitted(printPermission))%20%7B%0A%20%20%20%20%2F%2Fshow%20the%20Print%20button%0A%7D%20else%20%7B%0A%20%20%20%20%2F%2Fdon
[*]Permission printPermission = new PrinterPermission("laserjet4400n", "print");
[*]Subject currentUser = SecurityUtils.getSubject();
[*]if (currentUser.isPermitted(printPermission)) {
[*]    //show the Print button
[*]} else {
[*]    //don't show the button?Grey it out?
[*]}
[*]Permission printPermission = new PrinterPermission("laserjet4400n", "print");
[*]Subject currentUser = SecurityUtils.getSubject();
[*]if (currentUser.isPermitted(printPermission)) {
[*]    //show the Print button
[*]} else {
[*]    //don't show the button?Grey it out?
[*]}

相关方法如下:
Subject方法描述isPermitted(Permission p)Subject拥有制定权限时,返回treuisPermitted(List perms)返回对应权限的boolean数组isPermittedAll(Collection perms)Subject拥有所有制定权限时,返回true
2、 基于字符串的实现
相比笨重的基于对象的实现方式,基于字符串的实现便显得更加简洁。



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=Subject%20currentUser%20%3D%20SecurityUtils.getSubject()%3B%0Aif%20(currentUser.isPermitted(%22printer%3Aprint%3Alaserjet4400n%22))%20%7B%0A%20%20%20%20%2F%2Fshow%20the%20Print%20button%0A%7D%20else%20%7B%0A%20%20%20%20%2F%2Fdon
[*]Subject currentUser = SecurityUtils.getSubject();
[*]if (currentUser.isPermitted("printer:print:laserjet4400n")) {
[*]    //show the Print button
[*]} else {
[*]    //don't show the button?Grey it out?
[*]}

使用冒号分隔的权限表达式是org.apache.shiro.authz.permission.WildcardPermission 默认支持的实现方式。
这里分别代表了 资源类型:操作:资源ID
类似基于对象的实现相关方法,基于字符串的实现相关方法:
isPermitted(String perm)、isPermitted(String... perms)、isPermittedAll(String... perms)
基于权限对象的断言实现



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=Subject%20currentUser%20%3D%20SecurityUtils.getSubject()%3B%0A%2F%2Fguarantee%20that%20the%20current%20user%20is%20permitted%0A%2F%2Fto%20open%20a%20bank%20account%3A%0APermission%20p%20%3D%20new%20AccountPermission(%22open%22)%3B%0AcurrentUser.checkPermission(p)%3B%0AopenBankAccount()%3B
[*]Subject currentUser = SecurityUtils.getSubject();
[*]//guarantee that the current user is permitted
[*]//to open a bank account:
[*]Permission p = new AccountPermission("open");
[*]currentUser.checkPermission(p);
[*]openBankAccount();

基于字符串的断言实现



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=Subject%20currentUser%20%3D%20SecurityUtils.getSubject()%3B%0A%2F%2Fguarantee%20that%20the%20current%20user%20is%20permitted%0A%2F%2Fto%20open%20a%20bank%20account%3A%0AcurrentUser.checkPermission(%22account%3Aopen%22)%3B%0AopenBankAccount()%3B
[*]Subject currentUser = SecurityUtils.getSubject();
[*]//guarantee that the current user is permitted
[*]//to open a bank account:
[*]currentUser.checkPermission("account:open");
[*]openBankAccount();

断言实现的相关方法
Subject方法说明checkPermission(Permission p)断言用户是否拥有制定权限checkPermission(String perm)断言用户是否拥有制定权限checkPermissions(Collection perms)断言用户是否拥有所有指定权限checkPermissions(String... perms)断言用户是否拥有所有指定权限
2、基于注解的授权实现
Shiro注解支持AspectJ、Spring、Google-Guice等,可根据应用进行不同的配置。
相关的注解:
@ RequiresAuthentication
可以用户类/属性/方法,用于表明当前用户需是经过认证的用户。



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%40RequiresAuthentication%0Apublic%20void%20updateAccount(Account%20userAccount)%20%7B%0A%20%20%20%20%2F%2Fthis%20method%20will%20only%20be%20invoked%20by%20a%20%0A%20%20%20%20%2F%2FSubject%20that%20is%20guaranteed%20authenticated%0A%20%20%20%20...%0A%7D
[*]@RequiresAuthentication
[*]public void updateAccount(Account userAccount) {
[*]    //this method will only be invoked by a   
[*]    //Subject that is guaranteed authenticated
[*]    ...
[*]}

@ RequiresGuest
表明该用户需为”guest”用户
@ RequiresPermissions
当前用户需拥有制定权限



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%40RequiresPermissions(%22account%3Acreate%22)%0Apublic%20void%20createAccount(Account%20account)%20%7B%0A%20%20%20%20%2F%2Fthis%20method%20will%20only%20be%20invoked%20by%20a%20Subject%0A%20%20%20%20%2F%2Fthat%20is%20permitted%20to%20create%20an%20account%0A%20%20%20%20...%0A%7D
[*]@RequiresPermissions("account:create")
[*]public void createAccount(Account account) {
[*]    //this method will only be invoked by a Subject
[*]    //that is permitted to create an account
[*]    ...
[*]}

@RequiresRoles
当前用户需拥有制定角色
@ RequiresUser
当前用户需为已认证用户或已记住用户
3、基于JSPTAG的授权实现
Shiro提供了一套JSP标签库来实现页面级的授权控制。
在使用Shiro标签库前,首先需要在JSP引入shiro标签:



Java代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3C%25%40%20taglib%20prefix%3D%22shiro%22%20uri%3D%22http%3A%2F%2Fshiro.apache.org%2Ftags%22%20%25%3E
[*]

下面一一介绍Shiro的标签:
guest标签
验证当前用户是否为“访客”,即未认证(包含未记住)的用户



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3Aguest%3E%0A%20%20%20%20Hi%20there!%20%20Please%20%3Ca%20href%3D%22login.jsp%22%3ELogin%3C%2Fa%3E%20or%20%3Ca%20href%3D%22signup.jsp%22%3ESignup%3C%2Fa%3E%20today!%0A%3C%2Fshiro%3Aguest%3E
[*]
[*]    Hi there!Please Login or Signup today!
[*]

user标签
认证通过或已记住的用户



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3Auser%3E%0A%20%20%20%20Welcome%20back%20John!%20%20Not%20John%3F%20Click%20%3Ca%20href%3D%22login.jsp%22%3Ehere%3Ca%3E%20to%20login.%0A%3C%2Fshiro%3Auser%3E
[*]
[*]    Welcome back John!Not John? Click here to login.
[*]

authenticated标签
已认证通过的用户。不包含已记住的用户,这是与user标签的区别所在。



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3Aauthenticated%3E%0A%20%20%20%20%3Ca%20href%3D%22updateAccount.jsp%22%3EUpdate%20your%20contact%20information%3C%2Fa%3E.%0A%3C%2Fshiro%3Aauthenticated%3E
[*]
[*]    Update your contact information.
[*]

notAuthenticated标签
未认证通过用户,与authenticated标签相对应。与guest标签的区别是,该标签包含已记住用户。



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3AnotAuthenticated%3E%0A%20%20%20%20Please%20%3Ca%20href%3D%22login.jsp%22%3Elogin%3C%2Fa%3E%20in%20order%20to%20update%20your%20credit%20card%20information.%0A%3C%2Fshiro%3AnotAuthenticated%3E
[*]
[*]    Please login in order to update your credit card information.
[*]

principal 标签
输出当前用户信息,通常为登录帐号信息



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=Hello%2C%20%3Cshiro%3Aprincipal%2F%3E%2C%20how%20are%20you%20today%3F
[*]Hello, , how are you today?

hasRole标签
验证当前用户是否属于该角色



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3AhasRole%20name%3D%22administrator%22%3E%0A%20%20%20%20%3Ca%20href%3D%22admin.jsp%22%3EAdminister%20the%20system%3C%2Fa%3E%0A%3C%2Fshiro%3AhasRole%3E
[*]
[*]    Administer the system
[*]

lacksRole标签
与hasRole标签逻辑相反,当用户不属于该角色时验证通过



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3AlacksRole%20name%3D%22administrator%22%3E%0A%20%20%20%20Sorry%2C%20you%20are%20not%20allowed%20to%20administer%20the%20system.%0A%3C%2Fshiro%3AlacksRole%3E
[*]
[*]    Sorry, you are not allowed to administer the system.
[*]

hasAnyRole标签
验证当前用户是否属于以下任意一个角色。



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3AhasAnyRoles%20name%3D%22developer%2C%20project%20manager%2C%20administrator%22%3E%0A%20%20%20%20You%20are%20either%20a%20developer%2C%20project%20manager%2C%20or%20administrator.%0A%3C%2Fshiro%3AlacksRole%3E
[*]
[*]    You are either a developer, project manager, or administrator.
[*]

hasPermission标签
验证当前用户是否拥有制定权限



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3AhasPermission%20name%3D%22user%3Acreate%22%3E%0A%20%20%20%20%3Ca%20href%3D%22createUser.jsp%22%3ECreate%20a%20new%20User%3C%2Fa%3E%0A%3C%2Fshiro%3AhasPermission%3E
[*]
[*]    Create a new User
[*]

lacksPermission标签
与hasPermission标签逻辑相反,当前用户没有制定权限时,验证通过



Xml代码 http://kdboy.iteye.com/javascripts/syntaxhighlighter/clipboard_new.swf?clipboard=%3Cshiro%3AhasPermission%20name%3D%22user%3Acreate%22%3E%0A%20%20%20%20%3Ca%20href%3D%22createUser.jsp%22%3ECreate%20a%20new%20User%3C%2Fa%3E%0A%3C%2Fshiro%3AhasPermission%3E
[*]
[*]    Create a new User
[*]

三、Shiro授权的内部处理机制

1、在应用程序中调用授权验证方法(Subject的isPermitted*或hasRole*等)
2、Sbuject的实例通常是DelegatingSubject类(或子类)的实例对象,在认证开始时,会委托应用程序设置的securityManager实例调用相应的isPermitted*或hasRole*方法。
3、接下来SecurityManager会委托内置的Authorizer的实例(默认是ModularRealmAuthorizer 类的实例,类似认证实例,它同样支持一个或多个Realm实例认证)调用相应的授权方法。
4、每一个Realm将检查是否实现了相同的 Authorizer 接口。然后,将调用Reaml自己的相应的授权验证方法。
当使用多个Realm时,不同于认证策略处理方式,授权处理过程中:
1、当调用Realm出现异常时,将立即抛出异常,结束授权验证。
2、只要有一个Realm验证成功,那么将认为授权成功,立即返回,结束认证。
页: [1]
查看完整版本: Apache Shiro 使用手册(三)Shiro 授权