You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/migration/reactive.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -171,7 +171,7 @@ http {
171
171
172
172
To opt-out of the 6.0 defaults and instead continue to pass `AuthenticationServiceException` on to ``ServerAuthenticationEntryPoint``s, you can follow the same steps as above, except set `rethrowAuthenticationServiceException` to false.
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/migration/servlet/exploits.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ open fun springSecurity(http: HttpSecurity): SecurityFilterChain {
114
114
----
115
115
====
116
116
117
-
== CSRF BREACH Protection
117
+
== Protect against CSRF BREACH
118
118
119
119
If the steps for <<Defer Loading CsrfToken>> work for you, then you can also opt into Spring Security 6's default support for BREACH protection of the `CsrfToken` using the following configuration:
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/migration/servlet/oauth2.adoc
+3-8Lines changed: 3 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
The following steps relate to changes around how to configure OAuth 2.0.
4
4
5
-
== Default authorities for oauth2Login()
5
+
== Change Default `oauth2Login()` Authorities
6
6
7
7
In Spring Security 5, the default `GrantedAuthority` given to a user that authenticates with an OAuth2 or OpenID Connect 1.0 provider (via `oauth2Login()`) is `ROLE_USER`.
8
8
@@ -192,7 +192,7 @@ private fun grantedAuthoritiesMapper(): GrantedAuthoritiesMapper {
192
192
----
193
193
====
194
194
195
-
== Deprecations in OAuth2 Client
195
+
== Address OAuth2 Client Deprecations
196
196
197
197
In Spring Security 6, deprecated classes and methods were removed from xref:servlet/oauth2/client/index.adoc[OAuth2 Client].
198
198
Each deprecation is listed below, along with a direct replacement.
@@ -313,12 +313,7 @@ The static method `implicit()` has no direct replacement.
313
313
Use of the `implicit` grant type is not recommended and all related support is removed in Spring Security 6.
314
314
====
315
315
316
-
== Deprecations in OAuth2 Resource Server
317
-
318
-
In Spring Security 6, deprecated classes and methods were removed from xref:servlet/oauth2/resource-server/index.adoc[OAuth2 Resource Server].
319
-
Each deprecation is listed below, along with a direct replacement.
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/migration/servlet/session-management.adoc
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
= Session Management Migrations
2
2
3
-
== Explicit Save SecurityContextRepository
3
+
== Require Explicit Saving of SecurityContextRepository
4
4
5
5
In Spring Security 5, the default behavior is for the xref:servlet/authentication/architecture.adoc#servlet-authentication-securitycontext[`SecurityContext`] to automatically be saved to the xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] using the xref:servlet/authentication/persistence.adoc#securitycontextpersistencefilter[`SecurityContextPersistenceFilter`].
6
6
Saving must be done just prior to the `HttpServletResponse` being committed and just before `SecurityContextPersistenceFilter`.
@@ -15,7 +15,7 @@ To opt into the new Spring Security 6 default, the following configuration can b
== Change `HttpSessionSecurityContextRepository` to `DelegatingSecurityContextRepository`
19
19
20
20
In Spring Security 5, the default xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] is `HttpSessionSecurityContextRepository`.
21
21
@@ -82,7 +82,7 @@ fun securityFilterChain(http: HttpSecurity): SecurityFilterChain {
82
82
If you are already using an implementation other than `HttpSessionSecurityContextRepository`, you should replace it with your chosen implementation in the example above to ensure that it is used along with `RequestAttributeSecurityContextRepository`.
In Spring Security 5.7, a new method was added to xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] with the signature:
88
88
@@ -170,7 +170,7 @@ If you are not overriding the defaults (i.e. using `NullRequestCache`), then the
== Require Explicit Invocation of SessionAuthenticationStrategy
174
174
175
175
In Spring Security 5, the default configuration relies on `SessionManagementFilter` to detect if a user just authenticated and invoke the `SessionAuthenticationStrategy`.
176
176
The problem with this is that it means that in a typical setup, the `HttpSession` must be read for every request.
0 commit comments