cxf-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Alexander K. (JIRA)" <>
Subject [jira] [Commented] (CXF-7137) Allow OAuth2 customization via Swagger2Feature
Date Thu, 17 Nov 2016 08:10:58 GMT


Alexander K. commented on CXF-7137:

Hi, according to OAuth2 spec, there are 3 ways for client's authentication: confidential,
public and bearer-only.
- Confidential clients require a secret to initiate login protocol.
- Public clients do not require a secret to initiate login protocol.
- Bearer-only clients are web services that never initiate a login (user must be already authenticated).
So the protected web services are bearer-only clients and this means that Swagger API Docs
are read only because clicking on "Try it out!" button will return an error saying "This request
requires HTTP authentication."
This is fine unless you would like to allow the "Try it out!" option for test purposes only.
And this is our part.
Swagger-UI supports the OAuth2 spec by providing an option to configure the required parameters.
It is possible to define via Swagger annotations SecurityDefinition as part of SwaggerDefinition
annotation, but it does not work because SwaggerDefinition annotation is ignored when using
Swagger2Feature (it is a separate issue). So I found references that provide a workaround
by overriding Swagger2Feature.addSwaggerResource() method:

  super.addSwaggerResource(server, bus);
  BeanConfig scanner = (BeanConfig) ScannerFactory.getScanner();
  Swagger swagger = scanner.getSwagger();
  swagger.securityDefinition("qa-auth", new OAuth2Definition().implicit("http://localhost:8080/auth/realms/master/protocol/openid-connect/auth").scope("qa",

Once SecurityDefinition is defined, Swagger shows "Authorize" button in upper right corner
near "Explore" button which allows manual authorization by redirecting to an authorization
server's login page (Keycloak in my case). After the manual authorization (login) the user
should be able to try out the protected services because Swagger-UI will receive a token from
the authorization server as part of authorization process. Of course the Swagger-UI must be
defined in the authorization server as a public or confidential client and according to this
the oauth parameters should be defined.
So, as you can see, the web services and Swagger clients are separated clients and have different
authentication types. Swagger allows access to web services but only for eligible persons
and for testing purposes only (since in the authentication server you can even assign a client
to a specific scope).

Now, the problem is that Swagger-UI generates URI to call authorization server with incorrect
parameters which are hard-coded in the HTML file (realm=your-realms, client_id=your-client-id,

As an example, you can see that Swashbuckle (.Net project for Swagger) allows this configuration
by its own syntax like this:
EnableSwaggerUi(c => { c.EnableOAuth2Support("test-client-id", "test-realm", "Swagger UI");

Hopefully it was clear :)

> Allow OAuth2 customization via Swagger2Feature
> ----------------------------------------------
>                 Key: CXF-7137
>                 URL:
>             Project: CXF
>          Issue Type: Improvement
>          Components: JAX-RS
>    Affects Versions: 3.1.8
>            Reporter: Alexander K.
> It seems that there is no way to customize initOAuth() details like clientId, clientSecret,
realm, appName, etc. for SwaggerUI-OAuth integration. This will allow Swagger-UI authorization
for protected CXF REST services by an authorization server such as Keycloak.

This message was sent by Atlassian JIRA

View raw message