Skip to content

Commit a5e0d14

Browse files
doc : README.md
1 parent 8caaa86 commit a5e0d14

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,16 @@
33

44
* In the Spring Security 6 ecosystem, compared to 5, there is a preference for JWT or Keycloak over traditional OAuth2 using a Password Grant method with Spring Security Authorization and Resource Server. I needed to incorporate the current OAuth2 Password Grant with the Spring Security new version and am showing the customization.
55
* Set up access & refresh token APIs on both '/oauth2/token' and on our controller layer such as '/api/v1...', both of which function same and have `the same request & response payloads for success and errors`.
6+
* In the following error payload, the 'message' shouldn't be exposed to clients; instead, the 'userMessage' should be.
7+
````
8+
{
9+
"timestamp": 1719470948370,
10+
"message": "Couldn't find the client ID : client_admi",
11+
"details": "uri=/oauth2/token",
12+
"userMessage": "Authentication failed. Please check your credentials.",
13+
"userValidationMessage": null
14+
}
15+
````
616
* Authentication management based on a combination of username, client id, and an extra token (referred to in the source code as App-Token, which receives a unique value from the calling devices).
717
* Separated UserDetails implementation for Admin and Customer roles.
818
* Integration with spring-security-oauth2-authorization-server.

0 commit comments

Comments
 (0)