Skip to main content

Spring Security - Authority vs Role

I have spent a lot of time recently trying to understand the difference between Authority and Role in Spring Security.  This is a brief review of what I found.

When creating a UserDetailsService or overriding configure(AuthenticationManagerBuilder auth) in the security config class that extends WebSecurityConfigurerAdapter, I basically get complete control over what I populate inside of the UserDetails that is used/returned.  This is important because the UserDetails interface really only cares about how to return one thing:

Collection<? extends GrantedAuthority> getAuthorities();

A GrantedAuthority just seems like a glorified String wrapper that names some thing.  The question is... what is that thing?

This is where the subtle difference between Authority and Role comes into play.

I think that Role is an older thought/construct that automatically gets plugged into Authority if we just create a user with a Role.  But completely forget about the code and classes for a minute.  Think instead of Role and Authority (and User) in general definition terms:

User: A persona in the system.  Someone who can be authenticated somehow.

Role: The title/type of work done by a User in the system.  A user might have a "HR_MANAGER" role.  Other users may also have this role.

Authority: An action that can be taken in the system.  Examples might be:

  • Approving a workflow - something typically done by a manager.
  • Submitting a form - something typically done by a lower level user.
  • Overriding a value by editing it after it has been submitted - something typically done by a more senior manager.
These Authorities are actions typically assigned to a Role, not specifically to a User.  I am familiar with this pattern; it allows what is typically called fine grained control over actions (Authorities) by providing a level of abstraction between the action (Authority) and the User... and that level of abstraction is Role.

Now, let's come back to Spring Security.

To me, it seems like Spring Security has tried to retrofit Roles into Authorities by allowing the developer to only attach one Collection of things (GrantedAuthority is the thing) to a user... and then other configurations in configure(HttpSecurity) inside of the WebSecurityConfigurerAdapter 'interpret' the GrantedAuthority as either a Role or an Authority.  For me, this was extremely confusing.  Really, at the end of the day, I'm just stuffing some kind of string into GrantedAuthority and then letting Spring Security check that string when I ask it to either check hasRole or hasAuthority -- these both basically do the same thing.  If I understand this correctly, this means:

I cannot use both Roles and Authorities at the same time.  I have to pick one route or the other!
Once I have decided whether I want to add the extra level of indirection or not, I then code it however I prefer, and then use the .hasRole() or .hasAuthority() method to basically clarify my choice to future coders because they more or less do the same thing.


Popular posts from this blog

JHipster, Liquibase, MySQL, and initializing data, including booleans!

When generating a data model from JHipster JDL, we will often declare entities with Boolean fields.  I have so far abandoned H2 as a database because of liquibase issues, and both my dev and production databases will be MySQL.  This is relevant to the Boolean field desire there is a long history in software development of how to store Boolean data types in a SQL database whose standards classically do not support Boolean. In the current JHipster/Liquibase incarnation, tables in MySQL are generated for us, which is really nice.  The Boolean data types are stored as BIT  (1).  This is not a problem so far -- most developers seem to agree now that as a best practice, we should store values in databases as false = 0 and true = 1, and a BIT(1) is a great, simple way to do that. An issue arises when we try to use liquibase to set/update our database to the desired starting state.  For my project, I've chosen gradle instead of maven as a build tool, and gradle has a plugin for liquiba

Gmail internal application, Two-Legged OAuth2, Server to Server authentication, and Google API versions

I am working on a little tool at home in my free time to put some skills into practice.  The general idea (nothing novel) is this: I have some financial alerts sent to a new email address I have spun up on my domain.  I am creating an AWS Lambda that will wake up on an hourly schedule, read those emails, and publish SNS messages with parsed financial transaction information.  I then will have an SQS queue listen to the SNS message topic that is consumed by a Step Function.  The Step Function will: store the financial transaction information into a database send an SMS to me if the transaction is above a certain threshold. I could later extend this to do some aggregation reporting, etc if I wanted, too.  This will only work for my own financial transactions, and the data being gathered/stored will be sufficiently vague, so I am not really concerned about financial security for this project. The biggest hurdle I have run into so far is connecting to Gmail securely.  I was ab