Currently, to specify a time-sensitive factor, it is needed to create an AuthorizationManagerFactory
by way of a static factory that returns a builder:
var passwordIn30m = AuthorizationManagerFactories.multiFactor()
.requireFactor( (factor) -> factor
.passwordAuthority()
.validDuration(Duration.ofMinutes(30))
)
.build();
This can then be used to create rules that include this factor as a basis:
http
.authorizeHttpRequests((authorize) -> authorize
.requestMatchers("/admin/**").access(passwordIn30m.hasRole("ADMIN"))
.anyRequest().authenticated()
)
// ...
When just one factor is under consideration, this boilerplate could be reduced in a few ways. One way is to make it simpler to provide just one authority like so:
var passwordIn30m = AuthorizationManagerFactories.hasFactor(PASSWORD_AUTHORITY, Duration.ofMinutes(30));
http
.authorizeHttpRequests((authorize) -> authorize
.requestMatchers("/admin/**").access(passwordIn30m.hasRole("ADMIN"))
.anyRequest().authenticated()
)
// ...
Or, AuthorizationManagerFactories
could expose the individual authorities:
var passwordIn30m = AuthorizationManagerFactories.hasPasswordFactor((f) -> f.validDuration(Duration.ofMinutes(30)));
http
.authorizeHttpRequests((authorize) -> authorize
.requestMatchers("/admin/**").access(passwordIn30m.hasRole("ADMIN"))
.anyRequest().authenticated()
)
// ...
I like the idea of having a simpler representation for a single factor since there are use cases other than multi-factor authentication when applications will want to require a time-sensitive factor in order to proceed.
NOTE: This ticket is marked as team-attention
since we don't have a clear idea whether to go down any of these routes just yet.