Require HTTPS with Spring Security behind a reverse proxy
I have a Spring MVC application secured with Spring Security. The majority of the application uses simple HTTP to save resources, but a small part processes more confidential information and requires an HTTPS channel.
Extract from the :security-config.xml
<sec:http authentication-manager-ref="authenticationManager" ... >
...
<sec:intercept-url pattern="/sec/**" requires-channel="https"/>
<sec:intercept-url pattern="/**" requires-channel="http"/>
</sec:http>
All worked fine until we decided to migrate it to the main server, where the application servers run behind reverse proxies. And as now HTTPS is processed by the reverse proxies the application server only sees HTTP requests, and disallows access to the hierarchy./sec/**
After some research, I found that the proxies add a header (*), but in Spring Security HttpServletRequest.isSecure()
is used to determine the channel security offered (extract from javadoc).X-Forwarded-Proto: https
SecureChannelProcessor
How can I tell Spring Security that a header is enough for a secure request?X-Forwarded-Proto: https
I know I could report that part on proxies configuration, but the proxies administrator really does not like that solution, because there are many application behind the proxies and the configuration could grow to a non manageable state.
I an currently using Spring Security 3.2 with XML config, but I'm ready to accept answers based on Java config and/or more recent version.
(*)Of course, the proxies remove the header if it was present in incoming request, so the application can be confident in it.