pac4j provides a security model and engine (specific behaviours). The “security filter” is in charge of protecting url, requesting authentication and optionally authorization.
In some cases, you may want to bypass this “security filter” and this can be done using the matchers parameter which is generally a list of matcher names. A matcher is generally defined in the security configuration.
The matchers can also be used to always apply some logic on the URLs, like adding some security headers.
2) Available matchers
A matcher can be defined by implementing the
Matcher interface. It has only one method:
boolean matches(WebContext context) to say if the “security filter” must be applied.
A few matchers are available (but you can of course develop yours):
PathMatcherallows you to exclude some paths from the security checks
HeaderMatcherallows you to check if a given header is
nullor matches a regular expression
HttpMethodMatcherallows you to check if the method of the HTTP request is one of the expected defined methods.
3) Default matchers
DefaultMatchingChecker class (used by the
DefaultSecurityLogic class), the following keywords are automatically available for the following matchers:
deletekeywords for the related configurations of the
HttpMethodMatcher(if they do not already exist)
hstskeyword for the
nosniffkeyword for the
noframekeyword for the
xssprotectionkeyword for the
nocachekeyword for the
securityheaderskeyword as a shortcut for
csrfTokenkeyword for the
allowAjaxRequestskeyword for a default configuration of the
Access-Control-Allow-Originheader set to
nonekeyword for no matchers at all.
DefaultMatchingCheckerapplies the securityHeaders,csrfToken configuration.