๊ด€๋ฆฌ ๋ฉ”๋‰ด

๋ชฉ๋ก์ „์ฒด ๊ธ€ (240)

JiYoung Dev ๐Ÿ–ฅ

Spring Security ์ ์šฉ๊ธฐ (4) JWT(JSON Web Tokens) ์–ด๋””์— ์ €์žฅํ•  ๊ฒƒ์ธ๊ฐ€?

์ด์ „ ํฌ์ŠคํŒ…์—์„œ JWT์˜ ๊ฐœ๋…์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์•˜๋‹ค. 2024.04.29 - [Study/Java] - Spring Security ์ ์šฉ๊ธฐ (3) JWT(JSON Web Tokens) ๊ฐœ๋… JWT ๊ตฌํ˜„์„ ์ƒ๊ฐํ•˜๋‹ค๋ณด๋‹ˆ access token๊ณผ refresh token์„ ์–ด๋””์— ์ €์žฅํ•ด์•ผ ์ข‹์€์ง€์— ๋Œ€ํ•ด ๊ณ ๋ฏผํ•˜๊ฒŒ ๋˜์—ˆ๋‹ค. ์ด์™€ ๊ด€๋ จํ•˜์—ฌ ๋งŽ์€ ๋ถ„๋“ค์ด ๊ณ ๋ฏผํ•˜๊ณ  ์ž‘์„ฑํ•œ ๊ธ€๋“ค์ด ์žˆ์–ด ์ด๋ฅผ ์ดํ•ดํ•˜๊ณ  ๋‚˜๋Š” ์–ด๋–ป๊ฒŒ ํ•  ๊ฒƒ์ธ์ง€ ๊ฒฐ๋ก ์„ ๋‚ด๋ฆฌ๊ณ ์ž ํ•œ๋‹ค.  JWT ๋ฐœ๊ธ‰ ํ”„๋กœ์„ธ์Šค  1. ํด๋ผ์ด์–ธํŠธ๊ฐ€ ๋กœ๊ทธ์ธ์‹œ ์ธ์ฆ ์„œ๋ฒ„์—์„œ Access Token๊ณผ Refresh Token์„ ๋ฐœ๊ธ‰ํ•œ๋‹ค. 2. ์ดํ›„ ์‚ฌ์šฉ์ž๋Š” API ์š”์ฒญ์‹œ ์š”์ฒญ ํ—ค๋”์— Access Token์„ ๋„ฃ์–ด ์š”์ฒญํ•œ๋‹ค. 3. ์œ ํšจํ•œ  Token์ธ ๊ฒฝ์šฐ์—๋งŒ ํด๋ผ์ด์–ธํŠธ๋Š” ์ •์ƒ์ ์œผ๋กœ ์š”์ฒญ์„ ..

Spring Security ์ ์šฉ๊ธฐ (1) Spring Security๋ž€?

์ƒˆ๋กญ๊ฒŒ ํ”„๋กœ์ ํŠธ๋ฅผ ์‹œ์ž‘ํ•˜๋ฉด์„œ ์ ์šฉํ•ด๋ณด๊ณ  ์‹ถ์—ˆ๋˜ ๊ธฐ์ˆ  ์ค‘ ํ•˜๋‚˜์ธ Spring Security. ์–ด๋– ํ•œ ๊ธฐ์ˆ ์ด๋ฉฐ ์–ด๋– ํ•œ ์›๋ฆฌ๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ๋™์ž‘ํ•˜๋Š”์ง€, ๊ทธ๋ฆฌ๊ณ  ์‹ค์ œ ํ”„๋กœ์ ํŠธ์— ์ ์šฉํ•˜๋Š” ๊ฒƒ๊นŒ์ง€ ํ•˜๋‚˜ ํ•˜๋‚˜ ํฌ์ŠคํŒ…ํ•ด๋ณด๊ณ ์ž ํ•œ๋‹ค. ์ด๋ฒˆ ํฌ์ŠคํŒ…์€ Spring Security ์ ์šฉ๊ธฐ์˜ ์ฒซ ๋ฒˆ์งธ ํŒŒํŠธ, Spring Security๋ž€ ๋ฌด์—ˆ์ธ์ง€์— ๋Œ€ํ•ด ์ด์•ผ๊ธฐํ•ด๋ณด๊ณ ์ž ํ•œ๋‹ค. ๋ชฉ์ฐจ 1. Spring Security ๊ฐœ๋… 2. Spring Security ํŠน์ง• 3. Architecture ๐Ÿค Spring Security ๊ฐœ๋… Spring Security๋Š” ์ธ์ฆ, ๊ถŒํ•œ ๋ถ€์—ฌ ๋ฐ ์ผ๋ฐ˜์ ์ธ ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•˜๋Š” Spring ํ”„๋ ˆ์ž„์›Œํฌ์ด๋‹ค. ๊ฐœ๋ฐœ์„ ํ•  ๋•Œ ๊ธฐ๋Šฅ ๋ถ€๋ถ„์—์„œ ๊ฐ€์žฅ ๋จผ์ € ์ž‘์—…ํ•˜๋Š” ๋ถ€๋ถ„์ด ๋ฐ”๋กœ ํšŒ์›๊ฐ€์ž…, ๋กœ๊ทธ์ธ, ๋กœ๊ทธ์•„์›ƒ๊ณผ ..

Study/Java 2024. 4. 22. 22:25
SHA-256๋ฅผ ์‚ฌ์šฉํ•œ ๋ฌธ์ž์—ด ์•”ํ˜ธํ™” ์˜ˆ์ œ - Java

์ง€๋‚œ๋ฒˆ PKI ํฌ์ŠคํŒ…์—์„œ ์ด์–ด์ง€๋Š” ๋‚ด์šฉ์ž…๋‹ˆ๋‹ค. 2023.12.05 - [Study/๋ณด์•ˆ] - [์•”ํ˜ธํ™”] PKI(Public Key Infrastructure)์˜ ์ดํ•ด - (1) 2023.12.12 - [Study/๋ณด์•ˆ] - [์•”ํ˜ธํ™”] PKI(Public Key Infrastructure)์˜ ์ดํ•ด - (2) PKI, ์ธ์ฆ์„œ, ์ „์ž์„œ๋ช… PKI์˜ ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•ด ์„ค๋ช…ํ•˜๋ฉด์„œ ๋‹ค์–‘ํ•œ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ๋“ฑ์žฅํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฒˆ ํฌ์ŠคํŒ…์—์„œ๋Š” ๊ทธ ์ค‘ SHA-256์„ ์‚ฌ์šฉํ•œ ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•์„ Java๋กœ ์ง์ ‘ ๊ตฌํ˜„ํ•ด ๋ณด๋„๋ก ํ•˜๊ฒ ์Šต๋‹ˆ๋‹ค. ๋ณธ๋ก ์— ๋“ค์–ด๊ฐ€๊ธฐ์— ์•ž์„œ SHA-256 ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ๋ฌด์—‡์ธ์ง€ ๋‹ค์‹œ ์ƒ๊ธฐ์‹œํ‚ค๊ณ  ๋„˜์–ด๊ฐ€๊ฒ ์Šต๋‹ˆ๋‹ค. SHA(Secure Hash Algorithm) : ์•ˆ์ „ํ•œ ํ•ด์‹œ ์•Œ๊ณ ๋ฆฌ์ฆ˜ SHA ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด๋ž€ MD4 ํ•ด์ˆ˜..

Study/๋ณด์•ˆ 2023. 12. 14. 22:34