Tag Archives: Spring Roo

Exploring Google and OpenID login with Spring Security and Spring Roo

18 Jan


OpenID is an open framework for decentralized user authentication, allowing users to manage their online identity through a single trusted provider. Websites supporting OpenID login allow users to login with the same credentials as this OpenID Provider. In this tutorial we will explore Spring Security’s OpenID support, and use Spring Roo to build a simple application allowing users to login using their Google or other OpenID account.

In order to be able to test OpenID login, you will simply need your Google account. Google’s implementation is however slightly different to many of the other providers, so in order to test more generic OpenID login, you may also want to sign up for your own OpenID from one of the available providers.

Just want to run it?

Download and unzip the project, run mvn tomcat:run from a terminal, and open up a browser to http://localhost:8080/openidlogin


Apache Maven 2.2.1 (download)
Spring Roo 1.1.0.RELEASE (download)
Spring Security OpenID 3.0.5.RELEASE (will be downloaded by Maven)
openid4java 0.9.5 (will be downloaded by Maven)

Setting up the Roo project

We will setup the project using Spring Roo’s scripting functionality. Included in the attached project is the script file script.roo. The commands contained in this file are exactly the same as those you would type into the Roo shell. To run the script, open up a Roo shell and type script –file script.roo

The script:

  • creates a Roo project with a structure following the standard Maven conventions
  • adds the additional dependencies required for OpenID login (Spring Security OpenID, openid4java) to the Maven project object model (POM)
  • installs a JPA persistence provider
  • adds the domain model objects (UserRole, EmployeeStatus and Employee)
  • creates the Spring MVC web frontend
  • configures Spring Security
  • and adds two java classes which we will later expand (InsertTestData and OpenIdUserDetailsService).
# Project
project --topLevelPackage za.co.bsg.rnd.trf.openidlogin

# Persistence
persistence setup --provider HIBERNATE --database HYPERSONIC_IN_MEMORY --databaseName openidlogin --hostName localhost

# Dependencies
dependency add --groupId org.springframework.security --artifactId spring-security-openid --version 3.0.5.RELEASE
dependency add --groupId org.openid4java --artifactId openid4java --version 0.9.5

# Domain model
enum type --class ~.domain.UserRole
enum constant --name ROLE_ADMIN
enum constant --name ROLE_USER

enum type --class ~.domain.EmployeeStatus
enum constant --name ACTIVE
enum constant --name DORMANT
enum constant --name RESIGNED
enum constant --name TERMINATED

entity --class ~.domain.Employee --table employee --identifierColumn employee_id
field string --fieldName username --column username --notNull
field string --fieldName password --column password --notNull
field enum --type ~.domain.UserRole --fieldName userRole --notNull --enumType STRING
field string --fieldName openIdIdentifier --column openid_identifier
field string --fieldName firstName --column first_name
field string --fieldName lastName --column last_name
field string --fieldName emailAddress --column email_address
field enum --type ~.domain.EmployeeStatus --fieldName status --notNull --enumType STRING

# We will also need a finder
finder add --finderName findEmployeesByOpenIdIdentifier --class ~.domain.Employee

# Scaffold the web frontend
controller all --package ~.web

# Spring Security
security setup

# Other classes
class --class ~.InsertTestData
class --class ~.OpenIdUserDetailsService


Testing the Roo generated code

At this stage we are able to test the Roo generated code. To do so, run mvn tomcat:run in a terminal and open up a browser to http://localhost:8080/openidlogin

In addition to configuring Spring security in applicationContext-security.xml, the Roo command security setup has also added an in-memory user-service with two example users. We may login with one of these users by browsing to http://localhost:8080/openidlogin/login (username “admin”, with a password of “admin”).

Test data (optional)

This InsertTestData class would normally be added to the test package and used to provide data for integration tests. As this application uses an in-memory database, it is convenient to use the same method to populate the database with basic data on each run.

public class InsertTestData implements
                    ApplicationListener {

    public static final String PASSWORD = "password";

    public void onApplicationEvent(ContextRefreshedEvent event) {

    @Transactional(propagation = Propagation.REQUIRES_NEW)
    private void init() {
        if (!Employee.findAllEmployees().isEmpty()) {
            // don't do anything if there is data in the db

        Employee employeeAdminActive = new Employee();

        Employee employee2 = new Employee();

        Employee employee3 = new Employee();


The status of user with username user3 has been set to RESIGNED. We will use this user to test that disabled users are not able to login, and receive an error message when attempting to do so:

Your login attempt was not successful, try again. Reason: User is disabled .

Securing the application

At this point the application does not require a user to login in order to access any of its contents. For this example, we will assume that a user must login in order to access any pages other than the home and login pages. To achieve this, we may update the HTTP security configurations intercept-url elements in applicationContext-security.xml:

<intercept-url pattern="/**" access="isAuthenticated()" />


The home and login pages still need to be accessible to all users though, so we add a further two intercept-url elements before the “catch-all” property above:

<intercept-url pattern="/" access="permitAll" />
<intercept-url pattern="/login/**" access="permitAll" />


JDBC based UserDetailsService

As previously mentioned, be default Roo adds an in-memory user-service, which is useful for testing purposes, however in reality user details are usually stored in a database. To achieve this, we may configure a JDBC based UserDetailsService by replacing the in-memory UserDetailsService (<user-service>). Convention over configuration assumes the database is structured as show below.


In this case, however, the employee table will hold the user details required, and we may simplify the schema by adding the user’s single authority (role) directly to the user (employee) table. This means that we also need to override the default queries that JdbcDaoImpl (the JDBC-based implementation of the UserDetailsService interface) uses.

                            U.status = 'ACTIVE'
                            employee U
                            U.user_role as authority
                            employee U
                            U.username=?" />


For simplicity we will remove the <password-encoder> element and use pain text passwords.

Running the application, we can now login using the credentials of one of the persisted users created in InsertTestData (e.g. user1, password)

Employees as Spring Security Users

As employees are the users in this application, we may wish to have the Employee class implement the Spring Security UserDetails interface. To do so, we must implement a few getter methods in Employee.java

        identifierColumn = "employee_id",
        table = "employee",
        finders = { "findEmployeesByOpenIdIdentifier" })
public class Employee implements UserDetails {

. . .

public String getUsername() {
    return this.username;

public String getPassword() {
    return this.password;

public boolean isAccountNonExpired() {
    return true;

public boolean isAccountNonLocked() {
    return true;

public boolean isCredentialsNonExpired() {
    return true;

public boolean isEnabled() {
    return this.status == EmployeeStatus.ACTIVE;

public Collection getAuthorities() {
    Collection grantedAuthorities = new HashSet();
            new GrantedAuthorityImpl(this.userRole.name()));
    return grantedAuthorities;

. . .

The getUsername() and getPassword() methods will conflict with those implemented in Employee_Roo_JavaBean.aj. If running, Roo will automatically correct this. If not, you may simply remove the methods from Employee_Roo_JavaBean.aj manually.

OpenID UserDetailsService

In order to provide the authentication-manager with a user based on an employee’s openIdIdentifier rather than username, we implement a custom service for loading user details. This will be used when authenticating OpenID logins instead of the JDBC based UserDetailsService previously configured, which will still be used for non-openid based logins.

public class OpenIdUserDetailsService implements UserDetailsService {
    public UserDetails loadUserByUsername(String openIdIdentifier) {
        List employeeList =
        Employee employee = employeeList.size() == 0 ? null : employeeList.get(0);
        if (employee == null) {
            throw new UsernameNotFoundException("User not found for OpenID: " + openIdIdentifier);
        } else {
            if (!employee .isEnabled()) {
                throw new DisabledException("User is disabled");
            return employee;

Having implemented the UserDetails interface, we are now able to return Employee objects in the loadUserByUsername() method. A UserDetailsService should only be used to lookup the user and not perform any sort of validation, however in this example application it was is convenient place to check if the employee had been disabled.

Configuring OpenID login

Configuring OpenID login is now simply achieved by adding an <openid-login> element to the HTTP security configurations in applicationContext-security.xml:

. . .
<intercept-url pattern="/**" access="isAuthenticated()" />
<openid-login authentication-failure-url="/login?login_error=t" user-service-ref="openIdUserService" />
. . .


We must also configure the OpenIdUserDetailsService bean referenced by the <openid-login> element’s user-service-ref property. We will add this after the </authentication-manager> closing tag:

. . .
<beans:bean id="openIdUserService" class="za.co.bsg.rnd.trf.openidlogin.OpenIdUserDetailsService" />
. . .


Updating the login screen

We may now add the markup for the additional login methods to the login screen (login.jspx). We will place it just after the existing </util:panel> closing tag:

  . . .
<spring:message code="button_reset" var="reset_label" />
        <input id="reset" type="reset" value="${fn:escapeXml(reset_label)}" />

  <spring:url value="/j_spring_openid_security_check" var="form_url_openid" />
  <spring:url var="google" value="/resources/images/google-account-logo.png" />
  <spring:url var="openid" value="/resources/images/openid-logo.png" />

  <util:panel id="title_google" title="Google Login" >
    <img src="${google}" style="float:right" />
    <p style="height:0.25em"/>
    <form action="${fn:escapeXml(form_url_openid)}" method="post">
        <input name="openid_identifier" size="50"
               maxlength="100" type="hidden"
        <div class="submit">
           <input id="proceed_google" type="submit" value="Sign in with Google" />

  <util:panel id="title_openid" title="OpenID Login" >
    <a href="http://openid.net/get-an-openid/" target="_blank" title="Where do I get one?">
        <img src="${openid}" style="float:right" />
    <form action="${fn:escapeXml(form_url_openid)}" method="post">
            <label for="openid_identifier">OpenID</label>
            <input id="openid_identifier" name="openid_identifier" type="text" style="width:150px" />
        <div class="submit">
            <input id="proceed_openid" type="submit" value="${fn:escapeXml(submit_label)}" />
  . . .


Google login

When logging in with Google, the user is not required to provide an OpenID identifier/URL. The reason for this is that Google’s implementation of OpenID is slightly different to that of most providers. Rather than assign user-friendly OpenID identifiers to users, Google expects that websites allowing OpenID login through Google will use the Google canonical OpenID provider URL (http://www.google.com/accounts/o8/id), and users will provide their credentials directly to Google. To make this simpler for the user , websites commonly provide a Sign in with Google button, which hides and invokes the Google OpenID provider. This will redirect the user to to Google, and thereafter once logged into their account, the user is warned that they are signing into another site:

Google Login

When attempting to login with Google for the first time, the user’s unique identifier will be returned, but has not yet been registered with the site, resulting in the error message:

Your login attempt was not successful, try again. Reason: User not found for OpenID: https://www.google.com/accounts/o8/id?id=AItOawm4b0mXXXXXXXXXXXXXXX3bGCztybYUwWQ .

The identifier returned is unique to the user for this applications domain only (i.e. it will be different for the same user for another application with a different domain). Copy this identifier, login using a users username and password, and edit an employee saving the identifier in the employee’s openIdIdentifier field. Finally, logout and try to login again using the same Google account.


Spring Roo is extremely well suited to R&D work, providing a quick means of setting up a project to explore OpenID login using Spring Security. Providing OpenID login may provide users with a useful alternative means of authenticating with your site and is simple to implement.

Further research posibilities

  • OpenID Attribute Exchange (AX) – is an extension for OpenID service which allows the transfer of various user related details/information/attributes between the relying party and the identity provider. Spring Security supports this directly.
  • OpenID user registration (no username and password stored in the application) – currently the application requires that a user already be registered before associating an OpenID with their account. A useful extension would be to enable users to register using their OpenID, and not maintain a username and password on the application.
  • Facebook authentication – Facebook is an OpenID relying party rather than a provider, however Facebook Connect may be used to allow users to use their Facebook identity to login to other sites. See also the Facebook developer documentation
  • OAuth vs OpenID – While OpenID is used by an application to authenticate its users, OAuth, a complimentary open standard to OpenID, may be used by an application to request permission from another application to share a user’s private resources (e.g. photos, videos, contact lists) without the user having to share their username and password (wikipedia).


Spring Roo – JEE’s own command line Visual Studio

1 Dec

Testing testing does this thing work? My first blog entry on BSG Dev 🙂

So what is this Spring Roo hype all about?

Last night decided to download Spring Roo and be cool like all the other kids. So while it download read up on Spring Roo Introduction. In summary:

  1. Spring Roo is a tool that helps rapidly building Java enterprise applications by generating the plumbing code such as data base connection.
  2. As a Java developer you should use it because:
    1. It increases your productivity by enabling you build Java enterprise applications in a best-practice manner within minutes.
    2. It uses standard Java technologies that are used in enterprise Java projects such as Spring Framework, Hibernate JPA implementation and GWT.
    3. It adds the technologies incrementally. e.g. Java Persistence API is only added when you request it.
    4. It allows you to choose which implementation of an API to use. You could choose to use GWT or Spring MVC and you can also choose which database your application will use.
    5. It is easy to use and learn. There is a TAB for auto completion and hint command that suggests what you might want to do.
    6. It only adds used dependencies to your project thus reducing size of deployed war / jar file.
    7. It uses annotation-based dependency injection, and automatically providing dependency injection on entities. This reduces xml and Java files to maintain.
    8. It is easy to remove.
    9. You could create a simple GWT application that saves data to database in 10 minutes!


In order to install Roo you need the following technologies installed on your machine:

  1. Maven
  2. Java 5 / 6

10 Minutes GWT Application Test

Assuming that you have Roo installed the following commands would get you a GWT application that Stores contacts names and phone numbers in a mysql database.

  1. Create contacts database in mysql:
    1. mysql -u<<username>> -p<<password>>
    2. create database <<databaseName>>
    3. exit
  2. Create project directory:
    1. mkdir ten-minute-gwt
    2. cd ten-minute-gwt
  3. Use Roo to create the gwt project:
    1. roo
    2. project –topLevelPackage za.co.bsg.tenminute
    3. persistence setup –provider HIBERNATE –database MYSQL –userName <<username>> –password <<password> –databaseName <<databaseName>>
    4. entity –class ~.model.Contact
    5. field string –fieldName name –column nme –notNull
    6. field string –fieldName telephone –column telephone –notNull
    7. gwt setup
    8. exit
  4. Use maven to run application:
    1. mvn gwt:run
  5. Click launch in default browser to see  application.


There are other plumbing features of Roo that still need testing namely:

  1. SMTP
  2. Security
  3. JMS


  1. http://static.springsource.org/spring-roo/reference/html/index.html
  2. http://www.bytespring.com/blog/spring-roo-integration-gwt