Security overview

Red Hat build of Quarkus 3.27

Red Hat Customer Content Services

Abstract

Quarkus Security provides a complete framework for Java application security, incorporating diverse authentication methods, role-based access control (RBAC), and features like SSL/TLS. This guide covers its main functionalities, setup, and testing, targeting developers integrating security into Quarkus applications.

Chapter 1. Quarkus Security overview

Quarkus Security is a framework that provides the architecture, multiple authentication and authorization mechanisms, and other tools to build secure and production-quality Java applications.

Before building security into your Quarkus applications, learn about the Quarkus Security architecture and the different authentication mechanisms and features you can use.

1.1. Key features of Quarkus Security

The Quarkus Security framework provides built-in security authentication mechanisms for Basic, Form-based, and mutual TLS (mTLS) authentication. You can also use other well-known authentication mechanisms, such as OpenID Connect (OIDC). Authentication mechanisms depend on Identity providers to verify the authentication credentials and map them to a SecurityIdentity instance with the username, roles, original authentication credentials, and other attributes.

Quarkus also includes built-in security to allow for role-based access control (RBAC) based on the common security annotations @RolesAllowed, @DenyAll, @PermitAll on REST endpoints, and Contexts and Dependency Injection (CDI) beans. For more information, see the Quarkus Authorization of web endpoints guide.

Quarkus Security also supports the following features:

Quarkus Security is also highly customizable. For more information, see the Quarkus Content from quarkus.io is not included.Security tips and tricks guide.

1.2. Getting started with Quarkus Security

To get started with security in Quarkus, consider securing your Quarkus application endpoints with the built-in Quarkus Basic authentication and the Jakarta Persistence identity provider and enabling role-based access control.

Complete the steps in the Getting started with Security by using Basic authentication and Jakarta Persistence tutorial.

After successfully securing your Quarkus application with Basic authentication, you can increase the security further by adding more advanced authentication mechanisms, for example, the Quarkus OpenID Connect (OIDC) authorization code flow mechanism guide.

1.3. Quarkus Security testing

For guidance on testing Quarkus Security features and ensuring that your Quarkus applications are securely protected, see the Content from quarkus.io is not included.Security testing guide.

1.4. More about security features in Quarkus

1.4.1. WebSockets Next security

The quarkus-websockets-next extension provides a modern, efficient implementation of the WebSocket API. It also provides an integration with Quarkus security. For more information, see the Content from quarkus.io is not included.Security section of the Quarkus "WebSockets Next reference" guide.

1.4.2. Cross-origin resource sharing

To make your Quarkus application accessible to another application running on a different domain, you need to configure cross-origin resource sharing (CORS). For more information about the CORS filter Quarkus provides, see the CORS filter section of the Quarkus "Cross-origin resource sharing" guide.

1.4.3. Cross-Site Request Forgery (CSRF) prevention

Quarkus Security provides a Quarkus REST (formerly RESTEasy Reactive) filter that can protect your applications against a Content from owasp.org is not included.Cross-Site Request Forgery attack. For more information, see the Quarkus Content from quarkus.io is not included.Cross-Site Request Forgery Prevention guide.

1.4.4. SameSite cookies

You can add a Content from developer.mozilla.org is not included.SameSite cookie property to any of the cookies set by a Quarkus endpoint. For more information, see the Content from quarkus.io is not included.SameSite cookies section of the Quarkus "HTTP reference" guide.

1.4.5. Secrets engines

You can use secrets engines with Quarkus to store, generate, or encrypt data.

Quarkus provides additional extensions in Quarkiverse for securely storing credentials, for example, Content from docs.quarkiverse.io is not included.Quarkus and HashiCorp Vault.

1.5. Secrets in environment properties

Quarkus provides support to store secrets in environment properties. For more information, see the Quarkus Content from quarkus.io is not included.store secrets in an environment properties file guide.

1.5.1. Secure serialization

If your Quarkus Security architecture includes Quarkus REST (formerly RESTEasy Reactive) and Jackson, Quarkus can limit the fields included in JSON serialization based on the configured security. For more information, see the Content from quarkus.io is not included.JSON serialization section of the Quarkus “Writing REST services with Quarkus REST (formerly RESTEasy Reactive)” guide.

1.5.2. Secure auto-generated resources by REST Data with Panache

If you use the REST Data with Panache extension to auto-generate your resources, you can still use security annotations within the package jakarta.annotation.security. For more information, see the Content from quarkus.io is not included.Securing endpoints section of the Quarkus "Generating Jakarta REST resources with Panache" guide.

1.6. Security vulnerability detection

Most Quarkus tags get reported in the US Content from nvd.nist.gov is not included.National Vulnerability Database (NVD). For information about security vulnerabilities, see the Content from quarkus.io is not included.Security vulnerability detection and reporting in Quarkus guide.

1.7. References

Legal Notice

Copyright © Red Hat.
Except as otherwise noted below, the text of and illustrations in this documentation are licensed by Red Hat under the Creative Commons Attribution–Share Alike 3.0 Unported license . If you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, the Red Hat logo, JBoss, Hibernate, and RHCE are trademarks or registered trademarks of Red Hat, LLC. or its subsidiaries in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
XFS is a trademark or registered trademark of Hewlett Packard Enterprise Development LP or its subsidiaries in the United States and other countries.
The OpenStack® Word Mark and OpenStack logo are trademarks or registered trademarks of the Linux Foundation, used under license.
All other trademarks are the property of their respective owners.