Implementing Spring Security 6 with Redis to Avoid Clearing HTTP Sessions

JackyNote ⭐️
4 min readApr 13, 2024


In web applications, HTTP sessions are commonly used to store user-specific data and maintain state between requests. By default, these sessions are stored in the server’s memory, which means that if the server restarts, all session data is lost, and users are logged out of the application.

To address this issue, Spring Security 6 provides an option to store HTTP sessions in Redis, a popular in-memory data store. By using Redis to store session data, users can maintain their sessions even after a server restart, providing a seamless user experience.

Here’s a step-by-step guide to implementing Spring Security 6 with Redis for HTTP session management:

1. Add Dependencies

First, you need to add the required dependencies to your project:

  • spring-boot-starter-data-redis: Provides Redis integration for Spring Boot applications.
  • spring-session-data-redis: Enables Spring Session's Redis support for storing HTTP sessions.

2. Configure Redis Connection

Next, configure the Redis connection details in your application properties file ( or application.yml):
# spring.redis.password=YOUR_REDIS_PASSWORD (if needed)

Replace the host and port values with the appropriate Redis server details. If your Redis instance requires authentication, uncomment and set the spring.redis.password property.

3. Enable Redis HTTP Session

Create a @Configuration class and enable Spring Session's Redis support by adding the @EnableRedisHttpSession annotation:

import org.springframework.context.annotation.Configuration;

public class SessionConfig {
// Additional configurations, if needed

By default, Spring Session will use the Redis connection details configured in the previous step.

4. Configure Spring Security

In your Spring Security configuration, set the sessionManagementConfigurer to use the HttpSessionSessionStrategy:

import org.springframework.context.annotation.Bean;

public class SecurityConfig {
public SessionAuthenticationStrategy sessionAuthenticationStrategy() {
return new HttpSessionSessionStrategy();
public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
// Other session management configurations...
// Other security configurations...

By using the HttpSessionSessionStrategy, Spring Security will store session data in the configured Redis instance.

5. Updating Principal (User) Details

In some cases, you may need to update the principal (user) details in the security context after the user’s information has been modified. Spring Security 6 provides a SessionAuthenticationStrategy interface to handle this scenario.

Here’s an example of how to update the principal using the SessionAuthenticationStrategy:

import org.springframework.beans.factory.annotation.Autowired;

public class PrincipalUpdater {

private SessionAuthenticationStrategy sessionAuthenticationStrategy;

public void updatePrincipal(User updatedUser) {
Authentication currentAuth = SecurityContextHolder.getContext().getAuthentication();

// Create a new Authentication object with the updated principal
Authentication newAuth = new UsernamePasswordAuthenticationToken(

// Update the Authentication object in the SecurityContextHolder
sessionAuthenticationStrategy.onAuthentication(newAuth, null, null);

In this example, the PrincipalUpdater component injects the SessionAuthenticationStrategy and provides a method updatePrincipal that creates a new Authentication object with the updated principal (user) details. The onAuthentication method of the SessionAuthenticationStrategy is then called to update the SecurityContextHolder with the new Authentication object.

Note that updating the SecurityContextHolder should be done carefully, as it can have security implications if not handled properly. Ensure proper access control and validation checks are in place before updating the principal.

6. Restart the Server

After completing the above configurations, restart your application server. When the server restarts, the session data stored in Redis will remain intact, and users will not be logged out or lose their session information.

Additional Considerations

  • Secured Redis Connection: If your Redis instance is not secured, it’s recommended to configure Redis with authentication and secure the connection using SSL/TLS or other security measures.
  • Redis Cluster and Sentinel Support: Spring Session supports Redis Cluster and Redis Sentinel configurations for high availability and failover. Refer to the Spring Session documentation for more details on configuring these features.
  • Session Expiration and Cleanup: By default, Spring Session will handle session expiration and cleanup based on the configured session timeout. However, you can customize the session expiration and cleanup policies if needed.
  • Serialization and Deserialization: Spring Session uses Java serialization by default to store session data in Redis. If you encounter issues with serialization or prefer a different serialization strategy, you can configure a custom serializer/deserializer.

By implementing Spring Security 6 with Redis for HTTP session management, you can ensure that users maintain their sessions even after a server restart, providing a seamless user experience and improving the overall reliability of your web application.



JackyNote ⭐️

🚀 Software Engineer | Full Stack Java 7 Years of Experience | Tech Enthusiast | Startup Lover | Coffee