Package org.jboss.web.tomcat.security.jaspi

Source Code of org.jboss.web.tomcat.security.jaspi.TomcatJASPIAuthenticator

/*
* JBoss, Home of Professional Open Source.
* Copyright 2008, Red Hat Middleware LLC, and individual contributors
* as indicated by the @author tags. See the copyright.txt file in the
* distribution for a full listing of individual contributors.
*
* This is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This software is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this software; if not, write to the Free
* Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA, or see the FSF site: http://www.fsf.org.
*/
package org.jboss.web.tomcat.security.jaspi;

import java.io.IOException;
import java.security.Principal;

import javax.security.auth.Subject;
import javax.security.auth.message.callback.CallerPrincipalCallback;
import javax.security.auth.message.callback.PasswordValidationCallback;
import javax.servlet.http.Cookie;

import org.apache.catalina.Session;
import org.apache.catalina.authenticator.AuthenticatorBase;
import org.apache.catalina.authenticator.Constants;
import org.apache.catalina.connector.Request;
import org.apache.catalina.connector.Response;
import org.apache.catalina.deploy.LoginConfig;
import org.jboss.logging.Logger;
import org.jboss.security.ServerAuthenticationManager;
import org.jboss.security.auth.message.GenericMessageInfo;
import org.jboss.security.plugins.auth.JASPIServerAuthenticationManager;

/**
* Tomcat authenticator that does JSR-196 (JASPI) authentication
* @author Anil.Saldhana@redhat.com
* @since Oct 7, 2008
*/
public class TomcatJASPIAuthenticator extends AuthenticatorBase
{
   private static Logger log = Logger.getLogger(TomcatJASPIAuthenticator.class);
  
   private String messageLayer = "HttpServlet";
  
   protected String serverAuthenticationManagerClass = JASPIServerAuthenticationManager.class.getName();
   @Override
   protected boolean authenticate(Request request, Response response, LoginConfig config) throws IOException
   {
      boolean result = false;
     
      String authMethod = config.getAuthMethod();

      // Have we already authenticated someone?
      Principal principal = request.getUserPrincipal();
      String ssoId = (String) request.getNote(Constants.REQ_SSOID_NOTE);
      if (principal != null) {
         log.trace("Already authenticated '" + principal.getName() + "'");
         // Associate the session with any existing SSO session
         if (ssoId != null)
            associate(ssoId, request.getSessionInternal(true));
         return (true);
      }

      if("BASIC".equalsIgnoreCase(authMethod) ||
            "FORM".equalsIgnoreCase(authMethod) )
      {
         // Is there an SSO session against which we can try to reauthenticate?
         if (ssoId != null) {
            log.trace("SSO Id " + ssoId + " set; attempting " +
               "reauthentication");
            /* Try to reauthenticate using data cached by SSO.  If this fails,
                either the original SSO logon was of DIGEST or SSL (which
                we can't reauthenticate ourselves because there is no
                cached username and password), or the realm denied
                the user's reauthentication for some reason.
                In either case we have to prompt the user for a logon */
            if (reauthenticateFromSSO(ssoId, request))
               return true;
         }
      }     

      GenericMessageInfo messageInfo = new GenericMessageInfo();
      messageInfo.setRequestMessage(request);
      messageInfo.setResponseMessage(response);
     
      //Put bits of information needed by tomcat server auth modules
      messageInfo.getMap().put("CACHE", cache);
     
      TomcatJASPICallbackHandler cbh = new TomcatJASPICallbackHandler();
     
      ServerAuthenticationManager sam = getServerAuthenticationManager();
      if(sam != null)
      {
         result = sam.isValid(messageInfo, new Subject(), messageLayer, cbh);
      }
     
      //The Authentication process has been a success. We need to register
      //the principal, username, password with the container
      if(result)
      {
         PasswordValidationCallback pvc = cbh.getPasswordValidationCallback();
         CallerPrincipalCallback cpcb = cbh.getCallerPrincipalCallback();
         this.register(request, response, cpcb.getPrincipal(), authMethod,
               pvc.getUsername(), new String(pvc.getPassword()));
      }
     
      return result;
   }

   /**
    * Get the FQN of the class that implements
    * the org.jboss.security.ServerAuthenticationManager intepasswordrface
    * @return
    */
   public String getServerAuthenticationManagerClass()
   {
      return serverAuthenticationManagerClass;
   }

   /**
    * Set the FQN of the class that implements
    * the org.jboss.security.ServerAuthenticationManager interface
    * @param serverAuthenticationManagerClass
    */
   public void setServerAuthenticationManagerClass(String serverAuthenticationManagerClass)
   {
      this.serverAuthenticationManagerClass = serverAuthenticationManagerClass;
   }
  
   protected ServerAuthenticationManager getServerAuthenticationManager()
   {
      ServerAuthenticationManager sam = null;
      Class<?> clazz;
      try
      {
         clazz = SecurityActions.loadClass(serverAuthenticationManagerClass);
         sam = (ServerAuthenticationManager) clazz.newInstance();
      }
      catch (Exception e)
      {
         log.error("Exception in obtaining ServerAuthenticationManager:", e);
      }
     
      return sam;
   }
  
   /**
    * Register an authenticated Principal and authentication type in our
    * request, in the current session (if there is one), and with our
    * SingleSignOn valve, if there is one.  Set the appropriate cookie
    * to be returned.
    *
    * @param request The servlet request we are processing
    * @param response The servlet response we are generating
    * @param principal The authenticated Principal to be registered
    * @param authType The authentication type to be registered
    * @param username Username used to authenticate (if any)
    * @param password Password used to authenticate (if any)
    */
   protected void register(Request request, Response response,
                           Principal principal, String authType,
                           String username, String password) {

       if (log.isTraceEnabled()) {
           // Bugzilla 39255: http://issues.apache.org/bugzilla/show_bug.cgi?id=39255
           String name = (principal == null) ? "none" : principal.getName();
           log.trace("Authenticated '" + name + "' with type '"
               + authType + "'");
       }

       // Cache the authentication information in our request
       request.setAuthType(authType);
       request.setUserPrincipal(principal);

       Session session = request.getSessionInternal(false);
       // Cache the authentication information in our session, if any
       if (cache) {
           if (session != null) {
               session.setAuthType(authType);
               session.setPrincipal(principal);
               if (username != null)
                   session.setNote(Constants.SESS_USERNAME_NOTE, username);
               else
                   session.removeNote(Constants.SESS_USERNAME_NOTE);
               if (password != null)
                   session.setNote(Constants.SESS_PASSWORD_NOTE, password);
               else
                   session.removeNote(Constants.SESS_PASSWORD_NOTE);
           }
       }

       // Construct a cookie to be returned to the client
       if (sso == null)
           return;

       // Only create a new SSO entry if the SSO did not already set a note
       // for an existing entry (as it would do with subsequent requests
       // for DIGEST and SSL authenticated contexts)
       String ssoId = (String) request.getNote(Constants.REQ_SSOID_NOTE);
       if (ssoId == null) {
           // Construct a cookie to be returned to the client
           ssoId = generateSessionId();
           Cookie cookie = new Cookie(Constants.SINGLE_SIGN_ON_COOKIE, ssoId);
           cookie.setMaxAge(-1);
           cookie.setPath("/");
          
           // Bugzilla 41217
           cookie.setSecure(request.isSecure());
          
           // Bugzilla 34724
           String ssoDomain = sso.getCookieDomain();
           if(ssoDomain != null) {
               cookie.setDomain(ssoDomain);
           }

           response.addCookie(cookie);

           // Register this principal with our SSO valve
           sso.register(ssoId, principal, authType, username, password);
           request.setNote(Constants.REQ_SSOID_NOTE, ssoId);

       } else {
           // Update the SSO session with the latest authentication data
           sso.update(ssoId, principal, authType, username, password);
       }

       // Fix for Bug 10040
       // Always associate a session with a new SSO reqistration.
       // SSO entries are only removed from the SSO registry map when
       // associated sessions are destroyed; if a new SSO entry is created
       // above for this request and the user never revisits the context, the
       // SSO entry will never be cleared if we don't associate the session
       if (session == null)
           session = request.getSessionInternal(true);
       sso.associate(ssoId, session);
   }
}
TOP

Related Classes of org.jboss.web.tomcat.security.jaspi.TomcatJASPIAuthenticator

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.