blob: 241493912c2910976a53e5113f3346a7e393765d [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.cxf.fediz.service.idp.kerberos;
import java.security.Principal;
import java.security.PrivilegedActionException;
import java.util.Set;
import javax.security.auth.Subject;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.login.LoginContext;
import javax.security.auth.login.LoginException;
import org.apache.wss4j.common.kerberos.KerberosServiceContext;
import org.apache.wss4j.common.kerberos.KerberosServiceExceptionAction;
/**
* Validate a Kerberos Token
*/
public class KerberosTokenValidator {
private static final org.slf4j.Logger LOG =
org.slf4j.LoggerFactory.getLogger(KerberosTokenValidator.class);
private String serviceName;
private CallbackHandler callbackHandler;
private String contextName;
private boolean usernameServiceNameForm;
private boolean spnego;
/**
* Get the JAAS Login context name to use.
* @return the JAAS Login context name to use
*/
public String getContextName() {
return contextName;
}
/**
* Set the JAAS Login context name to use.
* @param contextName the JAAS Login context name to use
*/
public void setContextName(String contextName) {
this.contextName = contextName;
}
/**
* Get the CallbackHandler to use with the LoginContext
* @return the CallbackHandler to use with the LoginContext
*/
public CallbackHandler getCallbackHandler() {
return callbackHandler;
}
/**
* Set the CallbackHandler to use with the LoginContext. It can be null.
* @param callbackHandler the CallbackHandler to use with the LoginContext
*/
public void setCallbackHandler(CallbackHandler callbackHandler) {
this.callbackHandler = callbackHandler;
}
/**
* The name of the service to use when contacting the KDC. This value can be null, in which
* case it defaults to the current principal name.
* @param serviceName the name of the service to use when contacting the KDC
*/
public void setServiceName(String serviceName) {
this.serviceName = serviceName;
}
/**
* Get the name of the service to use when contacting the KDC. This value can be null, in which
* case it defaults to the current principal name.
* @return the name of the service to use when contacting the KDC
*/
public String getServiceName() {
return serviceName;
}
public KerberosServiceContext validate(KerberosServiceRequestToken token)
throws LoginException, PrivilegedActionException {
if (LOG.isDebugEnabled()) {
try {
String jaasAuth = System.getProperty("java.security.auth.login.config");
String krbConf = System.getProperty("java.security.krb5.conf");
LOG.debug("KerberosTokenValidator - Using JAAS auth login file: {}", jaasAuth);
LOG.debug("KerberosTokenValidator - Using KRB conf file: {}", krbConf);
} catch (SecurityException ex) {
LOG.debug(ex.getMessage(), ex);
}
}
// Get a TGT from the KDC using JAAS
final LoginContext loginContext;
if (callbackHandler != null) {
loginContext = new LoginContext(getContextName(), callbackHandler);
} else {
loginContext = new LoginContext(getContextName());
}
loginContext.login();
LOG.debug("Successfully authenticated to the TGT");
// Get the service name to use - fall back on the principal
Subject subject = loginContext.getSubject();
String service = serviceName;
if (service == null) {
Set<Principal> principals = subject.getPrincipals();
if (principals.isEmpty()) {
LOG.debug("No Client principals found after login");
return null;
}
service = principals.iterator().next().getName();
}
// Validate the ticket
KerberosServiceExceptionAction action =
new KerberosServiceExceptionAction(token.getToken(), service,
isUsernameServiceNameForm(), spnego);
KerberosServiceContext krbServiceCtx = Subject.doAs(subject, action);
LOG.debug("Successfully validated a ticket");
return krbServiceCtx;
}
/**
* SPN can be configured to be in either <b>"hostbased"</b> or <b>"username"</b> form.<br/>
* - <b>"hostbased"</b> - specifies that the service principal name should be interpreted
* as a "host-based" name as specified in GSS API Rfc, section "4.1: Host-Based Service
* Name Form" - The service name, as it is specified in LDAP/AD, as it is listed in the
* KDC.<br/>
* - <b>"username"</b> - specifies that the service principal name should be interpreted
* as a "username" name as specified in GSS API Rfc, section "4.2: User Name Form"
* This is usually the client username in LDAP/AD used for authentication to the KDC.
*
* <br/><br/>Default is <b>"hostbased"</b>.
*
* @return the isUsernameServiceNameForm
*/
public boolean isUsernameServiceNameForm() {
return usernameServiceNameForm;
}
/**
* If true - sets the SPN form to "username"
* <br/>If false<b>(default)</b> - the SPN form is "hostbased"
*
* @see KerberosSecurity#retrieveServiceTicket(String, CallbackHandler, String, boolean)
*
* @param isUsernameServiceNameForm the isUsernameServiceNameForm to set
*/
public void setUsernameServiceNameForm(boolean isUsernameServiceNameForm) {
this.usernameServiceNameForm = isUsernameServiceNameForm;
}
public boolean isSpnego() {
return spnego;
}
public void setSpnego(boolean spnego) {
this.spnego = spnego;
}
}