com.authlete.common.dto.AuthorizationResponse Maven / Gradle / Ivy
Show all versions of authlete-java-common Show documentation
/*
* Copyright (C) 2014-2018 Authlete, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.authlete.common.dto;
import com.authlete.common.types.Display;
import com.authlete.common.types.Prompt;
import com.authlete.common.util.Utils;
/**
* Response from Authlete's {@code /auth/authorization} API.
*
*
* Note: In the description below, "authorization server"
* is always used even where "OpenID provider" should be
* used.
*
*
*
* Authlete's {@code /auth/authorization} API returns
* JSON which can be mapped to this class. The authorization server
* implementation should retrieve the value of {@code "action"} from
* the response and take the following steps according to the value.
*
*
*
* - {@link Action#INTERNAL_SERVER_ERROR INTERNAL_SERVER_ERROR}
* -
*
* When the value of {@code "action"} is {@code "INTERNAL_SERVER_ERROR"},
* it means that the request from the authorization server implementation
* was wrong or that an error occurred in Authlete.
*
*
*
* In either case, from the viewpoint of the client application, it
* is an error on the server side. Therefore, the authorization server
* implementation should generate a response to the client application
* with the HTTP status of {@code "500 Internal Server Error"}. Authlete
* recommends {@code "application/json"} as the content type although
* OAuth 2.0 specification does not mention the format of the error
* response when the redirect URI is not usable.
*
*
*
* {@link #getResponseContent()} returns a JSON string which describes
* the error, so it can be used as the entity body of the response.
*
*
*
* The following illustrates the response which the authorization server
* implementation should generate and return to the client application.
*
*
*
* HTTP/1.1 500 Internal Server Error
* Content-Type: application/json
* Cache-Control: no-store
* Pragma: no-cache
*
* (The value returned from {@link #getResponseContent()})
*
*
* - {@link Action#BAD_REQUEST BAD_REQUEST}
* -
*
* When the value of {@code "action"} is {@code "BAD_REQUEST"}, it means
* that the request from the client application is invalid.
*
*
*
* The HTTP status of the response returned to the client application should
* be {@code "400 Bad Request"} and Authlete recommends {@code
* "application/json"} as the content type although OAuth 2.0 specification
* does not mention the format of the error response when the redirect URI
* is not usable.
*
*
*
* {@link #getResponseContent()} returns a JSON string which describes the error,
* so it can be used as the entity body of the response.
*
*
*
* The following illustrates the response which the authorization server
* implementation should generate and return to the client application.
*
*
*
* HTTP/1.1 400 Bad Request
* Content-Type: application/json
* Cache-Control: no-store
* Pragma: no-cache
*
* (The value returned from {@link #getResponseContent()})
*
*
*
* - {@link Action#LOCATION LOCATION}
* -
*
* When the value of {@code "action"} is {@code "LOCATION"}, it means
* that the request from the client application is invalid but the
* redirect URI to which the error should be reported has been determined.
*
*
*
* The HTTP status of the response returned to the client application should
* be {@code "302 Found"} and {@code "Location"} header must have a redirect
* URI with the {@code "error"} parameter.
*
*
*
* {@link #getResponseContent()} returns the redirect URI which has the {@code
* "error"} parameter, so it can be used as the value of {@code "Location"}
* header.
*
*
*
* The following illustrates the response which the authorization server
* implementation should generate and return to the client application.
*
*
*
* HTTP/1.1 302 Found
* Location: (The value returned from {@link #getResponseContent()})
* Cache-Control: no-store
* Pragma: no-cache
*
*
*
* - {@link Action#FORM FORM}
* -
*
* When the value of {@code "action"} is {@code "FORM"}, it means
* that the request from the client application is invalid but the
* redirect URI to which the error should be reported has been determined,
* and that the request contains {@code response_mode=form_post} as is
* defined in "OAuth 2.0 Form Post Response Mode".
*
*
*
* The HTTP status of the response returned to the client application should
* be {@code "200 OK"} and the content type should be {@code
* "text/html;charset=UTF-8"}.
*
*
*
* {@link #getResponseContent()} returns an HTML which satisfies the requirements
* of {@code response_mode=form_post}, so it can be used as the entity body
* of the response.
*
*
*
* The following illustrates the response which the authorization server
* implementation should generate and return to the client application.
*
*
*
* HTTP/1.1 200 OK
* Content-Type: text/html;charset=UTF-8
* Cache-Control: no-store
* Pragma: no-cache
*
* (The value returned from {@link #getResponseContent()})
*
*
*
* - {@link Action#NO_INTERACTION NO_INTERACTION}
* -
*
* When the value of {@code "action"} is {@code "NO_INTERACTION"}, it means
* that the request from the client application has no problem and requires
* the authorization server to process the request without displaying any
* user interface for authentication and/or consent. This happens when the
* request contains {@code prompt=none}.
*
*
*
* The authorization server implementation must follow the following steps.
*
*
*
*
* -
*
[END-USER AUTHENTICATION]
* Check whether an end-user has already logged in. If an end-user has
* logged in, go to the next step ([MAX_AGE]). Otherwise, call Authlete's
* {@code /auth/authorization/fail} API with {@code reason=}{@link
* AuthorizationFailRequest.Reason#NOT_LOGGED_IN NOT_LOGGED_IN} and use
* the response from the API to generate a response to the client
* application.
*
*
*
* -
*
[MAX_AGE]
* Get the value of the max age by {@link #getMaxAge()} method. The value
* represents the maximum authentication age which has come from {@code
* "max_age"} request parameter or {@code "default_max_age"} configuration
* parameter of the client application. If the value is 0, go to the next
* step ([SUBJECT]). Otherwise, follow the sub steps described below.
*
*
*
* -
*
* Get the time at which the end-user was authenticated. Note that
* this value is not managed by Authlete, meaning that it is expected
* that the authorization server implementation manages the value.
* If the authorization server implementation does not manage
* authentication time of end-users, call Authlete's {@code
* /auth/authorization/fail} API with {@code reason=}{@link
* AuthorizationFailRequest.Reason#MAX_AGE_NOT_SUPPORTED
* MAX_AGE_NOT_SUPPORTED} and use the response from the API to
* generate a response to the client application.
*
*
* -
*
* Add the value of the maximum authentication age (which is represented
* in seconds) to the authentication time.
*
*
* -
*
* Check whether the calculated value is equal to or greater than the
* current time. If this condition is satisfied, go to the next step
* ([SUBJECT]).
* Otherwise, call Authlete's {@code /auth/authorization/fail} API with
* {@code reason=}{@link AuthorizationFailRequest.Reason#EXCEEDS_MAX_AGE
* EXCEEDS_MAX_AGE} and use the response from the API to generate a
* response to the client application.
*
*
*
*
* -
*
[SUBJECT]
* Get the value of the requested subject by {@link #getSubject()} method.
* The value represents an end-user who the client application expects to
* grant authorization. If the value is {@code null}, go to the next step
* ([ACRs]). Otherwise, follow the sub steps described below.
*
*
*
* -
*
* Compare the value of the requested subject to the subject (= unique
* user ID) of the current end-user.
*
*
* -
*
* If they are equal, go to the next step ([ACRs]).
*
*
* -
*
* If they are not equal, call Authlete's {@code /auth/authorization/fail}
* API with {@code reason=}{@link AuthorizationFailRequest.Reason#DIFFERENT_SUBJECT
* DIFFERENT_SUBJECT} and use the response from the API to generate
* a response to the client application.
*
*
*
*
* -
*
[ACRs]
* Get the value of ACRs (Authentication Context Class References) by {@link
* #getAcrs()} method. The value has come from (1) {@code "acr"} claim in
* {@code "claims"} request parameter, (2) {@code "acr_values"} request
* parameter, or (3) {@code "default_acr_values"} configuration parameter
* of the client application.
*
*
*
* It is ensured that all the ACRs returned by {@link #getAcrs()} method
* are supported by the authorization server implementation. In other words,
* it is ensured that all the ACRs are listed in the {@code
* "acr_values_supported"} configuration parameter of the authorization server.
*
*
*
* If the value of ACRs is {@code null}, go to the next step ([SCOPES]).
* Otherwise, follow the sub steps described below.
*
*
*
* -
*
* Get the ACR performed for the authentication of the current end-user.
* Note that this value is managed not by Authlete but by the authorization
* server implementation. (If the authorization server implementation cannot
* handle ACRs, it should not have listed ACRs as {@code "acr_values_supported"}.)
*
*
* -
*
* Compare the ACR value obtained in the above step to each element in
* the ACR array obtained by {@link #getAcrs()} method in the listed order.
* If the ACR value was found in the array, go to the next step ([SCOPES]).
*
*
* -
*
* If the ACR value was not found in the ACR array (= the ACR performed
* for the authentication of the current end-user did not match any one
* of the ACRs requested by the client application), check whether one
* of the requested ACRs must be satisfied or not by calling {@link
* #isAcrEssential()} method. If {@link #isAcrEssential()} returns
* {@code true}, call Authlete's {@code /auth/authorization/fail} API
* with {@code reason=}{@link AuthorizationFailRequest.Reason#ACR_NOT_SATISFIED
* ACR_NOT_SATISFIED} and use the response from the API to generate a
* response to the client application. Otherwise, go to the next step
* ([SCOPES]).
*
*
*
* -
*
[SCOPES]
* Get the scopes by {@link #getScopes()}. If the array contains a scope
* which has not been granted to the client application by the end-user
* in the past, call Authlete's {@code /auth/authorization/fail} API with
* {@code reason=}{@link AuthorizationFailRequest.Reason#CONSENT_REQUIRED
* CONSENT_REQUIRED} and use the response from the API to generate a
* response to the client application. Otherwise, go to the next step
* ([ISSUE]).
*
*
*
* Note that Authlete provides APIs to manage records of granted scopes
* ({@code /api/client/granted_scopes/*} APIs), but the APIs work only
* in the case the Authlete server you use is a dedicated Authlete server
* (contact [email protected]
* for details). In other words, the APIs of the shared Authlete server
* are disabled intentionally (in order to prevent garbage data from
* being accumulated) and they return {@code 403 Forbidden}.
*
*
* -
*
[ISSUE]
* If all the above steps succeeded, the last step is to issue an authorization
* code, an ID token and/or an access token. (There is a special case. When
* {@code response_type=none}, nothing is issued.) The last step can be
* performed by calling Authlete's {@code /auth/authorization/issue} API.
* The API requires the following parameters, which are represented as
* properties of {@link AuthorizationIssueRequest} class. Prepare these
* parameters and call the {@code /auth/authorization/issue} API.
*
*
*
* -
*
[ticket] (required)
* This parameter represents a ticket which is exchanged with tokens
* at the {@code /auth/authorization/issue} endpoint.
* Use the value returned by {@link #getTicket()} as it is.
*
*
* -
*
[subject] (required)
* This parameter represents the unique identifier of the current end-user.
* It is often called "user ID" and it may or may not be visible to the user.
* In any case, it is a number or a string assigned to an end-user by your
* service. Authlete does not care about the format of the value of {@code
* subject}, but it must consist of only ASCII letters and its length must
* be equal to or less than 100.
*
*
*
* When {@link #getSubject()} method returns a non-null value, the
* value of {@code subject} parameter is necessarily identical to the
* value returned from the method.
*
*
*
* The value of this parameter will be embedded in an ID token as the
* value of {@code "sub"} claim. When the value of {@code "subject_type"}
* configuration parameter of the client is {@link
* com.authlete.common.types.SubjectType#PAIRWISE PAIRWISE}, the value
* of {@code "sub"} claim is different from the value specified here,
* but {@code PAIRWISE} is not supported by Authlete yet. See
* 8. Subject Identifier Types of OpenID Connect Core 1.0 for
* details about subject types.
*
*
*
* You can use the sub
request parameter to adjust the value
* of the sub
claim in an ID token. See the description of the
* sub
request parameter for details.
*
*
* -
*
[authTime] (optional)
* This parameter represents the time when the end-user authentication
* occurred. Its value is the number of seconds from 1970-01-01. The
* value of this parameter will be embedded in an ID token as the value
* of {@code "auth_time"} claim.
*
*
*
* -
*
[acr] (optional)
* This parameter represents the ACR (Authentication Context Class
* Reference) which the authentication of the end-user satisfies.
* When {@link #getAcrs()} method returns a non-empty array and
* {@link #isAcrEssential()} method returns
* {@code true}, the value of this parameter must be one of the array
* elements. Otherwise, even {@code null} is allowed. The value of
* this parameter will be embedded in an ID token as the value of
* {@code "acr"} claim.
*
*
*
* -
*
[claims] (optional)
* This parameter represents claims of the end-user. "Claims" here
* are pieces of information about the end-user such as {@code "name"},
* {@code "email"} and {@code "birthdate"}. The authorization server
* implementation is required to gather claims of the end-user, format
* the claim values into a JSON and set the JSON string as the value
* of this parameter.
*
*
*
* The claims which the authorization server implementation is required
* to gather can be obtained by {@link #getClaims()} method.
*
*
*
* For example, if {@link #getClaims()} method returns an array which
* contains {@code "name"}, {@code "email"} and {@code "birthdate"},
* the value of this parameter should look like the following.
*
*
* {
* "name": "John Smith",
* "email": "[email protected]",
* "birthdate": "1974-05-06"
* }
*
*
* {@link #getClaimsLocales()} lists the end-user's preferred languages
* and scripts for claim values, ordered by preference. When {@link
* #getClaimsLocales()} returns a non-empty array, its elements should
* be taken into account when the authorization server implementation
* gathers claim values. Especially, note the excerpt below from
* 5.2. Claims Languages and Scripts of OpenID Connect Core 1.0.
*
*
*
* "When the OP determines, either through the {@code claims_locales}
* parameter, or by other means, that the End-User and Client are
* requesting Claims in only one set of languages and scripts, it
* is RECOMMENDED that OPs return Claims without language tags
* when they employ this language and script. It is also RECOMMENDED
* that Clients be written in a manner that they can handle and
* utilize Claims using language tags."
*
*
*
* If {@link #getClaims()} method returns {@code null} or an empty array,
* the value of this parameter should be {@code null}.
*
*
*
* See 5.1. Standard Claims of OpenID Connect Core 1.0 for claim names
* and their value formats. Note (1) that the authorization server
* implementation may support its special claims
* (5.1.2. Additional Claims) and (2) that claim names may be followed
* by a language tag
* (5.2. Claims Languages and Scripts). Read the specification of
* OpenID Connect Core 1.0 for details.
*
*
*
* The claim values in this parameter will be embedded in an ID token.
*
*
*
* {@link #getIdTokenClaims()} is available since version 2.25. The method
* returns the value of the {@code "id_token"} property in the {@code "claims"}
* request parameter or in the {@code "claims"} property in a request object.
* The value returned from the method should be considered when you prepare
* claim values. See the description of the method for details. Note that,
* however, old Authlete servers don't support this response parameter.
*
*
*
* -
*
[properties] (optional)
* Extra properties to associate with an access token and/or an authorization
* code that may be issued by this request. Note that properties
* parameter is accepted only when Content-Type of the request to Authlete's
* {@code /auth/authorization/issue} is application/json
, so
* don't use application/x-www-form-urlencoded
if you want to
* use this request parameter. See Extra Properties for details.
*
*
*
* -
*
[scopes] (optional)
* Scopes to associate with an access token and/or an authorization code.
* If this parameter is null, the scopes specified in the original authorization
* request from the client application are used. In other cases, including the
* case of an empty array, the specified scopes will replace the scopes
* contained in the original authorization request.
*
*
*
* Even scopes that are not included in the original authorization request
* can be specified. However, as an exception, {@code "openid"} scope is
* ignored on Authlete server side if it is not included in the original
* request. It is because the existence of {@code "openid"} scope considerably
* changes the validation steps and because adding {@code "openid"} triggers
* generation of an ID token (although the client application has not requested
* it) and the behavior is a major violation against the specification.
*
*
*
* If you add "offline_access"
scope although it is not included
* in the original request, keep in mind that the specification requires explicit
* consent from the user for the scope (OpenID
* Connect Core 1.0, 11. Offline Access). When "offline_access"
* is included in the original request, the current implementation of Authlete's
* {@code /auth/authorization} API checks whether the request has come along with
* prompt
request parameter and the value includes
* "consent"
. However, note that the implementation of Authlete's
* {@code /auth/authorization/issue} API does not perform such checking if
* "offline_access"
scope is added via this scopes parameter.
*
*
*
* -
*
[sub] (optional)
* The value of the {@code sub} claim in an ID token which may be issued.
* If the value of this request parameter is not empty, it is used as the
* value of the {@code sub} claim. Otherwise, the value of the {@code subject}
* request parameter is used as the value of the {@code sub} claim. The main
* purpose of this parameter is to hide the actual value of the subject from
* client applications.
*
*
*
*
*
* {@code /auth/authorization/issue} API returns a response in JSON format
* which can be mapped to {@link AuthorizationIssueResponse}. Use the response
* from the API to generate a response to the client application. See the
* description of {@link AuthorizationIssueResponse} for details.
*
*
*
*
*
*
* - {@link Action#INTERACTION INTERACTION}
* -
*
* When the value of {@code "action"} is {@code "INTERACTION"}, it means
* that the request from the client application has no problem and requires
* the authorization server to process the request with user interaction by
* an HTML form.
*
*
* The purpose of the UI displayed to the end-user is to ask the end-user
* to grant authorization to a client application. The items described
* below are some points which the authorization server implementation
* should take into account when it builds the UI.
*
*
*
*
* -
*
[DISPLAY MODE]
* {@code AuthorizationResponse} contains {@code "display"} parameter.
* The value can be obtained by {@link #getDisplay()} method and is
* one of {@link Display#PAGE PAGE} (default), {@link Display#POPUP
* POPUP}, {@link Display#TOUCH TOUCH} and {@link Display#WAP WAP}.
* The meanings of the values are described in 3.1.2.1. Authentication Request of OpenID Connect Core 1.0.
* Basically, the authorization server implementation should display
* the UI which is suitable for the display mode, but it is okay for
* the authorization server implementation to "attempt to detect
* the capabilities of the User Agent and present an appropriate
* display."
*
*
*
* It is ensured that the value returned by {@link #getDisplay()} is
* one of the supported display values which are specified by {@code
* "display_values_supported"} configuration parameter of the service.
*
*
*
* -
*
[UI LOCALE]
* {@code AuthorizationResponse} contains {@code "ui_locales"} parameter.
* The value can be obtained by {@link #getUiLocales()} and it is an
* array of language tag values (such as {@code "fr-CA"} and {@code
* "en"}) ordered by preference. The authorization server implementation
* should display the UI in one of the language listed in the {@code
* "ui_locales"} parameter when possible.
*
*
*
* It is ensured that language tags returned by {@link #getUiLocales()}
* are contained in the list of supported UI locales which are specified
* by {@code "ui_locales_supported"} configuration parameter of the
* service.
*
*
*
* -
*
[CLIENT INFORMATION]
* The authorization server implementation should show the end-user
* information about the client application. The information can be
* obtained by {@link #getClient()} method.
*
*
*
* -
*
[SCOPES]
* A client application requires authorization for specific permissions.
* In OAuth 2.0 specification, "scope" is a technical term which represents
* a permission. {@link #getScopes()} method returns scopes requested by
* the client application. The authorization server implementation should
* show the end-user the scopes.
*
*
*
* The authorization server implementation may choose not to show scopes
* to which the end-user has given consent in the past. To put it the
* other way around, the authorization server implementation may show
* only the scopes to which the end-user has not given consent yet.
* However, if the value returned from {@link #getPrompts()} contains
* {@link Prompt#CONSENT CONSENT}, the authorization server implementation
* has to obtain explicit consent from the end-user even if the end-user
* has given consent to all the requested scopes in the past.
*
*
*
* Note that Authlete provides APIs to manage records of granted scopes
* ({@code /api/client/granted_scopes/*} APIs), but the APIs work only
* in the case the Authlete server you use is a dedicated Authlete server
* (contact [email protected]
* for details). In other words, the APIs of the shared Authlete server
* are disabled intentionally (in order to prevent garbage data from
* being accumulated) and they return {@code 403 Forbidden}.
*
*
*
* It is ensured that scopes returned by {@link #getScopes()} are
* contained in the list of supported scopes which are specified by
* {@code "scopes_supported"} configuration parameter of the service.
*
*
*
* -
*
[END-USER AUTHENTICATION]
* Necessarily, the end-user must be authenticated (= must login your
* service) before granting authorization to the client application.
* Simply put, a login form is expected to be displayed for end-user
* authentication. The authorization server implementation must follow
* the steps described below to comply with OpenID Connect. (Or just
* always show a login form if it's too much of a bother to follow
* the steps below.)
*
*
*
* -
*
* Get the value of {@link #getPrompts()}. It corresponds to the
* value of the {@code prompt} request parameter. Details of the
* request parameter are described in
* 3.1.2.1. Authentication Request of OpenID Connect Core 1.0.
*
*
*
* -
*
* If the value returned from {@link #getPrompts()} contains
* {@link Prompt#SELECT_ACCOUNT SELECT_ACCOUNT}, display a form
* to urge the end-user to select one of his/her accounts for login.
* If {@link #getSubject()} returns a non-null value, it is the
* end-user ID that the client application expects, so the value
* should be used to determine the value of the login ID. Note
* that a subject and a login ID are not necessarily equal. If
* {@link #getSubject()} returns null, the value returned by
* {@link #getLoginHint()} should be referred to as a hint to
* determine the value of the login ID. {@link #getLoginHint()}
* method simply returns the value of the {@code login_hint}
* request parameter.
*
*
*
* -
*
* If the value returned from {@link #getPrompts()} contains
* {@link Prompt#LOGIN LOGIN}, display a form to urge the end-user
* to login even if the end-user has already logged in. If {@link
* #getSubject()} returns a non-null value, it is the end-user
* ID that the client application expects, so the value should
* be used to determine the value of the login ID. Note that a
* subject and a login ID are not necessarily equal. If {@link
* #getSubject()} returns null, the value returned by {@link
* #getLoginHint()} should be referred to as a hint to determine
* the value of the login ID. {@link #getLoginHint()} method
* simply returns the value of the {@code login_hint} request
* parameter.
*
*
*
* -
*
* If the value returned from {@link #getPrompts()} does not
* contain {@link Prompt#LOGIN LOGIN}, the authorization server
* implementation does not have to authenticate the end-user
* if all the conditions described below are satisfied. If
* any one of the conditions is not satisfied, show a login
* form to authenticate the end-user.
*
*
*
* -
*
* An end-user has already logged in your service.
*
*
* -
*
* The login ID of the current end-user matches the value
* returned by {@link #getSubject()}. This check is required
* only when {@link #getSubject()} returns a non-null value.
*
*
* -
*
* The max age, which is the number of seconds obtained by
* {@link #getMaxAge()} method, has not passed since the
* current end-user logged in your service. This check is
* required only when {@link #getMaxAge()} returns a
* non-zero value.
*
*
*
* If the authorization server implementation does not manage
* authentication time of end-users (= if the authorization
* server implementation cannot know when end-users logged in)
* and if {@link #getMaxAge()} returns a non-zero value, a
* login form should be displayed.
*
*
*
* -
*
* The ACR (Authentication Context Class Reference) of the
* authentication performed for the current end-user satisfies
* one of the ACRs listed by {@link #getAcrs()}. This check is
* required only when {@link #getAcrs()} returns a non-empty
* array.
*
*
*
*
*
*
*
* In every case, the end-user authentication must satisfy one of the ACRs
* listed by {@link #getAcrs()} when {@link #getAcrs()} returns a non-empty
* array and {@link #isAcrEssential()} returns {@code true}.
*
*
*
* -
*
[GRANT/DENY BUTTONS]
* The end-user is supposed to choose either (1) to grant authorization
* to the client application or (2) to deny the authorization request.
* The UI must have UI components to accept the decision by the user.
* Usually, a button to grant authorization and a button to deny the
* request are provided.
*
*
*
*
*
*
* When the subject returned by {@link #getSubject()} method is not {@code null},
* the end-user authentication must be performed for the subject, meaning that
* the authorization server implementation should repeatedly show a login form
* until the subject is successfully authenticated.
*
*
*
* The end-user will choose either (1) to grant authorization to the client
* application or (2) to deny the authorization request. When the end-user
* chose to deny the authorization request, call Authlete's {@code
* /auth/authorization/fail} API with {@code reason=}{@link
* AuthorizationFailRequest.Reason#DENIED DENIED} and use the response from
* the API to generate a response to the client application.
*
*
*
* When the end-user chose to grant authorization to the client application,
* the authorization server implementation has to issue an authorization code,
* an ID token, and/or an access token to the client application. (There is a
* special case. When {@code response_type=none}, nothing is issued.) Issuing
* the tokens can be performed by calling Authlete's {@code /auth/authorization/issue}
* API. Read [ISSUE] written above in the description for the case of {@code
* action=NO_INTERACTION}.
*
*
*
*
* @see RFC 6749, OAuth 2.0
*
* @see OpenID Connect Core 1.0
*
* @see OpenID Connect Dynamic Client Registration 1.0
*
* @see OpenID Connect Discovery 1.0
*
* @author Takahiko Kawasaki
*/
public class AuthorizationResponse extends ApiResponse
{
private static final long serialVersionUID = 10L;
/**
* The next action that the service implementation should take.
*/
public enum Action
{
/**
* The request from the service implementation was wrong or
* an error occurred in Authlete. The service implementation
* should return {@code "500 Internal Server Error"} to the
* client application.
*/
INTERNAL_SERVER_ERROR,
/**
* The authorization request was wrong and the service implementation
* should notify the client application of the error by
* {@code "400 Bad Request"}.
*/
BAD_REQUEST,
/**
* The authorization request was wrong and the service implementation
* should notify the client application of the error by
* {@code "302 Found"}.
*/
LOCATION,
/**
* The authorization request was wrong and the service implementation
* should notify the client application of the error by
* {@code "200 OK"} with an HTML which triggers redirection by
* JavaScript.
*
* @see OAuth 2.0 Form Post Response Mode
*/
FORM,
/**
* The authorization request was valid and the service implementation
* should issue an authorization code, an ID token and/or an access
* token without interaction with the end-user.
*/
NO_INTERACTION,
/**
* The authorization request was valid and the service implementation
* should display UI to ask for authorization from the end-user.
*/
INTERACTION
}
private static final String SUMMARY_FORMAT
= "ticket=%s, action=%s, serviceNumber=%d, clientNumber=%d, clientId=%d, "
+ "clientSecret=%s, clientType=%s, developer=%s, display=%s, maxAge=%d, "
+ "scopes=%s, uiLocales=%s, claimsLocales=%s, claims=%s, acrEssential=%s, "
+ "clientIdAliasUsed=%s, "
+ "acrs=%s, subject=%s, loginHint=%s, lowestPrompt=%s, prompts=%s";
/*
* Do not change variable names. They must match the variable names
* in JSONs which are exchanged between clients and Authlete server.
*/
private Action action;
private Service service;
private Client client;
private Display display;
private int maxAge;
private Scope[] scopes;
private String[] uiLocales;
private String[] claimsLocales;
private String[] claims;
private boolean acrEssential;
private boolean clientIdAliasUsed;
private String[] acrs;
private String subject;
private String loginHint;
private Prompt lowestPrompt;
private Prompt[] prompts;
private String requestObjectPayload;
private String idTokenClaims;
private String userInfoClaims;
private String responseContent;
private String ticket;
/**
* Get the next action that the service implementation should take.
*/
public Action getAction()
{
return action;
}
/**
* Set the next action that the service implementation should take.
*/
public void setAction(Action action)
{
this.action = action;
}
/**
* Get the information about the service.
*
* @return
* Information about the service.
*
* @since 1.23
*/
public Service getService()
{
return service;
}
/**
* Set the information about the service.
*
* @param service
* Information about the service.
*
* @since 1.23
*/
public void setService(Service service)
{
this.service = service;
}
/**
* Get the information about the client application which has made
* the authorization request.
*
* @see OpenID Connect Dynamic Client Registration 1.0
*/
public Client getClient()
{
return client;
}
/**
* Set the information about the client application which has made
* the authorization request.
*/
public void setClient(Client client)
{
this.client = client;
}
/**
* Get the display mode which the client application requests
* by {@code "display"} request parameter. When the authorization
* request does not contain {@code "display"} request parameter,
* this method returns {@link Display#PAGE} as the default value.
*
* @see OpenID Connect Core 1.0, 3.1.2.1. Authentication Request
*/
public Display getDisplay()
{
return display;
}
/**
* Set the display mode which the client application requires
* by {@code "display"} request parameter.
*/
public void setDisplay(Display display)
{
this.display = display;
}
/**
* Get the maximum authentication age which is the allowable
* elapsed time in seconds since the last time the end-user
* was actively authenticated by the service implementation.
* The value comes from {@code "max_age"} request parameter
* or {@code "default_max_age"} configuration parameter of
* the client application. 0 may be returned which means
* that the max age constraint does not have to be imposed.
*
* @see OpenID Connect Core 1.0, 3.1.2.1. Authentication Request
*
* @see OpenID Connect Dynamic Client Registration 1.0, 2. Client Metadata
*/
public int getMaxAge()
{
return maxAge;
}
/**
* Set the maximum authentication age.
*/
public void setMaxAge(int maxAge)
{
this.maxAge = maxAge;
}
/**
* Get the scopes which the client application requests by {@code
* "scope"} request parameter. When the authorization request does
* not contain {@code "scope"} request parameter, this method
* returns a list of scopes which are marked as default by the
* service implementation. {@code null} may be returned if the
* authorization request does not contain valid scopes and none
* of registered scopes is marked as default.
*
*
* You may want to enable end-users to select/deselect scopes in
* the authorization page. In other words, you may want to use
* a different set of scopes than the set specified by the original
* authorization request. You can replace scopes when you call
* Authlete's /auth/authorization/issue API. See the description
* of {@link AuthorizationIssueRequest#setScopes(String[])} for
* details.
*
*
* @see OAuth 2.0, 3.3. Access Token Scope
*/
public Scope[] getScopes()
{
return scopes;
}
/**
* Set the scopes which the client application requests or the
* default scopes when the authorization request does not contain
* {@code "scope"} request parameter.
*
*
* You may want to enable end-users to select/deselect scopes in
* the authorization page. In other words, you may want to use
* a different set of scopes than the set specified by the original
* authorization request. You can replace scopes when you call
* Authlete's /auth/authorization/issue API. See the description
* of {@link AuthorizationIssueRequest#setScopes(String[])} for
* details.
*
*/
public void setScopes(Scope[] scopes)
{
this.scopes = scopes;
}
/**
* Get the list of preferred languages and scripts for the user
* interface. The value comes from {@code "ui_locales"} request
* parameter.
*
* @see OpenID Connect Core 1.0, 3.1.2.1. Authentication Request
*/
public String[] getUiLocales()
{
return uiLocales;
}
/**
* Set the list of preferred languages and scripts for the user
* interface.
*/
public void setUiLocales(String[] uiLocales)
{
this.uiLocales = uiLocales;
}
/**
* Get the list of preferred languages and scripts for claim
* values contained in the ID token. The value comes from
* {@code "claims_locales"} request parameter.
*
* @see OpenID Connect Core 1.0, 5.2. Claims Languages and Scripts
*/
public String[] getClaimsLocales()
{
return claimsLocales;
}
/**
* Set the list of preferred languages and scripts for claim
* values contained in the ID token.
*/
public void setClaimsLocales(String[] claimsLocales)
{
this.claimsLocales = claimsLocales;
}
/**
* Get the list of claims that the client application requests
* to be embedded in the ID token. The value comes from
* {@code "scope"} and {@code "claims"} request parameters of
* the original authorization request.
*
* @see OpenID Connect Core 1.0, 5.4. Requesting Claims using Scope Values
*
* @see OpenID Connect Core 1.0, 5.5. Requesting Claims using
* the "claims" Request Parameter
*/
public String[] getClaims()
{
return claims;
}
/**
* Set the list of claims that the client application requests
* to be embedded in the ID token.
*/
public void setClaims(String[] claims)
{
this.claims = claims;
}
/**
* Get the flag which indicates whether the end-user authentication
* must satisfy one of the requested ACRs.
*
*
* This method returns {@code true} only when the authorization
* request from the client contains {@code "claim"} request parameter
* and it contains an entry for {@code "acr"} claim with
* {@code "essential":true}.
*
*
* @see OpenID Connect Core 1.0, 5.5.1. Individual Claims Requests
*/
public boolean isAcrEssential()
{
return acrEssential;
}
/**
* Set the flag which indicates whether the end-user authentication
* must satisfy one of the requested ACRs.
*/
public void setAcrEssential(boolean essential)
{
this.acrEssential = essential;
}
/**
* Get the flag which indicates whether the value of the {@code client_id}
* request parameter included in the authorization request is the client
* ID alias or the original numeric client ID.
*
* @since 2.3
*/
public boolean isClientIdAliasUsed()
{
return clientIdAliasUsed;
}
/**
* Set the flag which indicates whether the value of the {@code client_id}
* request parameter included in the authorization request is the client
* ID alias or the original numeric client ID.
*
* @since 2.3
*/
public void setClientIdAliasUsed(boolean used)
{
clientIdAliasUsed = used;
}
/**
* Get the list of ACRs (Authentication Context Class References)
* requested by the client application. The value come from (1)
* {@code "acr"} claim in {@code "claims"} request parameter, (2)
* {@code "acr_values"} request parameter, or (3) {@code
* "default_acr_values"} configuration parameter of the client
* application.
*
* @see OpenID Connect Core 1.0, 5.5. Requesting Claims using
* the "claims" Request Parameter
*
* @see OpenID Connect Core 1.0, 3.1.2.1. Authentication Request
*
* @see OpenID Connect Dynamic Client Registration 1.0, 2. Client Metadata
*/
public String[] getAcrs()
{
return acrs;
}
/**
* Set the list of ACRs (Authentication Context Class References)
* requested by the client application.
*/
public void setAcrs(String[] acrs)
{
this.acrs = acrs;
}
/**
* Get the subject (= end-user's unique ID) that the client
* application requests. The value comes from {@code "sub"}
* claim in {@code "claims"} request parameter. This method
* may return {@code null} (probably in most cases).
*
* @see OpenID Connect Core 1.0, 5.5. Requesting Claims using
* the "claims" Request Parameter
*/
public String getSubject()
{
return subject;
}
/**
* Set the subject (= end-user's login ID) that the client
* application requests.
*/
public void setSubject(String subject)
{
this.subject = subject;
}
/**
* Get the value of login hint, which is specified by the client
* application using {@code "login_hint"} request parameter.
*
* @see OpenID Connect Core 1.0, 3.1.2.1. Authentication Request
*/
public String getLoginHint()
{
return loginHint;
}
/**
* Set the value of login hint, which is specified by the client
* application using {@code "login_hint"} request parameter.
*/
public void setLoginHint(String loginHint)
{
this.loginHint = loginHint;
}
/**
* Get the prompt that the UI displayed to the end-user must satisfy
* at least. The value comes from {@code "prompt"} request parameter.
* When the authorization request does not contain {@code "prompt"}
* parameter, this method returns {@link Prompt#CONSENT CONSENT} as
* the default value.
*
*
* This method is deprecated. Use {@link #getPrompts()} instead.
*
*
* @see OpenID Connect Core 1.0, 3.1.2.1. Authentication Request
*
* @deprecated
*/
@Deprecated
public Prompt getLowestPrompt()
{
return lowestPrompt;
}
/**
* Set the prompt that the UI displayed to the end-user must satisfy
* at least.
*/
public void setLowestPrompt(Prompt prompt)
{
this.lowestPrompt = prompt;
}
/**
* Get the list of prompts contained in the authorization request
* (= the value of {@code prompt} request parameter).
*
* @return
* The list of prompts contained in the authorization request.
*
* @see OpenID Connect Core 1.0, 3.1.2.1. Authentication Request
*
* @since 1.34
*/
public Prompt[] getPrompts()
{
return prompts;
}
/**
* Set the list of prompts contained in the authorization request
* (= the value of {@code prompt} request parameter).
*
* @param prompts
* The list of prompts contained in the authorization request.
*
* @since 1.34
*/
public void setPrompts(Prompt[] prompts)
{
this.prompts = prompts;
}
/**
* Get the payload part of the request object.
*
*
* This method returns {@code null} if the authorization request does not
* include a request object.
*
*
* @return
* The payload part of the request object in JSON format.
*
* @since 2.22
*/
public String getRequestObjectPayload()
{
return requestObjectPayload;
}
/**
* Set the payload part of the request object.
*
* @param payload
* The payload part of the request object in JSON format.
*
* @since 2.22
*/
public void setRequestObjectPayload(String payload)
{
this.requestObjectPayload = payload;
}
/**
* Get the value of the {@code "id_token"} property in the {@code "claims"}
* request parameter or in the {@code "claims"} property in a request object.
*
*
* A client application may request certain claims be embedded in an ID
* token or in a response from the UserInfo endpoint. There are several
* ways. Including the {@code claims} request parameter and including the
* {@code claims} property in a request object are such examples. In both
* the cases, the value of the {@code claims} parameter/property is JSON.
* Its format is described in 5.5. Requesting Claims using the "claims" Request Parameter of
* OpenID
* Connect Core 1.0.
*
*
*
* The following is an excerpt from the specification. You can find
* {@code "userinfo"} and {@code "id_token"} are top-level properties.
*
*
*
* {
* "userinfo":
* {
* "given_name": {"essential": true},
* "nickname": null,
* "email": {"essential": true},
* "email_verified": {"essential": true},
* "picture": null,
* "http://example.info/claims/groups": null
* },
* "id_token":
* {
* "auth_time": {"essential": true},
* "acr": {"values": ["urn:mace:incommon:iap:silver"] }
* }
* }
*
*
*
* This method ({@code getIdTokenClaims()}) returns the value of the
* {@code "id_token"} property in JSON format. For example, if the
* JSON above is included in an authorization request, this method
* returns JSON equivalent to the following.
*
*
*
* {
* "auth_time": {"essential": true},
* "acr": {"values": ["urn:mace:incommon:iap:silver"] }
* }
*
*
*
* Note that if a request object is given and it contains the
* {@code claims} property and if the {@code claims} request
* parameter is also given, this method returns the value in
* the former.
*
*
* @return
* The value of the {@code "id_token"} property in the
* {@code "claims"} in JSON format.
*
* @since 2.25
*/
public String getIdTokenClaims()
{
return idTokenClaims;
}
/**
* Set the value of the {@code "id_token"} property in the {@code "claims"}
* request parameter or in the {@code "claims"} property in a request object.
*
* @param idTokenClaims
* The value of the {@code "id_token"} property in the
* {@code "claims"} in JSON format.
*
* @since 2.25
*/
public void setIdTokenClaims(String idTokenClaims)
{
this.idTokenClaims = idTokenClaims;
}
/**
* Get the value of the {@code "userinfo"} property in the {@code "claims"}
* request parameter or in the {@code "claims"} property in a request object.
*
*
* A client application may request certain claims be embedded in an ID
* token or in a response from the UserInfo endpoint. There are several
* ways. Including the {@code claims} request parameter and including the
* {@code claims} property in a request object are such examples. In both
* the cases, the value of the {@code claims} parameter/property is JSON.
* Its format is described in 5.5. Requesting Claims using the "claims" Request Parameter of
* OpenID
* Connect Core 1.0.
*
*
*
* The following is an excerpt from the specification. You can find
* {@code "userinfo"} and {@code "id_token"} are top-level properties.
*
*
*
* {
* "userinfo":
* {
* "given_name": {"essential": true},
* "nickname": null,
* "email": {"essential": true},
* "email_verified": {"essential": true},
* "picture": null,
* "http://example.info/claims/groups": null
* },
* "id_token":
* {
* "auth_time": {"essential": true},
* "acr": {"values": ["urn:mace:incommon:iap:silver"] }
* }
* }
*
*
*
* This method ({@code getUserInfoClaims()}) returns the value of the
* {@code "userinfo"} property in JSON format. For example, if the
* JSON above is included in an authorization request, this method
* returns JSON equivalent to the following.
*
*
*
* {
* "given_name": {"essential": true},
* "nickname": null,
* "email": {"essential": true},
* "email_verified": {"essential": true},
* "picture": null,
* "http://example.info/claims/groups": null
* }
*
*
*
* Note that if a request object is given and it contains the
* {@code claims} property and if the {@code claims} request
* parameter is also given, this method returns the value in
* the former.
*
*
* @return
* The value of the {@code "userinfo"} property in the
* {@code "claims"} in JSON format.
*
* @since 2.25
*/
public String getUserInfoClaims()
{
return userInfoClaims;
}
/**
* Set the value of the {@code "userinfo"} property in the {@code "claims"}
* request parameter or in the {@code "claims"} property in a request object.
*
* @param userInfoClaims
* The value of the {@code "userinfo"} property in the
* {@code "claims"} in JSON format.
*
* @since 2.25
*/
public void setUserInfoClaims(String userInfoClaims)
{
this.userInfoClaims = userInfoClaims;
}
/**
* Get the response content which can be used to generate a response
* to the client application. The format of the value varies depending
* on the value of {@code "action"}.
*/
public String getResponseContent()
{
return responseContent;
}
/**
* Set the response content which can be used to generate a response
* to the client application.
*/
public void setResponseContent(String content)
{
this.responseContent = content;
}
/**
* Get the ticket which has been issued to the service implementation
* from Authlete's {@code /auth/authorization} API. This ticket is
* needed for {@code /auth/authorization/issue} API and
* {@code /auth/authorization/fail} API.
*/
public String getTicket()
{
return ticket;
}
/**
* Set the ticket for the service implementation to call
* {@code /auth/authorization/issue} API and
* {@code /auth/authorization/fail} API.
*/
public void setTicket(String ticket)
{
this.ticket = ticket;
}
/**
* Get the summary of this instance.
*/
public String summarize()
{
return String.format(SUMMARY_FORMAT,
ticket,
action,
(client != null ? client.getServiceNumber() : 0),
(client != null ? client.getNumber() : 0),
(client != null ? client.getClientId() : 0),
(client != null ? client.getClientSecret() : null),
(client != null ? client.getClientType() : null),
(client != null ? client.getDeveloper() : null),
display,
maxAge,
Utils.stringifyScopeNames(scopes),
Utils.join(uiLocales, " "),
Utils.join(claimsLocales, " "),
Utils.join(claims, " "),
acrEssential,
clientIdAliasUsed,
Utils.join(acrs, " "),
subject,
loginHint,
lowestPrompt,
Utils.stringifyPrompts(prompts)
);
}
}