com.authlete.common.dto.AuthorizationIssueRequest Maven / Gradle / Ivy
Show all versions of authlete-java-common Show documentation
/*
* Copyright (C) 2014-2016 Authlete, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.authlete.common.dto;
import java.io.Serializable;
import java.util.Map;
import com.authlete.common.util.Utils;
/**
* Request to Authlete's {@code /auth/authorization/issue} API.
*
*
*
* ticket
(REQUIRED)
* -
*
* The ticket issued by Authlete's {@code /auth/authorization} API
* to the service implementation. It is the value of {@code "ticket"}
* contained in the response from Authlete's {@code
* /auth/authorization} API ({@link AuthorizationResponse}).
*
*
*
* subject
(CONDITIONALLY REQUIRED)
* -
*
* The subject (= a user account managed by the service) who has
* granted authorization to the client application. This parameter
* is required unless the authorization request has come with
* {@code response_type=none} (which means the client application
* did not request any token to be returned). See "4. None Response Type" in OAuth 2.0 Multiple Response Type Encoding Practices for
* details about {@code response_type=none}.
*
*
*
* authTime
(OPTIONAL)
* -
*
* The time when the authentication of the end-user occurred.
*
*
*
* acr
(OPTIONAL)
* -
*
* The Authentication Context Class Reference performed for the
* end-user authentication.
*
*
*
* claims
(OPTIONAL)
* -
*
* The claims of the end-user (= pieces of information about the
* end-user) in JSON format. See
* OpenID Connect Core 1.0, 5.1. Standard Claims for details
* about the format.
*
*
*
* properties
(OPTIONAL)
* -
*
* Extra properties to associate with an access token and/or an authorization
* code that may be issued by this request. Note that {@code properties}
* parameter is accepted only when Content-Type of the request is
* application/json, so don't use application/x-www-form-urlencoded if you
* want to specify {@code properties} parameter.
*
*
*
* scopes
(OPTIONAL)
* -
*
* Scopes to associate with an access token and/or an authorization code.
* If this field is {@code null}, the scopes specified in the original
* authorization request from the client application are used. In other
* cases, including the case of an empty array, the specified scopes will
* replace the original scopes contained in the original authorization
* request.
*
*
* Even scopes that are not included in the original authorization request
* can be specified. However, as an exception, "openid"
scope
* is ignored on the server side if it is not included in the original
* request. It is because the existence of "openid"
scope
* considerably changes the validation steps and because adding
* "openid"
triggers generation of an ID token (although the
* client application has not requested it) and the behavior is a major
* violation against the specification.
*
*
* If you add "offline_access"
scope although it is not
* included in the original request, keep in mind that the specification
* requires explicit consent from the user for the scope (OpenID Connect Core 1.0, 11. Offline Access). When
* "offline_access"
is included in the original request, the
* current implementation of Authlete's {@code /auth/authorization} API
* checks whether the request has come along with prompt
* request parameter and the value includes "consent"
. However,
* note that the implementation of Authlete's {@code /auth/authorization/issue}
* API does not perform such checking if "offline_access"
scope
* is added via this scopes
parameter.
*
*
*
* sub
(OPTIONAL)
* -
*
* The value of the {@code sub} claim. If the value of this request parameter
* is not empty, it is used as the value of the {@code sub} claim. Otherwise,
* the value of the {@code subject} request parameter is used as the value of
* the {@code sub} claim. The main purpose of this parameter is to hide the
* actual value of the subject from client applications.
*
*
* Note that even if this {@code sub} parameter is not empty, the value of the
* {@code subject} request parameter is used as the value of the subject which
* is associated with the access token.
*
*
*
*
*
* @see AuthorizationResponse
*
* @see OpenID Connect Core 1.0, 5.1. Standard Claims
*
* @author Takahiko Kawasaki
*/
public class AuthorizationIssueRequest implements Serializable
{
private static final long serialVersionUID = 7L;
/**
* The ticket issued by Authlete's endpoint.
*/
private String ticket;
/**
* The subject (end-user) managed by the service.
*/
private String subject;
/**
* The value of the 'sub' claim in an ID token.
* When this field is empty, 'subject' is used.
*/
private String sub;
/**
* The time when the end-user was authenticated.
*/
private long authTime;
/**
* The authentication context class reference.
*/
private String acr;
/**
* Claims in JSON format.
*/
private String claims;
/**
* Extra properties to associate with an access token and/or
* an authorization code.
*/
private Property[] properties;
/**
* Scopes to associate with an access token and/or an authorization code.
* If this field is {@code null}, the scopes specified in the original
* authorization request from the client application are used. In other
* cases, including the case of an empty array, the scopes here will
* replace the original scopes contained in the original request.
*/
private String[] scopes;
/**
* Get the value of {@code "ticket"} which is the ticket
* issued by Authlete's {@code /auth/authorization} API
* to the service implementation.
*
* @return
* The ticket.
*/
public String getTicket()
{
return ticket;
}
/**
* Set the value of {@code "ticket"} which is the ticket
* issued by Authlete's {@code /auth/authorization} API
* to the service implementation.
*
* @param ticket
* The ticket.
*
* @return
* {@code this} object.
*/
public AuthorizationIssueRequest setTicket(String ticket)
{
this.ticket = ticket;
return this;
}
/**
* Get the value of {@code "subject"} which is the subject
* (= a user account managed by the service) who has granted
* authorization to the client application.
*
*
* This {@code subject} property is used as the value of the
* subject associated with the access token (if one is issued)
* and as the value of the {@code sub} claim in the ID token
* (if one is issued).
*
*
*
* Note that, if {@link #getSub()} returns a non-empty value,
* it is used as the value of the {@code sub} claim in the ID
* token. However, even in such a case, the value of the
* subject associated with the access token is still the value
* of this {@code subject} property.
*
*
* @return
* The subject.
*
* @see #getSub()
*/
public String getSubject()
{
return subject;
}
/**
* Set the value of {@code "subject"} which is the subject
* (= a user account managed by the service) who has granted
* authorization to the client application.
*
*
* This {@code subject} property is used as the value of the
* subject associated with the access token (if one is issued)
* and as the value of the {@code sub} claim in the ID token
* (if one is issued).
*
*
*
* Note that, if a non-empty value is set by {@link #setSub(String)}
* method, the value is used as the value of the {@code sub} claim
* in the ID token. However, even in such a case, the value of the
* subject associated with the access token is still the value set
* by this method.
*
*
* @param subject
* The subject.
*
* @return
* {@code this} object.
*
* @since {@link #setSub(String)}
*/
public AuthorizationIssueRequest setSubject(String subject)
{
this.subject = subject;
return this;
}
/**
* Get the value of the {@code sub} claim that should be used in
* the ID token which is to be issued. If this method returns
* {@code null} or its value is empty, the value of the {@code
* subject} is used. The main purpose of this {@code sub} property
* is to hide the actual value of the subject from client applications.
*
*
* Note that the value of the {@code subject} request parameter is
* used as the value of the subject associated with the access token
* regardless of whether this {@code sub} property is a non-empty
* value or not.
*
*
* @return
* The value of the {@code sub} claim.
*
* @since 1.35
*
* @see #getSubject()
*/
public String getSub()
{
return sub;
}
/**
* Set the value of the {@code sub} claim that should be used in
* the ID token which is to be issued. If {@code null} (the default
* value) or an empty string is given, the value of the {@code
* subject} is used. The main purpose of this {@code sub} property
* is to hide the actual value of the subject from client applications.
*
*
* Note that the value of the {@code subject} request parameter is
* used as the value of the subject associated with the access token
* regardless of whether this {@code sub} property is a non-empty
* value or not.
*
*
* @param sub
* The value of the {@code sub} claim.
*
* @return
* {@code this} object.
*
* @since 1.35
*
* @see #setSubject(String)
*/
public AuthorizationIssueRequest setSub(String sub)
{
this.sub = sub;
return this;
}
/**
* Get the value of {@code "authTime"} which is the time
* when the authentication of the end-user occurred.
*
* @return
* The time when the end-user authentication occurred.
* It is the number of seconds since 1970-01-01.
*/
public long getAuthTime()
{
return authTime;
}
/**
* Set the value of {@code "authTime"} which is the time
* when the authentication of the end-user occurred.
*
* @param authTime
* The time when the end-user authentication occurred.
* It is the number of seconds since 1970-01-01.
*
* @return
* {@code this} object.
*/
public AuthorizationIssueRequest setAuthTime(long authTime)
{
this.authTime = authTime;
return this;
}
/**
* Get the value of {@code "acr"} which is the authentication
* context class reference value which the end-user authentication
* satisfied.
*
* @return
* The authentication context class reference.
*/
public String getAcr()
{
return acr;
}
/**
* Set the value of {@code "acr"} which is the authentication
* context class reference value which the end-user authentication
* satisfied.
*
* @param acr
* The authentication context class reference.
*
* @return
* {@code this} object.
*/
public AuthorizationIssueRequest setAcr(String acr)
{
this.acr = acr;
return this;
}
/**
* Get the value of {@code "claims"} which is the claims of the subject
* in JSON format.
*
* @return
* The claims of the subject in JSON format. See the description
* of {@link #setClaims(String)} for details about the format.
*
* @see #setClaims(String)
*/
public String getClaims()
{
return claims;
}
/**
* Set the value of {@code "claims"} which is the claims of the subject
* in JSON format.
*
*
* The service implementation is required to retrieve claims of the subject
* (= information about the end-user) from its database and format them in
* JSON format.
*
*
*
* For example, if "given_name"
claim, "family_name"
* claim and "email"
claim are requested, the service implementation
* should generate a JSON object like the following:
*
*
*
* {
* "given_name": "Takahiko",
* "family_name": "Kawasaki",
* "email": "[email protected]"
* }
*
*
*
* and set its String representation by this method.
*
*
*
* See OpenID Connect Core 1.0, 5.1. Standard Claims for further details
* about the format.
*
*
* @param claims
* The claims of the subject in JSON format.
*
* @return
* {@code this} object.
*
* @see OpenID Connect Core 1.0, 5.1. Standard Claims
*/
public AuthorizationIssueRequest setClaims(String claims)
{
this.claims = claims;
return this;
}
/**
* Set the value of {@code "claims"} which is the claims of the subject.
* The argument is converted into a JSON string and passed to {@link
* #setClaims(String)} method.
*
* @param claims
* The claims of the subject. Keys are claim names.
*
* @return
* {@code this} object.
*
* @since 1.24
*/
public AuthorizationIssueRequest setClaims(Map claims)
{
if (claims == null || claims.size() == 0)
{
this.claims = null;
return this;
}
String json = Utils.toJson(claims);
return setClaims(json);
}
/**
* Get the extra properties to associate with an access token and/or
* an authorization code which will be issued by this request.
*
* @return
* Extra properties.
*
* @since 1.30
*/
public Property[] getProperties()
{
return properties;
}
/**
* Set extra properties to associate with an access token and/or
* an authorization code which will be issued by this request.
*
*
* Keys of extra properties will be used as labels of top-level
* entries in a JSON response containing an access token which is
* returned from an authorization server. An example is
* {@code example_parameter}, which you can find in 5.1. Successful
* Response in RFC 6749. The following code snippet is an example
* to set one extra property having {@code example_parameter} as its
* key and {@code example_value} as its value.
*
*
*
*
* {@link Property}[] properties = { new {@link Property#Property(String, String)
* Property}("example_parameter", "example_value") };
* request.{@link #setProperties(Property[]) setProperties}(properties);
*
*
*
*
* Keys listed below should not be used and they would be ignored on
* the server side even if they were used. It's because they are reserved
* in RFC 6749 and
* OpenID Connect Core 1.0.
*
*
*
* - {@code access_token}
*
- {@code token_type}
*
- {@code expires_in}
*
- {@code refresh_token}
*
- {@code scope}
*
- {@code error}
*
- {@code error_description}
*
- {@code error_uri}
*
- {@code id_token}
*
*
*
* Note that there is an upper limit on the total size of extra properties.
* On the server side, the properties will be (1) converted to a multidimensional
* string array, (2) converted to JSON, (3) encrypted by AES/CBC/PKCS5Padding, (4)
* encoded by base64url, and then stored into the database. The length of the
* resultant string must not exceed 65,535 in bytes. This is the upper limit, but
* we think it is big enough.
*
*
* @param properties
* Extra properties.
*
* @return
* {@code this} object.
*
* @since 1.30
*/
public AuthorizationIssueRequest setProperties(Property[] properties)
{
this.properties = properties;
return this;
}
/**
* Get scopes to associate with an authorization code and/or an access token.
* If this method returns a non-null value, the set of scopes will be used
* instead of the scopes specified in the original authorization request.
*
* @return
* Scopes to replace the scopes specified in the original authorization
* request. When {@code null} is returned from this method, replacement
* is not performed.
*
* @since 1.34
*/
public String[] getScopes()
{
return scopes;
}
/**
* Set scopes to associate with an authorization code and/or an access token.
* If {@code null} (the default value) is set, the scopes specified in the
* original authorization request from the client application are used. In
* other cases, including the case of an empty array, the scopes given to
* this method will replace the original scopes contained in the original
* request.
*
*
*
* Even scopes that are not included in the original authorization request
* can be specified. However, as an exception, "openid"
scope
* is ignored on the server side if it is not included in the original
* request (to be exact, if "openid"
was not included in the
* {@code parameters} request parameter of /api/auth/authorization API call).
* It is because the existence of "openid"
scope considerably
* changes the validation steps and because adding "openid"
* triggers generation of an ID token (although the client application has
* not requested it) and the behavior is a major violation against the
* specification.
*
*
*
* If you add "offline_access"
scope although it is not
* included in the original request, keep in mind that the specification
* requires explicit consent from the user for the scope (OpenID Connect Core 1.0, 11. Offline Access). When
* "offline_access"
is included in the original request, the
* current implementation of Authlete's /api/auth/authorization API checks
* whether the request has come along with prompt
request
* parameter and the value includes "consent"
. However, note
* that the implementation of Authlete's /api/auth/authorization/issue API
* does not perform such checking if "offline_access"
scope
* is added via this scopes
parameter.
*
*
*
*
* Value
* Effect
*
*
* {@code null}
*
* The scopes contained in the original authorization request are used.
*
*
*
* An empty array
*
* No scopes are associated with an authorization code and/or an access token.
* The scopes contained in the original authorization request are not used.
*
*
*
* A non-empty array of scope names
*
* Scopes listed in the array are associated with an authorization code
* and/or an access token.
*
*
*
*
* @param scopes
* Scopes to associate with an authorization code and/or an access
* token. If a non-null value is set, the original scopes requested
* by the client application are replaced.
*
* @return
* {@code this} object.
*
* @since 1.34
*/
public AuthorizationIssueRequest setScopes(String[] scopes)
{
this.scopes = scopes;
return this;
}
}