
com.nimbusds.oauth2.sdk.auth.verifier.JWTAuthenticationClaimsSetVerifier Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of oauth2-oidc-sdk Show documentation
Show all versions of oauth2-oidc-sdk Show documentation
OAuth 2.0 SDK with OpenID Connection extensions for developing
client and server applications.
/*
* oauth2-oidc-sdk
*
* Copyright 2012-2016, Connect2id Ltd and contributors.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use
* this file except in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package com.nimbusds.oauth2.sdk.auth.verifier;
import com.nimbusds.jose.proc.SecurityContext;
import com.nimbusds.jwt.JWTClaimsSet;
import com.nimbusds.jwt.proc.BadJWTException;
import com.nimbusds.oauth2.sdk.assertions.jwt.JWTAssertionDetailsVerifier;
import com.nimbusds.oauth2.sdk.id.Audience;
import net.jcip.annotations.Immutable;
import java.util.List;
import java.util.Objects;
import java.util.Set;
/**
* JWT client authentication claims set verifier.
*
* Related specifications:
*
*
* - OpenID Connect Core 1.0
*
- JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and
* Authorization Grants (RFC 7523).
*
*/
@Immutable
class JWTAuthenticationClaimsSetVerifier extends JWTAssertionDetailsVerifier {
// Cache JWT exceptions for quick processing of bad claims
/**
* Missing or invalid JWT claim exception.
*/
private static final BadJWTException ISS_SUB_MISMATCH_EXCEPTION =
new BadJWTException("Issuer and subject JWT claims don't match");
/**
* The JWT audience (aud) check.
*/
private final JWTAudienceCheck audCheck;
/**
* Creates a new JWT client authentication claims set verifier. The
* audience check is {@link JWTAudienceCheck#LEGACY legacy}.
*
* @param aud The permitted audience (aud) claim. Must not be empty or
* {@code null}. Should be the identity of the recipient,
* such as the issuer URI for an OpenID provider.
*/
public JWTAuthenticationClaimsSetVerifier(final Set aud) {
this(aud, JWTAudienceCheck.LEGACY, -1L);
}
/**
* Creates a new JWT client authentication claims set verifier. The
* audience check is {@link JWTAudienceCheck#LEGACY legacy}.
*
* @param aud The permitted audience (aud) claim. Must not be
* empty or {@code null}. Should be the identity of
* the recipient, such as the issuer URI for an
* OpenID provider.
* @param expMaxAhead The maximum number of seconds the expiration time
* (exp) claim can be ahead of the current time, if
* zero or negative this check is disabled.
*/
public JWTAuthenticationClaimsSetVerifier(final Set aud,
final long expMaxAhead) {
this(aud, JWTAudienceCheck.LEGACY, expMaxAhead);
}
/**
* Creates a new JWT client authentication claims set verifier.
*
* @param aud The permitted audience (aud) claim. Must not be
* empty or {@code null}. Should be the identity of
* the recipient, such as the issuer URI for an
* OpenID provider. When the audience check is
* {@link JWTAudienceCheck#STRICT strict}, the
* permitted audience must be single-valued.
* @param audCheck The type of audience (aud) check. Must not be
* {@code null}.
* @param expMaxAhead The maximum number of seconds the expiration time
* (exp) claim can be ahead of the current time, if
* zero or negative this check is disabled.
*/
public JWTAuthenticationClaimsSetVerifier(final Set aud,
final JWTAudienceCheck audCheck,
final long expMaxAhead) {
super(aud, expMaxAhead);
if (JWTAudienceCheck.STRICT.equals(Objects.requireNonNull(audCheck)) && aud.size() != 1) {
throw new IllegalArgumentException("When strict the JWT audience must be single-valued");
}
this.audCheck = Objects.requireNonNull(audCheck);
}
/**
* Returns the configured audience check.
*
* @return The type of audience (aud) check.
*/
public JWTAudienceCheck getAudienceCheck() {
return audCheck;
}
@Override
public void verify(final JWTClaimsSet claimsSet, final SecurityContext securityContext)
throws BadJWTException {
super.verify(claimsSet, securityContext);
// iss == sub
if (! claimsSet.getIssuer().equals(claimsSet.getSubject())) {
throw ISS_SUB_MISMATCH_EXCEPTION;
}
if (JWTAudienceCheck.STRICT.equals(audCheck)) {
List audList = claimsSet.getAudience();
if (audList.size() != 1) {
throw new BadJWTException("JWT multi-valued audience rejected: " + audList);
}
}
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy