All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.nimbusds.oauth2.sdk.assertions.jwt.JWTAssertionDetailsVerifier Maven / Gradle / Ivy

Go to download

OAuth 2.0 SDK with OpenID Connection extensions for developing client and server applications.

There is a newer version: 11.19
Show newest version
/*
 * oauth2-oidc-sdk
 *
 * Copyright 2012-2016, Connect2id Ltd and contributors.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use
 * this file except in compliance with the License. You may obtain a copy of the
 * License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed
 * under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the
 * specific language governing permissions and limitations under the License.
 */

package com.nimbusds.oauth2.sdk.assertions.jwt;


import java.util.Set;

import com.nimbusds.jose.proc.SecurityContext;
import com.nimbusds.jwt.JWTClaimsSet;
import com.nimbusds.jwt.proc.BadJWTException;
import com.nimbusds.jwt.proc.DefaultJWTClaimsVerifier;
import com.nimbusds.oauth2.sdk.id.Audience;
import com.nimbusds.oauth2.sdk.util.CollectionUtils;
import net.jcip.annotations.Immutable;


/**
 * JSON Web Token (JWT) bearer assertion details (claims set) verifier for
 * OAuth 2.0 client authentication and authorisation grants. Intended for
 * initial validation of JWT assertions:
 *
 * 
    *
  • Audience check *
  • Expiration time check *
  • Not-before time check (is set) *
  • Subject and issuer presence check *
* *

Related specifications: * *

    *
  • JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and * Authorization Grants (RFC 7523). *
*/ @Immutable public class JWTAssertionDetailsVerifier extends DefaultJWTClaimsVerifier { // Cache JWT exceptions for quick processing of bad claims sets /** * Missing JWT expiration claim. */ private static final BadJWTException MISSING_EXP_CLAIM_EXCEPTION = new BadJWTException("Missing JWT expiration claim"); /** * Missing JWT audience claim. */ private static final BadJWTException MISSING_AUD_CLAIM_EXCEPTION = new BadJWTException("Missing JWT audience claim"); /** * Missing JWT subject claim. */ private static final BadJWTException MISSING_SUB_CLAIM_EXCEPTION = new BadJWTException("Missing JWT subject claim"); /** * Missing JWT issuer claim. */ private static final BadJWTException MISSING_ISS_CLAIM_EXCEPTION = new BadJWTException("Missing JWT issuer claim"); /** * The expected audience. */ private final Set expectedAudience; /** * Creates a new JWT bearer assertion details (claims set) verifier. * * @param expectedAudience The expected audience (aud) claim values. * Must not be empty or {@code null}. Should * typically contain the token endpoint URI and * for OpenID provider it may also include the * issuer URI. */ public JWTAssertionDetailsVerifier(final Set expectedAudience) { if (CollectionUtils.isEmpty(expectedAudience)) { throw new IllegalArgumentException("The expected audience set must not be null or empty"); } this.expectedAudience = expectedAudience; } /** * Returns the expected audience values. * * @return The expected audience (aud) claim values. */ public Set getExpectedAudience() { return expectedAudience; } @Override public void verify(final JWTClaimsSet claimsSet, final SecurityContext securityContext) throws BadJWTException { super.verify(claimsSet, null); if (claimsSet.getExpirationTime() == null) { throw MISSING_EXP_CLAIM_EXCEPTION; } if (claimsSet.getAudience() == null || claimsSet.getAudience().isEmpty()) { throw MISSING_AUD_CLAIM_EXCEPTION; } boolean audMatch = false; for (String aud: claimsSet.getAudience()) { if (aud == null || aud.isEmpty()) { continue; // skip } if (expectedAudience.contains(new Audience(aud))) { audMatch = true; } } if (! audMatch) { throw new BadJWTException("Invalid JWT audience claim, expected " + expectedAudience); } if (claimsSet.getIssuer() == null) { throw MISSING_ISS_CLAIM_EXCEPTION; } if (claimsSet.getSubject() == null) { throw MISSING_SUB_CLAIM_EXCEPTION; } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy