All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.unboundid.ldap.sdk.controls.ProxiedAuthorizationV2RequestControl Maven / Gradle / Ivy

/*
 * Copyright 2007-2019 Ping Identity Corporation
 * All Rights Reserved.
 */
/*
 * Copyright (C) 2008-2019 Ping Identity Corporation
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License (GPLv2 only)
 * or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
 * as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see .
 */
package com.unboundid.ldap.sdk.controls;



import com.unboundid.asn1.ASN1OctetString;
import com.unboundid.ldap.sdk.Control;
import com.unboundid.ldap.sdk.LDAPException;
import com.unboundid.ldap.sdk.ResultCode;
import com.unboundid.util.NotMutable;
import com.unboundid.util.ThreadSafety;
import com.unboundid.util.ThreadSafetyLevel;
import com.unboundid.util.Validator;

import static com.unboundid.ldap.sdk.controls.ControlMessages.*;



/**
 * This class provides an implementation of the proxied authorization V2
 * request control, as defined in
 * RFC 4370.  It may be used
 * to request that the associated operation be performed as if it has been
 * requested by some other user.
 * 

* The target authorization identity for this control is specified as an * "authzId" value as described in section 5.2.1.8 of * RFC 4513. That is, it * should be either "dn:" followed by the distinguished name of the target user, * or "u:" followed by the username. If the "u:" form is used, then the * mechanism used to resolve the provided username to an entry may vary from * server to server. *

* This control may be used in conjunction with add, delete, compare, delete, * extended, modify, modify DN, and search requests. In that case, the * associated operation will be processed under the authority of the specified * authorization identity rather than the identity associated with the client * connection (i.e., the user as whom that connection is bound). Note that * because of the inherent security risks associated with the use of the proxied * authorization control, most directory servers which support its use enforce * strict restrictions on the users that are allowed to request this control. * If a user attempts to use the proxied authorization V2 request control and * does not have sufficient permission to do so, then the server will return a * failure response with the {@link ResultCode#AUTHORIZATION_DENIED} result * code. *

* There is no corresponding response control for this request control. *

*

Example

* The following example demonstrates the use of the proxied authorization V2 * control to delete an entry under the authority of the user with username * "alternate.user": *
 * // Create a delete request to delete an entry.  Include the proxied
 * // authorization v2 request control in the delete request so that the
 * // delete will be processed as the user with username "alternate.user"
 * // instead of the user that's actually authenticated on the connection.
 * DeleteRequest deleteRequest =
 *      new DeleteRequest("uid=test.user,ou=People,dc=example,dc=com");
 * deleteRequest.addControl(new ProxiedAuthorizationV2RequestControl(
 *      "u:alternate.user"));
 *
 * LDAPResult deleteResult;
 * try
 * {
 *   deleteResult = connection.delete(deleteRequest);
 *   // If we got here, then the delete was successful.
 * }
 * catch (LDAPException le)
 * {
 *   // The delete failed for some reason.  In addition to all of the normal
 *   // reasons a delete could fail (e.g., the entry doesn't exist, or has one
 *   // or more subordinates), proxied-authorization specific failures may
 *   // include that the authenticated user doesn't have permission to use the
 *   // proxied authorization control to impersonate the alternate user, that
 *   // the alternate user doesn't exist, or that the alternate user doesn't
 *   // have permission to perform the requested operation.
 *   deleteResult = le.toLDAPResult();
 *   ResultCode resultCode = le.getResultCode();
 *   String errorMessageFromServer = le.getDiagnosticMessage();
 * }
 * 
*/ @NotMutable() @ThreadSafety(level=ThreadSafetyLevel.COMPLETELY_THREADSAFE) public final class ProxiedAuthorizationV2RequestControl extends Control { /** * The OID (2.16.840.1.113730.3.4.18) for the proxied authorization v2 request * control. */ public static final String PROXIED_AUTHORIZATION_V2_REQUEST_OID = "2.16.840.1.113730.3.4.18"; /** * The serial version UID for this serializable class. */ private static final long serialVersionUID = 1054244283964851067L; // The authorization ID string that may be used to identify the user under // whose authorization the associated operation should be performed. private final String authorizationID; /** * Creates a new proxied authorization V2 request control that will proxy as * the specified user. * * @param authorizationID The authorization ID string that will be used to * identify the user under whose authorization the * associated operation should be performed. It may * take one of three forms: it can be an empty * string (to indicate that the operation should use * anonymous authorization), a string that begins * with "dn:" and is followed by the DN of the target * user, or a string that begins with "u:" and is * followed by the username for the target user * (where the process of mapping the provided * username to the corresponding entry will depend on * the server configuration). It must not be * {@code null}. */ public ProxiedAuthorizationV2RequestControl(final String authorizationID) { super(PROXIED_AUTHORIZATION_V2_REQUEST_OID, true, new ASN1OctetString(authorizationID)); Validator.ensureNotNull(authorizationID); this.authorizationID = authorizationID; } /** * Creates a new proxied authorization v2 request control which is decoded * from the provided generic control. * * @param control The generic control to be decoded as a proxied * authorization v2 request control. * * @throws LDAPException If the provided control cannot be decoded as a * proxied authorization v2 request control. */ public ProxiedAuthorizationV2RequestControl(final Control control) throws LDAPException { super(control); final ASN1OctetString value = control.getValue(); if (value == null) { throw new LDAPException(ResultCode.DECODING_ERROR, ERR_PROXY_V2_NO_VALUE.get()); } authorizationID = value.stringValue(); } /** * Retrieves the authorization ID string that will be used to identify the * user under whose authorization the associated operation should be * performed. * * @return The authorization ID string that will be used to identify the user * under whose authorization the associated operation should be * performed. */ public String getAuthorizationID() { return authorizationID; } /** * {@inheritDoc} */ @Override() public String getControlName() { return INFO_CONTROL_NAME_PROXIED_AUTHZ_V2_REQUEST.get(); } /** * {@inheritDoc} */ @Override() public void toString(final StringBuilder buffer) { buffer.append("ProxiedAuthorizationV2RequestControl(authorizationID='"); buffer.append(authorizationID); buffer.append("')"); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy