All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.unboundid.ldap.sdk.unboundidds.extensions.GenerateTOTPSharedSecretExtendedRequest Maven / Gradle / Ivy

/*
 * Copyright 2016-2019 Ping Identity Corporation
 * All Rights Reserved.
 */
/*
 * Copyright (C) 2016-2019 Ping Identity Corporation
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License (GPLv2 only)
 * or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
 * as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see .
 */
package com.unboundid.ldap.sdk.unboundidds.extensions;



import java.util.ArrayList;

import com.unboundid.asn1.ASN1Element;
import com.unboundid.asn1.ASN1OctetString;
import com.unboundid.asn1.ASN1Sequence;
import com.unboundid.ldap.sdk.Control;
import com.unboundid.ldap.sdk.ExtendedRequest;
import com.unboundid.ldap.sdk.LDAPConnection;
import com.unboundid.ldap.sdk.LDAPException;
import com.unboundid.ldap.sdk.ResultCode;
import com.unboundid.util.Debug;
import com.unboundid.util.NotMutable;
import com.unboundid.util.StaticUtils;
import com.unboundid.util.ThreadSafety;
import com.unboundid.util.ThreadSafetyLevel;
import com.unboundid.util.Validator;

import static com.unboundid.ldap.sdk.unboundidds.extensions.ExtOpMessages.*;



/**
 * This class provides an implementation of an extended request that may be used
 * to generate a shared secret for use in generating TOTP authentication codes
 * (as per RFC 6238, for
 * example, using the mechanism provided in the
 * {@link com.unboundid.ldap.sdk.unboundidds.OneTimePassword} class), which can
 * be used to authenticate to the server via the
 * {@link com.unboundid.ldap.sdk.unboundidds.UnboundIDTOTPBindRequest}.
 * 
*
* NOTE: This class, and other classes within the * {@code com.unboundid.ldap.sdk.unboundidds} package structure, are only * supported for use against Ping Identity, UnboundID, and * Nokia/Alcatel-Lucent 8661 server products. These classes provide support * for proprietary functionality or for external specifications that are not * considered stable or mature enough to be guaranteed to work in an * interoperable way with other types of LDAP servers. *
*
* This request may be invoked in one of following ways: *

*
    *
  • * With a {@code null} authentication identity and a non-{@code null} static * password. In this case, the authorization identity for the operation * (typically the user as whom the underlying connection is authenticated, * but possibly a different user if the request also includes a control like * the proxied authorization or intermediate client request control that * specifies and alternate authorization identity, or if the client * authenticated with a SASL mechanism that included an alternate * authorization identity) will be used as the authentication identity for * this request, and the static password must be valid for that user. This * will be treated as a user requesting a TOTP shared secret for their own * account. *
  • *
  • * With a non-{@code null} authentication identity (which may or may not * match the authorization identity for the operation) and a * non-{@code null} static password that is valid for the provided * authentication identity. This will also be treated as a user requesting * a TOTP shared secret for their own account. *
  • *
  • * With a non-{@code null} authentication identity and a {@code null} static * password. In this case, the authentication identity must not match the * authorization identity for the operation, and the authorization identity * must have the password-reset privilege. This will be treated as an * administrator requesting a TOTP shared secret on behalf of a user and is * recommended only for the case in which the identity of the user has been * verified through some means other than a static password. *
  • *
*

* If the request is processed successfully, the server will generate a TOTP * shared secret for the user, will store it in the user's entry, and will * return that secret back to the client via the * {@link GenerateTOTPSharedSecretExtendedResult}. *

* Note that this operation will not interfere with any other TOTP shared * secrets that may already exist in the user's entry; the new shared secret * will be merged with any existing shared secret values for the user. If a * TOTP shared secret is no longer needed, the * {@link RevokeTOTPSharedSecretExtendedRequest} may be used to remove it from * the user's account. *

* This extended request has an OID of 1.3.6.1.4.1.30221.2.6.56, and it must * include a request value with the following encoding: *

*
 *   GenerateTOTPSharedSecretRequest ::= SEQUENCE {
 *        authenticationID     [0] OCTET STRING OPTIONAL,
 *        staticPassword       [1] OCTET STRING OPTIONAL,
 *        ... }
 * 
* */ @NotMutable() @ThreadSafety(level=ThreadSafetyLevel.COMPLETELY_THREADSAFE) public final class GenerateTOTPSharedSecretExtendedRequest extends ExtendedRequest { /** * The OID (1.3.6.1.4.1.30221.2.6.56) for the generate TOTP shared secret * extended request. */ public static final String GENERATE_TOTP_SHARED_SECRET_REQUEST_OID = "1.3.6.1.4.1.30221.2.6.56"; /** * The BER type for the authentication ID element of the request value * sequence. */ private static final byte TYPE_AUTHENTICATION_ID = (byte) 0x80; /** * The BER type for the static password element of the request value sequence. */ private static final byte TYPE_STATIC_PASSWORD = (byte) 0x81; /** * The serial version UID for this serializable class. */ private static final long serialVersionUID = -1617090986047944957L; // The static password for the request. private final ASN1OctetString staticPassword; // The authentication ID for the request. private final String authenticationID; /** * Creates a new generate TOTP shared secret extended request with the * provided information. * * @param authenticationID The authentication ID to use to identify the user * for whom to generate the TOTP shared secret. It * should be a string in the form "dn:" followed by * the DN of the target user, or "u:" followed by * the username. It may be {@code null} if the TOTP * shared secret is to be generated for the * authorization identity for the operation, and * only if the {@code staticPassword} is * non-{@code null}). * @param staticPassword The static password of the user for whom to * generate the TOTP shared secret. It may be * {@code null} only if the {@code authenticationID} * is non-{@code null}, is different from the * operation's authorization identity, and the * operation's authorization identity has the * password-reset privilege. * @param controls The set of controls to include in the request. * It may be {@code null} or empty if there should * not be any request controls. */ public GenerateTOTPSharedSecretExtendedRequest(final String authenticationID, final String staticPassword, final Control... controls) { this(authenticationID, encodePassword(staticPassword), controls); } /** * Creates a new generate TOTP shared secret extended request with the * provided information. * * @param authenticationID The authentication ID to use to identify the user * for whom to generate the TOTP shared secret. It * should be a string in the form "dn:" followed by * the DN of the target user, or "u:" followed by * the username. It may be {@code null} if the TOTP * shared secret is to be generated for the * authorization identity for the operation, and * only if the {@code staticPassword} is * non-{@code null}). * @param staticPassword The static password of the user for whom to * generate the TOTP shared secret. It may be * {@code null} only if the {@code authenticationID} * is non-{@code null}, is different from the * operation's authorization identity, and the * operation's authorization identity has the * password-reset privilege. * @param controls The set of controls to include in the request. * It may be {@code null} or empty if there should * not be any request controls. */ public GenerateTOTPSharedSecretExtendedRequest(final String authenticationID, final byte[] staticPassword, final Control... controls) { this(authenticationID, encodePassword(staticPassword), controls); } /** * Creates a new generate TOTP shared secret extended request with the * provided information. * * @param authenticationID The authentication ID to use to identify the user * for whom to generate the TOTP shared secret. It * should be a string in the form "dn:" followed by * the DN of the target user, or "u:" followed by * the username. It may be {@code null} if the TOTP * shared secret is to be generated for the * authorization identity for the operation, and * only if the {@code staticPassword} is * non-{@code null}). * @param staticPassword The static password of the user for whom to * generate the TOTP shared secret. It may be * {@code null} only if the {@code authenticationID} * is non-{@code null}, is different from the * operation's authorization identity, and the * operation's authorization identity has the * password-reset privilege. * @param controls The set of controls to include in the request. * It may be {@code null} or empty if there should * not be any request controls. */ public GenerateTOTPSharedSecretExtendedRequest(final String authenticationID, final ASN1OctetString staticPassword, final Control... controls) { super(GENERATE_TOTP_SHARED_SECRET_REQUEST_OID, encodeValue(authenticationID, staticPassword), controls); this.authenticationID = authenticationID; this.staticPassword = staticPassword; } /** * Creates a new generate TOTP shared secret extended request that is decoded * from the provided generic extended request. * * @param request The generic extended request to decode as a generate TOTP * shared secret request. * * @throws LDAPException If a problem is encountered while attempting to * decode the provided request. */ public GenerateTOTPSharedSecretExtendedRequest(final ExtendedRequest request) throws LDAPException { super(request); final ASN1OctetString value = request.getValue(); if (value == null) { throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GEN_TOTP_SECRET_REQUEST_NO_VALUE.get()); } try { String authID = null; ASN1OctetString staticPW = null; for (final ASN1Element e : ASN1Sequence.decodeAsSequence(value.getValue()).elements()) { switch (e.getType()) { case TYPE_AUTHENTICATION_ID: authID = ASN1OctetString.decodeAsOctetString(e).stringValue(); break; case TYPE_STATIC_PASSWORD: staticPW = ASN1OctetString.decodeAsOctetString(e); break; default: throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GEN_TOTP_SECRET_REQUEST_UNRECOGNIZED_TYPE.get( StaticUtils.toHex(e.getType()))); } } if ((authID == null) && (staticPW == null)) { throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GEN_TOTP_SECRET_REQUEST_NEITHER_AUTHN_ID_NOR_PW.get()); } authenticationID = authID; staticPassword = staticPW; } catch (final LDAPException le) { Debug.debugException(le); throw le; } catch (final Exception e) { Debug.debugException(e); throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GEN_TOTP_SECRET_REQUEST_ERROR_DECODING_VALUE.get( StaticUtils.getExceptionMessage(e)), e); } } /** * Encodes the provided password as an ASN.1 octet string suitable for * inclusion in the encoded request. * * @param password The password to be encoded. It may be {@code null} if * no password should be included. If it is * non-{@code null}, then it must be a string or a byte * array. * * @return The encoded password, or {@code null} if no password was given. */ private static ASN1OctetString encodePassword(final Object password) { if (password == null) { return null; } else if (password instanceof byte[]) { return new ASN1OctetString(TYPE_STATIC_PASSWORD, (byte[]) password); } else { return new ASN1OctetString(TYPE_STATIC_PASSWORD, String.valueOf(password)); } } /** * Encodes the provided information into an ASN.1 octet string suitable for * use as the value of this extended request. * * @param authenticationID The authentication ID to use to identify the user * for whom to generate the TOTP shared secret. It * should be a string in the form "dn:" followed by * the DN of the target user, or "u:" followed by * the username. It may be {@code null} if the TOTP * shared secret is to be generated for the * authorization identity for the operation, and * only if the {@code staticPassword} is * non-{@code null}). * @param staticPassword The static password of the user for whom to * generate the TOTP shared secret. It may be * {@code null} only if the {@code authenticationID} * is non-{@code null}, is different from the * operation's authorization identity, and the * operation's authorization identity has the * password-reset privilege. * * @return The ASN.1 octet string containing the encoded request value. */ private static ASN1OctetString encodeValue(final String authenticationID, final ASN1OctetString staticPassword) { if (authenticationID == null) { Validator.ensureTrue((staticPassword != null), "If the authentication ID is null, the static password must be " + "non-null."); } final ArrayList elements = new ArrayList<>(2); if (authenticationID != null) { elements.add( new ASN1OctetString(TYPE_AUTHENTICATION_ID, authenticationID)); } if (staticPassword != null) { elements.add(staticPassword); } return new ASN1OctetString(new ASN1Sequence(elements).encode()); } /** * Retrieves the authentication ID that identifies the user for whom to * generate the TOTP shared secret, if provided. * * @return The authentication ID that identifies the target user, or * {@code null} if the shared secret is to be generated for the * authorization identity associated with the extended request. */ public String getAuthenticationID() { return authenticationID; } /** * Retrieves the string representation of the static password for the target * user, if provided. * * @return The string representation of the static password for the target * user, or {@code null} if no static password was provided. */ public String getStaticPasswordString() { if (staticPassword == null) { return null; } else { return staticPassword.stringValue(); } } /** * Retrieves the bytes that comprise the static password for the target user, * if provided. * * @return The bytes that comprise the static password for the target user, * or {@code null} if no static password was provided. */ public byte[] getStaticPasswordBytes() { if (staticPassword == null) { return null; } else { return staticPassword.getValue(); } } /** * {@inheritDoc} */ @Override() protected GenerateTOTPSharedSecretExtendedResult process( final LDAPConnection connection, final int depth) throws LDAPException { return new GenerateTOTPSharedSecretExtendedResult( super.process(connection, depth)); } /** * {@inheritDoc} */ @Override() public GenerateTOTPSharedSecretExtendedRequest duplicate() { return duplicate(getControls()); } /** * {@inheritDoc} */ @Override() public GenerateTOTPSharedSecretExtendedRequest duplicate( final Control[] controls) { final GenerateTOTPSharedSecretExtendedRequest r = new GenerateTOTPSharedSecretExtendedRequest(authenticationID, staticPassword, controls); r.setResponseTimeoutMillis(getResponseTimeoutMillis(null)); return r; } /** * {@inheritDoc} */ @Override() public String getExtendedRequestName() { return INFO_GEN_TOTP_SECRET_REQUEST_NAME.get(); } /** * {@inheritDoc} */ @Override() public void toString(final StringBuilder buffer) { buffer.append("GenerateTOTPSharedSecretExtendedRequest("); if (authenticationID != null) { buffer.append("authenticationID='"); buffer.append(authenticationID); buffer.append("', "); } buffer.append("staticPasswordProvided="); buffer.append(staticPassword != null); final Control[] controls = getControls(); if (controls.length > 0) { buffer.append(", controls={"); for (int i=0; i < controls.length; i++) { if (i > 0) { buffer.append(", "); } buffer.append(controls[i]); } buffer.append('}'); } buffer.append(')'); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy