![JAR search and dependency download from the Maven repository](/logo.png)
com.unboundid.ldap.sdk.controls.ProxiedAuthorizationV1RequestControl Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of unboundid-ldapsdk Show documentation
Show all versions of unboundid-ldapsdk Show documentation
The UnboundID LDAP SDK for Java is a fast, comprehensive, and easy-to-use
Java API for communicating with LDAP directory servers and performing
related tasks like reading and writing LDIF, encoding and decoding data
using base64 and ASN.1 BER, and performing secure communication. This
package contains the Standard Edition of the LDAP SDK, which is a
complete, general-purpose library for communicating with LDAPv3 directory
servers.
/*
* Copyright 2007-2018 Ping Identity Corporation
* All Rights Reserved.
*/
/*
* Copyright (C) 2008-2018 Ping Identity Corporation
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License (GPLv2 only)
* or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see .
*/
package com.unboundid.ldap.sdk.controls;
import com.unboundid.asn1.ASN1Element;
import com.unboundid.asn1.ASN1OctetString;
import com.unboundid.asn1.ASN1Sequence;
import com.unboundid.ldap.sdk.Control;
import com.unboundid.ldap.sdk.DN;
import com.unboundid.ldap.sdk.LDAPException;
import com.unboundid.ldap.sdk.ResultCode;
import com.unboundid.util.Debug;
import com.unboundid.util.NotMutable;
import com.unboundid.util.ThreadSafety;
import com.unboundid.util.ThreadSafetyLevel;
import com.unboundid.util.Validator;
import static com.unboundid.ldap.sdk.controls.ControlMessages.*;
/**
* This class provides an implementation of the proxied authorization V1
* request control, which may be used to request that the associated operation
* be performed as if it had been requested by some other user. It is based on
* the specification provided in early versions of the
* draft-weltman-ldapv3-proxy Internet Draft (this implementation is based on
* the "-04" revision). Later versions of the draft, and subsequently
* RFC 4370, define a second
* version of the proxied authorization control with a different OID and
* different value format. This control is supported primarily for legacy
* purposes, and it is recommended that new applications use the
* {@link ProxiedAuthorizationV2RequestControl} instead if this version.
*
* The value of this control includes the DN of the user as whom the operation
* should be performed. Note that it should be a distinguished name, and not an
* authzId value as is used in the proxied authorization V2 control.
*
* This control may be used in conjunction with add, delete, compare, delete,
* extended, modify, modify DN, and search requests. In that case, the
* associated operation will be processed under the authority of the specified
* authorization identity rather than the identity associated with the client
* connection (i.e., the user as whom that connection is bound). Note that
* because of the inherent security risks associated with the use of the proxied
* authorization control, most directory servers which support its use enforce
* strict restrictions on the users that are allowed to request this control.
* Note that while the directory server should return a
* {@link ResultCode#AUTHORIZATION_DENIED} result for a proxied authorization V2
* control if the requester does not have the appropriate permission to use that
* control, this result will not necessarily be used for the same condition with
* the proxied authorization V1 control because this result code was not defined
* until the release of the proxied authorization V2 specification.
* code.
*
* There is no corresponding response control for this request control.
*
* Example
* The following example demonstrates the use of the proxied authorization V1
* control to delete an entry under the authority of the user with DN
* "uid=alternate.user,ou=People,dc=example,dc=com":
*
* // Create a delete request to delete an entry. Include the proxied
* // authorization v1 request control in the delete request so that the
* // delete will be processed as user
* // "uid=alternate.user,ou=People,dc=example,dc=com" instead of the user
* // that's actually authenticated on the connection.
* DeleteRequest deleteRequest =
* new DeleteRequest("uid=test.user,ou=People,dc=example,dc=com");
* deleteRequest.addControl(new ProxiedAuthorizationV1RequestControl(
* "uid=alternate.user,ou=People,dc=example,dc=com"));
*
* LDAPResult deleteResult;
* try
* {
* deleteResult = connection.delete(deleteRequest);
* // If we got here, then the delete was successful.
* }
* catch (LDAPException le)
* {
* // The delete failed for some reason. In addition to all of the normal
* // reasons a delete could fail (e.g., the entry doesn't exist, or has one
* // or more subordinates), proxied-authorization specific failures may
* // include that the authenticated user doesn't have permission to use the
* // proxied authorization control to impersonate the alternate user, that
* // the alternate user doesn't exist, or that the alternate user doesn't
* // have permission to perform the requested operation.
* deleteResult = le.toLDAPResult();
* ResultCode resultCode = le.getResultCode();
* String errorMessageFromServer = le.getDiagnosticMessage();
* }
*
*/
@NotMutable()
@ThreadSafety(level=ThreadSafetyLevel.COMPLETELY_THREADSAFE)
public final class ProxiedAuthorizationV1RequestControl
extends Control
{
/**
* The OID (2.16.840.1.113730.3.4.12) for the proxied authorization v1 request
* control.
*/
public static final String PROXIED_AUTHORIZATION_V1_REQUEST_OID =
"2.16.840.1.113730.3.4.12";
/**
* The serial version UID for this serializable class.
*/
private static final long serialVersionUID = 7312632337431962774L;
// The DN of the target user under whose authorization the associated
// operation should be performed.
private final String proxyDN;
/**
* Creates a new proxied authorization V1 request control that will proxy as
* the specified user.
*
* @param proxyDN The DN of the target user under whose authorization the
* associated request should be performed. It must not be
* {@code null}, although it may be an empty string to
* request an anonymous authorization.
*/
public ProxiedAuthorizationV1RequestControl(final String proxyDN)
{
super(PROXIED_AUTHORIZATION_V1_REQUEST_OID, true, encodeValue(proxyDN));
Validator.ensureNotNull(proxyDN);
this.proxyDN = proxyDN;
}
/**
* Creates a new proxied authorization V1 request control that will proxy as
* the specified user.
*
* @param proxyDN The DN of the target user under whose authorization the
* associated request should be performed. It must not be
* {@code null}.
*/
public ProxiedAuthorizationV1RequestControl(final DN proxyDN)
{
super(PROXIED_AUTHORIZATION_V1_REQUEST_OID, true,
encodeValue(proxyDN.toString()));
this.proxyDN = proxyDN.toString();
}
/**
* Creates a new proxied authorization v1 request control which is decoded
* from the provided generic control.
*
* @param control The generic control to be decoded as a proxied
* authorization v1 request control.
*
* @throws LDAPException If the provided control cannot be decoded as a
* proxied authorization v1 request control.
*/
public ProxiedAuthorizationV1RequestControl(final Control control)
throws LDAPException
{
super(control);
final ASN1OctetString value = control.getValue();
if (value == null)
{
throw new LDAPException(ResultCode.DECODING_ERROR,
ERR_PROXY_V1_NO_VALUE.get());
}
try
{
final ASN1Element valueElement = ASN1Element.decode(value.getValue());
final ASN1Element[] elements =
ASN1Sequence.decodeAsSequence(valueElement).elements();
proxyDN = ASN1OctetString.decodeAsOctetString(elements[0]).stringValue();
}
catch (final Exception e)
{
Debug.debugException(e);
throw new LDAPException(ResultCode.DECODING_ERROR,
ERR_PROXYV1_DECODE_ERROR.get(e), e);
}
}
/**
* Encodes the provided information into an octet string that can be used as
* the value for this control.
*
* @param proxyDN The DN of the target user under whose authorization the
* associated request should be performed. It must not be
* {@code null}, although it may be an empty string to
* request an anonymous authorization.
*
* @return An ASN.1 octet string that can be used as the value for this
* control.
*/
private static ASN1OctetString encodeValue(final String proxyDN)
{
final ASN1Element[] valueElements =
{
new ASN1OctetString(proxyDN)
};
return new ASN1OctetString(new ASN1Sequence(valueElements).encode());
}
/**
* Retrieves the DN of the target user under whose authorization the
* associated request should be performed.
*
* @return The DN of the target user under whose authorization the associated
* request should be performed.
*/
public String getProxyDN()
{
return proxyDN;
}
/**
* {@inheritDoc}
*/
@Override()
public String getControlName()
{
return INFO_CONTROL_NAME_PROXIED_AUTHZ_V1_REQUEST.get();
}
/**
* {@inheritDoc}
*/
@Override()
public void toString(final StringBuilder buffer)
{
buffer.append("ProxiedAuthorizationV1RequestControl(proxyDN='");
buffer.append(proxyDN);
buffer.append("')");
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy