All Downloads are FREE. Search and download functionalities are using the official Maven repository.

ee.sk.smartid.AuthenticationRequestBuilder Maven / Gradle / Ivy

Go to download

Smart-ID Java client is a Java library that can be used for easy integration of the Smart-ID solution to information systems or e-services

There is a newer version: 2.3
Show newest version
package ee.sk.smartid;

/*-
 * #%L
 * Smart ID sample Java client
 * %%
 * Copyright (C) 2018 SK ID Solutions AS
 * %%
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 * of this software and associated documentation files (the "Software"), to deal
 * in the Software without restriction, including without limitation the rights
 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 * copies of the Software, and to permit persons to whom the Software is
 * furnished to do so, subject to the following conditions:
 * 
 * The above copyright notice and this permission notice shall be included in
 * all copies or substantial portions of the Software.
 * 
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
 * THE SOFTWARE.
 * #L%
 */

import static org.apache.commons.lang3.StringUtils.isNotEmpty;

import java.util.Arrays;
import java.util.HashSet;
import java.util.List;
import java.util.Objects;
import java.util.stream.Collectors;

import ee.sk.smartid.exception.UnprocessableSmartIdResponseException;
import ee.sk.smartid.exception.permanent.ServerMaintenanceException;
import ee.sk.smartid.exception.useraccount.DocumentUnusableException;
import ee.sk.smartid.exception.useraccount.UserAccountNotFoundException;
import ee.sk.smartid.exception.useraction.SessionTimeoutException;
import ee.sk.smartid.exception.useraction.UserRefusedException;
import ee.sk.smartid.exception.useraction.UserSelectedWrongVerificationCodeException;
import ee.sk.smartid.rest.SessionStatusPoller;
import ee.sk.smartid.rest.SmartIdConnector;
import ee.sk.smartid.rest.dao.AuthenticationSessionRequest;
import ee.sk.smartid.rest.dao.AuthenticationSessionResponse;
import ee.sk.smartid.rest.dao.Capability;
import ee.sk.smartid.rest.dao.Interaction;
import ee.sk.smartid.rest.dao.SemanticsIdentifier;
import ee.sk.smartid.rest.dao.SessionCertificate;
import ee.sk.smartid.rest.dao.SessionResult;
import ee.sk.smartid.rest.dao.SessionSignature;
import ee.sk.smartid.rest.dao.SessionStatus;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

/**
 * Class for building authentication request and getting the response
 * 

* Mandatory request parameters: *

    *
  • Host url - can be set on the {@link ee.sk.smartid.SmartIdClient} level
  • *
  • Relying party uuid - can either be set on the client or builder level
  • *
  • Relying party name - can either be set on the client or builder level
  • *
  • Either Document number or semantics identifier or private company identifier
  • *
  • Authentication hash
  • *
* Optional request parameters: *
    *
  • Certificate level
  • *
  • Display text
  • *
  • Nonce
  • *
*/ public class AuthenticationRequestBuilder extends SmartIdRequestBuilder { private static final Logger logger = LoggerFactory.getLogger(AuthenticationRequestBuilder.class); /** * Constructs a new {@code AuthenticationRequestBuilder} * * @param connector for requesting authentication initiation * @param sessionStatusPoller for polling the authentication response */ public AuthenticationRequestBuilder(SmartIdConnector connector, SessionStatusPoller sessionStatusPoller) { super(connector, sessionStatusPoller); logger.debug("Instantiating authentication request builder"); } /** * Sets the request's UUID of the relying party *

* If not for explicit need, it is recommended to use * {@link ee.sk.smartid.SmartIdClient#setRelyingPartyUUID(String)} * instead. In that case when getting the builder from * {@link ee.sk.smartid.SmartIdClient} it is not required * to set the UUID every time when building a new request. * * @param relyingPartyUUID UUID of the relying party * @return this builder */ public AuthenticationRequestBuilder withRelyingPartyUUID(String relyingPartyUUID) { this.relyingPartyUUID = relyingPartyUUID; return this; } /** * Sets the request's name of the relying party *

* If not for explicit need, it is recommended to use * {@link ee.sk.smartid.SmartIdClient#setRelyingPartyName(String)} * instead. In that case when getting the builder from * {@link ee.sk.smartid.SmartIdClient} it is not required * to set name every time when building a new request. * * @param relyingPartyName name of the relying party * @return this builder */ public AuthenticationRequestBuilder withRelyingPartyName(String relyingPartyName) { this.relyingPartyName = relyingPartyName; return this; } /** * Sets the request's document number *

* Document number is unique for the user's certificate/device * that is used for the authentication. * * @param documentNumber document number of the certificate/device to be authenticated * @return this builder */ public AuthenticationRequestBuilder withDocumentNumber(String documentNumber) { this.documentNumber = documentNumber; return this; } /** * Sets the request's personal semantics identifier *

* Semantics identifier consists of identity type, country code, a hyphen and the identifier. * * @param semanticsIdentifier semantics identifier for a person * @return this builder */ public AuthenticationRequestBuilder withSemanticsIdentifierAsString(String semanticsIdentifier) { this.semanticsIdentifier = new SemanticsIdentifier(semanticsIdentifier); return this; } /** * Sets the request's personal semantics identifier *

* Semantics identifier consists of identity type, country code, and the identifier. * * @param semanticsIdentifier semantics identifier for a person * @return this builder */ public AuthenticationRequestBuilder withSemanticsIdentifier(SemanticsIdentifier semanticsIdentifier) { this.semanticsIdentifier = semanticsIdentifier; return this; } /** * Sets the request's authentication hash *

* It is the hash that is signed by a person's device * which is essential for the authentication verification. * For security reasons the hash should be generated * randomly for every new request. It is recommended to use: * {@link ee.sk.smartid.AuthenticationHash#generateRandomHash()} * * @param authenticationHash hash used to sign for authentication * @return this builder */ public AuthenticationRequestBuilder withAuthenticationHash(AuthenticationHash authenticationHash) { this.hashToSign = authenticationHash; return this; } /** * Sets the request's certificate level *

* Defines the minimum required level of the certificate. * Optional. When not set, it defaults to what is configured * on the server side i.e. "QUALIFIED". * * @param certificateLevel the level of the certificate * @return this builder */ public AuthenticationRequestBuilder withCertificateLevel(String certificateLevel) { this.certificateLevel = certificateLevel; return this; } /** * Sets the request's nonce *

* By default the authentication's initiation request * has idempotent behaviour meaning when the request * is repeated inside a given time frame with exactly * the same parameters, session ID of an existing session * can be returned as a result. When requester wants, it can * override the idempotent behaviour inside of this time frame * using an optional "nonce" parameter present for all POST requests. *

* Normally, this parameter can be omitted. * * @param nonce nonce of the request * @return this builder */ public AuthenticationRequestBuilder withNonce(String nonce) { this.nonce = nonce; return this; } /** * Specifies capabilities of the user *

* By default there are no specified capabilities. * The capabilities need to be specified in case of * a restricted Smart ID user * {@link #withCapabilities(String...)} * @param capabilities are specified capabilities for a restricted Smart ID user * and is one of [QUALIFIED, ADVANCED] * @return this builder */ public AuthenticationRequestBuilder withCapabilities(Capability... capabilities) { this.capabilities = Arrays.stream(capabilities).map(Objects::toString).collect(Collectors.toSet()); return this; } /** * Specifies capabilities of the user *

* * By default there are no specified capabilities. * The capabilities need to be specified in case of * a restricted Smart ID user * {@link #withCapabilities(Capability...)} * @param capabilities are specified capabilities for a restricted Smart ID user * and is one of ["QUALIFIED", "ADVANCED"] * @return this builder */ public AuthenticationRequestBuilder withCapabilities(String... capabilities) { this.capabilities = new HashSet<>(Arrays.asList(capabilities)); return this; } /** * @param allowedInteractionsOrder Preferred order of what dialog to present to user. What actually gets displayed depends on user's device and its software version. * First option from this list that the device is capable of handling is displayed to the user. * @return this builder */ public AuthenticationRequestBuilder withAllowedInteractionsOrder(List allowedInteractionsOrder) { this.allowedInteractionsOrder = allowedInteractionsOrder; return this; } /** * Send the authentication request and get the response *

* This method uses automatic session status polling internally * and therefore blocks the current thread until authentication is concluded/interrupted etc. * * @throws UserAccountNotFoundException when the user account was not found * @throws UserRefusedException when the user has refused the session. NB! This exception has subclasses to determine the screen where user pressed cancel. * @throws UserSelectedWrongVerificationCodeException when user was presented with three control codes and user selected wrong code * @throws SessionTimeoutException when there was a timeout, i.e. end user did not confirm or refuse the operation within given timeframe * @throws DocumentUnusableException when for some reason, this relying party request cannot be completed. * User must either check his/her Smart-ID mobile application or turn to customer support for getting the exact reason. * @throws ServerMaintenanceException when the server is under maintenance * * @return the authentication response */ public SmartIdAuthenticationResponse authenticate() throws UserAccountNotFoundException, UserRefusedException, UserSelectedWrongVerificationCodeException, SessionTimeoutException, DocumentUnusableException, ServerMaintenanceException { String sessionId = initiateAuthentication(); SessionStatus sessionStatus = getSessionStatusPoller().fetchFinalSessionStatus(sessionId); return createSmartIdAuthenticationResponse(sessionStatus); } /** * Send the authentication request and get the session Id * * @throws UserAccountNotFoundException when the user account was not found * @throws ServerMaintenanceException when the server is under maintenance * * @return session Id - later to be used for manual session status polling */ public String initiateAuthentication() throws UserAccountNotFoundException, ServerMaintenanceException { validateParameters(); AuthenticationSessionRequest request = createAuthenticationSessionRequest(); AuthenticationSessionResponse response = getAuthenticationResponse(request); return response.getSessionID(); } /** * Create {@link SmartIdAuthenticationResponse} from {@link SessionStatus} * * @throws UserRefusedException when the user has refused the session. NB! This exception has subclasses to determine the screen where user pressed cancel. * @throws SessionTimeoutException when there was a timeout, i.e. end user did not confirm or refuse the operation within given time frame * @throws UserSelectedWrongVerificationCodeException when user was presented with three control codes and user selected wrong code * @throws DocumentUnusableException when for some reason, this relying party request cannot be completed. * * @param sessionStatus session status response * @return the authentication response */ public SmartIdAuthenticationResponse createSmartIdAuthenticationResponse(SessionStatus sessionStatus) throws UserRefusedException, UserSelectedWrongVerificationCodeException, SessionTimeoutException, DocumentUnusableException { validateAuthenticationResponse(sessionStatus); SessionResult sessionResult = sessionStatus.getResult(); SessionSignature sessionSignature = sessionStatus.getSignature(); SessionCertificate certificate = sessionStatus.getCert(); SmartIdAuthenticationResponse authenticationResponse = new SmartIdAuthenticationResponse(); authenticationResponse.setEndResult(sessionResult.getEndResult()); authenticationResponse.setSignedHashInBase64(getHashInBase64()); authenticationResponse.setHashType(getHashType()); authenticationResponse.setSignatureValueInBase64(sessionSignature.getValue()); authenticationResponse.setAlgorithmName(sessionSignature.getAlgorithm()); authenticationResponse.setCertificate(CertificateParser.parseX509Certificate(certificate.getValue())); authenticationResponse.setRequestedCertificateLevel(getCertificateLevel()); authenticationResponse.setCertificateLevel(certificate.getCertificateLevel()); authenticationResponse.setDocumentNumber(sessionResult.getDocumentNumber()); authenticationResponse.setInteractionFlowUsed(sessionStatus.getInteractionFlowUsed()); return authenticationResponse; } protected void validateParameters() { super.validateParameters(); super.validateAuthSignParameters(); } private void validateAuthenticationResponse(SessionStatus sessionStatus) { validateSessionResult(sessionStatus.getResult()); if (sessionStatus.getSignature() == null) { logger.error("Signature was not present in the response"); throw new UnprocessableSmartIdResponseException("Signature was not present in the response"); } if (sessionStatus.getCert() == null) { logger.error("Certificate was not present in the response"); throw new UnprocessableSmartIdResponseException("Certificate was not present in the response"); } } private AuthenticationSessionResponse getAuthenticationResponse(AuthenticationSessionRequest request) { SemanticsIdentifier semanticsIdentifier = getSemanticsIdentifier(); if (isNotEmpty(getDocumentNumber())) { return getConnector().authenticate(getDocumentNumber(), request); } else { return getConnector().authenticate(semanticsIdentifier, request); } } private AuthenticationSessionRequest createAuthenticationSessionRequest() { AuthenticationSessionRequest request = new AuthenticationSessionRequest(); request.setRelyingPartyUUID(getRelyingPartyUUID()); request.setRelyingPartyName(getRelyingPartyName()); request.setCertificateLevel(getCertificateLevel()); request.setHashType(getHashTypeString()); request.setHash(getHashInBase64()); request.setNonce(getNonce()); request.setCapabilities(getCapabilities()); request.setAllowedInteractionsOrder(getAllowedInteractionsOrder()); return request; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy