com.sun.enterprise.security.jauth.ServerAuthContext Maven / Gradle / Ivy
Show all versions of payara-embedded-all Show documentation
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 1997-2011 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package com.sun.enterprise.security.jauth;
/**
* This ServerAuthContext class manages AuthModules that may be used
* to validate client requests. A caller typically uses this class
* in the following manner:
*
*
* - Retrieve an instance of this class via AuthConfig.getServerAuthContext.
*
- Receive initial client request and pass it to validateRequest.
*
* Configured plug-in modules validate credentials present in request
* (for example, decrypt and verify a signature).
* If credentials valid and sufficient, return.
* Otherwise throw an AuthException.
* - Authentication complete.
*
* Perform authorization check on authenticated identity and,
* if successful, dispatch to requested service application.
* - Service application finished.
*
- Invoke secureResponse.
*
* Configured modules secure response (sign and encrypt it, for example).
* - Send final response to client.
*
- The disposeSubject method may be invoked it necessary
* to clean up any authentication state in the Subject.
*
*
* An instance may reuse module instances it previous created.
* As a result a single module instance may be used to process
* different requests from different clients.
* It is the module implementation's responsibility to properly
* store and restore any state necessary to associate new requests
* with previous responses. A module that does not need to do so
* may remain completely stateless.
*
*
Instances of this class have custom logic to determine
* what modules to invoke, and in what order. In addition,
* this custom logic may control whether subsequent modules are invoked
* based on the success or failure of previously invoked modules.
*
*
The caller is responsible for passing in a state Map
* that can be used by underlying modules to save state across
* a sequence of calls from validateRequest
* to secureResponse
to disposeSubject
.
* The same Map instance must be passed to all methods in the call sequence.
* Furthermore, each call sequence should be passed its own unique
* shared state Map instance.
*
* @version %I%, %G%
* @see AuthConfig
* @see SOAPAuthParam
*/
public interface ServerAuthContext {
/**
* Authenticate a client request.
* (decrypt the message and verify a signature, for exmaple).
*
*
This method invokes configured modules to authenticate the request.
*
* @param param an authentication parameter that encapsulates the
* client request and server response objects.
*
* @param subject the subject may be used by configured modules
* to store and Principals and credentials validated
* in the request.
*
* @param sharedState a Map for modules to save state across
* a sequence of calls from validateRequest
* to secureResponse
to disposeSubject
.
*
* @exception PendingException if the operation is pending
* (for example, when a module issues a challenge).
* The module must have updated the response object
* in the AuthParam input parameter.
*
* @exception FailureException if the authentication failed.
* The module must have updated the response object
* in the AuthParam input parameter.
*
* @exception AuthException if the operation failed.
*/
void validateRequest(AuthParam param,
javax.security.auth.Subject subject,
java.util.Map sharedState)
throws AuthException;
/**
* Secure the response to the client
* (sign and encrypt the response, for example).
*
*
This method invokes configured modules to secure the response.
*
* @param param an authentication parameter that encapsulates the
* client request and server response objects
*
* @param subject the subject may be used by configured modules
* to obtain credentials needed to secure the response, or null.
* If null, the module may use a CallbackHandler to obtain
* the necessary information.
*
* @param sharedState a Map for modules to save state across
* a sequence of calls from validateRequest
* to secureResponse
to disposeSubject
.
*
* @exception AuthException if the operation failed.
*/
void secureResponse(AuthParam param,
javax.security.auth.Subject subject,
java.util.Map sharedState)
throws AuthException;
/**
* Dispose of the Subject
* (remove Principals or credentials from the Subject object
* that were stored during validateRequest
).
*
*
This method invokes configured modules to dispose the Subject.
*
* @param subject the subject to be disposed.
*
* @param sharedState a Map for modules to save state across
* a sequence of calls from validateRequest
* to secureResponse
to disposeSubject
.
*
* @exception AuthException if the operation failed.
*/
void disposeSubject(javax.security.auth.Subject subject,
java.util.Map sharedState)
throws AuthException;
/**
* modules manage sessions
* used by calling container to determine if it should delegate session
* management (including the mapping of requests to authentication
* results established from previous requests) to the underlying
* authentication modules of the context.
*
* When this method returns true,
* the container should call validate on every request, and as such
* may depend on the invoked modules to determine when a request
* pertains to an existing authentication session.
*
* When this method returns false,
* the container may employ is own session management functionality, and
* may use this functionality to recognize when an exiting request
* is to be interpretted in the context of an existing authentication
* session.
*
* @return true if the context should be allowed to manage sessions, and
* false if session management (if it is to occur) must be performed by
* the container.
*
* @exception AuthException if the operation failed.
*/
boolean managesSessions(java.util.Map sharedState)
throws AuthException;
}