All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.jackrabbit.oak.security.authentication.user.LoginModuleImpl Maven / Gradle / Ivy

There is a newer version: 1.62.0
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.jackrabbit.oak.security.authentication.user;

import java.io.IOException;
import java.security.Principal;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Set;
import javax.annotation.CheckForNull;
import javax.annotation.Nonnull;
import javax.annotation.Nullable;
import javax.jcr.Credentials;
import javax.jcr.GuestCredentials;
import javax.jcr.SimpleCredentials;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.NameCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.login.LoginException;

import org.apache.jackrabbit.oak.api.AuthInfo;
import org.apache.jackrabbit.oak.api.Root;
import org.apache.jackrabbit.oak.spi.security.ConfigurationParameters;
import org.apache.jackrabbit.oak.spi.security.SecurityProvider;
import org.apache.jackrabbit.oak.spi.security.authentication.AbstractLoginModule;
import org.apache.jackrabbit.oak.spi.security.authentication.AuthInfoImpl;
import org.apache.jackrabbit.oak.spi.security.authentication.Authentication;
import org.apache.jackrabbit.oak.spi.security.authentication.ImpersonationCredentials;
import org.apache.jackrabbit.oak.spi.security.authentication.PreAuthenticatedLogin;
import org.apache.jackrabbit.oak.spi.security.user.UserAuthenticationFactory;
import org.apache.jackrabbit.oak.spi.security.user.UserConfiguration;
import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

/**
 * Default login module implementation that authenticates JCR {@code Credentials}
 * against the repository. Based on the credentials the {@link Principal}s
 * associated with user are retrieved from a configurable
 * {@link org.apache.jackrabbit.oak.spi.security.principal.PrincipalProvider}.
 *
 * 

Credentials

* * The {@code Credentials} are collected during {@link #login()} using the * following logic: * *
    *
  • {@code Credentials} as specified in {@link javax.jcr.Repository#login(javax.jcr.Credentials)} * in which case they are retrieved from the {@code CallbackHandler}.
  • *
  • A {@link #SHARED_KEY_CREDENTIALS} entry in the shared state. The * expected value is a validated single {@code Credentials} object.
  • *
  • If neither of the above variants provides Credentials this module * tries to obtain them from the subject. See also * {@link javax.security.auth.Subject#getSubject(java.security.AccessControlContext)}
  • *
* * This implementation of the {@code LoginModule} currently supports the following * types of JCR Credentials: * *
    *
  • {@link SimpleCredentials}
  • *
  • {@link GuestCredentials}
  • *
  • {@link ImpersonationCredentials}
  • *
* * The {@link Credentials} obtained during the {@code #login()} are added to * the shared state and - upon successful {@code #commit()} to the {@code Subject}. * *

Principals

* Upon successful login the principals associated with the user are calculated * (see also {@link AbstractLoginModule#getPrincipals(String)}. These principals * are finally added to the subject during {@code #commit()}. * *

Impersonation

* Impersonation such as defined by {@link javax.jcr.Session#impersonate(javax.jcr.Credentials)} * is covered by this login module by the means of {@link ImpersonationCredentials}. * Impersonation will succeed if the {@link ImpersonationCredentials#getBaseCredentials() base credentials} * refer to a valid user that has not been disabled. If the authenticating * subject is not allowed to impersonate the specified user, the login attempt * will fail with {@code LoginException}.

* Please note, that a user will always be allowed to impersonate him/herself * irrespective of the impersonation definitions exposed by * {@link org.apache.jackrabbit.api.security.user.User#getImpersonation()} */ public final class LoginModuleImpl extends AbstractLoginModule { private static final Logger log = LoggerFactory.getLogger(LoginModuleImpl.class); protected static final Set SUPPORTED_CREDENTIALS = new HashSet(3); static { SUPPORTED_CREDENTIALS.add(SimpleCredentials.class); SUPPORTED_CREDENTIALS.add(GuestCredentials.class); SUPPORTED_CREDENTIALS.add(ImpersonationCredentials.class); } private Credentials credentials; private String userId; private Principal principal; private boolean success; //--------------------------------------------------------< LoginModule >--- @Override public boolean login() throws LoginException { credentials = getCredentials(); // check if we have a pre authenticated login from a previous login module PreAuthenticatedLogin preAuthLogin = getSharedPreAuthLogin(); String loginName = getLoginId(preAuthLogin); Authentication authentication = getUserAuthentication(loginName); if (authentication != null) { if (preAuthLogin != null) { success = authentication.authenticate(PreAuthenticatedLogin.PRE_AUTHENTICATED); } else { success = authentication.authenticate(credentials); } if (success) { log.debug("Adding Credentials to shared state."); //noinspection unchecked sharedState.put(SHARED_KEY_CREDENTIALS, credentials); log.debug("Adding login name to shared state."); //noinspection unchecked sharedState.put(SHARED_KEY_LOGIN_NAME, loginName); userId = authentication.getUserId(); if (userId == null) { userId = loginName; } principal = authentication.getUserPrincipal(); } } else { // ensure that we don't commit (OAK-2998, OAK-3032) credentials = null; userId = null; } return success; } @Override public boolean commit() { if (!success) { // login attempt in this login module was not successful clearState(); return false; } else { if (!subject.isReadOnly()) { Set principals = subject.getPrincipals(); if (principal != null) { principals.addAll(getPrincipals(principal)); } else if (userId != null) { principals.addAll(getPrincipals(userId)); } subject.getPublicCredentials().add(credentials); setAuthInfo(createAuthInfo(principals), subject); } else { log.debug("Could not add information to read only subject {}", subject); } clearState(); return true; } } //------------------------------------------------< AbstractLoginModule >--- @Nonnull @Override protected Set getSupportedCredentials() { return SUPPORTED_CREDENTIALS; } @Override protected void clearState() { super.clearState(); credentials = null; userId = null; principal = null; } //-------------------------------------------------------------------------- @CheckForNull private String getLoginId(@CheckForNull PreAuthenticatedLogin preAuthenticatedLogin) { if (preAuthenticatedLogin != null) { return preAuthenticatedLogin.getUserId(); } String uid = null; if (credentials != null) { if (credentials instanceof SimpleCredentials) { uid = ((SimpleCredentials) credentials).getUserID(); } else if (credentials instanceof GuestCredentials) { uid = getAnonymousId(); } else if (credentials instanceof ImpersonationCredentials) { Credentials bc = ((ImpersonationCredentials) credentials).getBaseCredentials(); if (bc instanceof SimpleCredentials) { uid = ((SimpleCredentials) bc).getUserID(); } } else { try { NameCallback callback = new NameCallback("User-ID: "); callbackHandler.handle(new Callback[]{callback}); uid = callback.getName(); } catch (UnsupportedCallbackException e) { log.warn("Credentials- or NameCallback must be supported"); } catch (IOException e) { log.error("Name-Callback failed: " + e.getMessage()); } } } if (uid == null) { uid = getSharedLoginName(); } return uid; } private String getAnonymousId() { SecurityProvider sp = getSecurityProvider(); if (sp == null) { return null; } else { ConfigurationParameters params = sp.getConfiguration(UserConfiguration.class).getParameters(); return UserUtil.getAnonymousId(params); } } @CheckForNull private Authentication getUserAuthentication(@Nullable String loginName) { SecurityProvider securityProvider = getSecurityProvider(); Root root = getRoot(); if (securityProvider != null && root != null) { UserConfiguration uc = securityProvider.getConfiguration(UserConfiguration.class); UserAuthenticationFactory factory = uc.getParameters().getConfigValue(UserConstants.PARAM_USER_AUTHENTICATION_FACTORY, null, UserAuthenticationFactory.class); if (factory != null) { return factory.getAuthentication(uc, root, loginName); } else { log.error("No user authentication factory configured in user configuration."); } } return null; } private AuthInfo createAuthInfo(@Nonnull Set principals) { Credentials creds; if (credentials instanceof ImpersonationCredentials) { creds = ((ImpersonationCredentials) credentials).getBaseCredentials(); } else { creds = credentials; } Map attributes = new HashMap(); Object shared = sharedState.get(SHARED_KEY_ATTRIBUTES); if (shared instanceof Map) { for (Object key : ((Map) shared).keySet()) { attributes.put(key.toString(), ((Map) shared).get(key)); } } else if (creds instanceof SimpleCredentials) { SimpleCredentials sc = (SimpleCredentials) creds; for (String attrName : sc.getAttributeNames()) { attributes.put(attrName, sc.getAttribute(attrName)); } } return new AuthInfoImpl(userId, attributes, principals); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy