All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.infinispan.server.configuration.security.LdapUserPasswordMapperConfiguration Maven / Gradle / Ivy

There is a newer version: 15.1.0.Dev05
Show newest version
package org.infinispan.server.configuration.security;

import java.util.EnumSet;

import org.infinispan.commons.configuration.attributes.AttributeDefinition;
import org.infinispan.commons.configuration.attributes.AttributeSet;
import org.infinispan.commons.configuration.attributes.ConfigurationElement;
import org.infinispan.server.configuration.Attribute;
import org.infinispan.server.configuration.Element;
import org.infinispan.server.security.ServerSecurityRealm;
import org.wildfly.security.auth.realm.ldap.LdapSecurityRealmBuilder;

/**
 * @since 10.0
 */
public class LdapUserPasswordMapperConfiguration extends ConfigurationElement {
   static final AttributeDefinition FROM = AttributeDefinition.builder(Attribute.FROM, null, String.class).immutable().build();
   static final AttributeDefinition VERIFIABLE = AttributeDefinition.builder(Attribute.VERIFIABLE, true, Boolean.class).immutable().build();

   static AttributeSet attributeDefinitionSet() {
      return new AttributeSet(LdapUserPasswordMapperConfiguration.class, FROM, VERIFIABLE);
   }
   LdapUserPasswordMapperConfiguration(AttributeSet attributes) {
      super(Element.USER_PASSWORD_MAPPER, attributes);
   }

   EnumSet build(LdapSecurityRealmBuilder ldapRealmBuilder, RealmConfiguration realm) {
      EnumSet features = EnumSet.noneOf(ServerSecurityRealm.Feature.class);
      if (attributes.attribute(FROM).get() != null) {
         LdapSecurityRealmBuilder.UserPasswordCredentialLoaderBuilder builder = ldapRealmBuilder.userPasswordCredentialLoader();
         builder.setUserPasswordAttribute(attributes.attribute(FROM).get());
         if (!attributes.attribute(VERIFIABLE).get()) {
            builder.disableVerification();
         } else {
            /*
             * At this stage, we can only guess that the user password attribute can be used for hashed password verification.
             * The only way to verify this would be to attempt connecting to the LDAP server using the configured credentials,
             * fetch the user password attribute and see if it is prefixed with one of the known hash names.
             *
             * See https://issues.redhat.com/browse/ELY-296
             */
            features.add(ServerSecurityRealm.Feature.PASSWORD_HASHED);
         }
         builder.build(); // side-effect: adds the credential loader to the ldap realm
      }
      return features;
   }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy