All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.opensaml.xml.security.x509.PKIXX509CredentialTrustEngine Maven / Gradle / Ivy

Go to download

XMLTooling-J is a low-level library that may be used to construct libraries that allow developers to work with XML in a Java beans manner.

There is a newer version: 1.4.4
Show newest version
/*
 * Copyright [2006] [University Corporation for Advanced Internet Development, Inc.]
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.opensaml.xml.security.x509;

import java.util.Set;

import org.opensaml.xml.security.CriteriaSet;
import org.opensaml.xml.security.SecurityException;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

/**
 * Trust engine implementation which evaluates an X509Credential token based on PKIX validation processing using
 * validation information from a trusted source.
 * 
 */
public class PKIXX509CredentialTrustEngine implements PKIXTrustEngine {

    /** Class logger. */
    private final Logger log = LoggerFactory.getLogger(PKIXX509CredentialTrustEngine.class);

    /** Resolver used for resolving trusted credentials. */
    private PKIXValidationInformationResolver pkixResolver;

    /** The external PKIX trust evaluator used to establish trust. */
    private PKIXTrustEvaluator pkixTrustEvaluator;
    
    /** The external credential name evaluator used to establish trusted name compliance. */
    private X509CredentialNameEvaluator credNameEvaluator;

    /**
     * Constructor.
     * 
     * 

The PKIX trust evaluator used defaults to {@link CertPathPKIXTrustEvaluator}.

* *

The X.509 credential name evaluator used defaults to {@link BasicX509CredentialNameEvaluator}.

* * @param resolver credential resolver used to resolve trusted credentials */ public PKIXX509CredentialTrustEngine(PKIXValidationInformationResolver resolver) { if (resolver == null) { throw new IllegalArgumentException("PKIX trust information resolver may not be null"); } pkixResolver = resolver; pkixTrustEvaluator = new CertPathPKIXTrustEvaluator(); credNameEvaluator = new BasicX509CredentialNameEvaluator(); } /** * Constructor. * * @param resolver credential resolver used to resolve trusted credentials * @param pkixEvaluator the PKIX trust evaluator to use * @param nameEvaluator the X.509 credential name evaluator to use (may be null) */ public PKIXX509CredentialTrustEngine(PKIXValidationInformationResolver resolver, PKIXTrustEvaluator pkixEvaluator, X509CredentialNameEvaluator nameEvaluator) { if (resolver == null) { throw new IllegalArgumentException("PKIX trust information resolver may not be null"); } pkixResolver = resolver; if (pkixEvaluator == null) { throw new IllegalArgumentException("PKIX trust evaluator may not be null"); } pkixTrustEvaluator = pkixEvaluator; credNameEvaluator = nameEvaluator; } /** {@inheritDoc} */ public PKIXValidationInformationResolver getPKIXResolver() { return pkixResolver; } /** * Get the PKIXTrustEvaluator instance used to evalute trust. * *

The parameters of this evaluator may be modified to * adjust trust evaluation processing.

* * @return the PKIX trust evaluator instance that will be used */ public PKIXTrustEvaluator getPKIXTrustEvaluator() { return pkixTrustEvaluator; } /** * Get the X509CredentialNameEvaluator instance used to evalute a credential * against trusted names. * *

The parameters of this evaluator may be modified to * adjust trust evaluation processing.

* * @return the PKIX trust evaluator instance that will be used */ public X509CredentialNameEvaluator getX509CredentialNameEvaluator() { return credNameEvaluator; } /** {@inheritDoc} */ public boolean validate(X509Credential untrustedCredential, CriteriaSet trustBasisCriteria) throws SecurityException { log.debug("Attempting PKIX validation of untrusted credential"); if (untrustedCredential == null) { log.error("X.509 credential was null, unable to perform validation"); return false; } if (untrustedCredential.getEntityCertificate() == null) { log.error("Untrusted X.509 credential's entity certificate was null, unable to perform validation"); return false; } Set trustedNames = null; if (pkixResolver.supportsTrustedNameResolution()) { trustedNames = pkixResolver.resolveTrustedNames(trustBasisCriteria); } else { log.debug("PKIX resolver does not support resolution of trusted names, skipping name checking"); } return validate(untrustedCredential, trustedNames, pkixResolver.resolve(trustBasisCriteria)); } /** * Perform PKIX validation on the untrusted credential, using PKIX validation information based on the supplied set * of trusted credentials. * * @param untrustedX509Credential the credential to evaluate * @param validationInfoSet the set of validation information which serves as ths basis for trust evaluation * @param trustedNames the set of trusted names for name checking purposes * * @return true if PKIX validation of the untrusted credential is successful, otherwise false * @throws SecurityException thrown if there is an error validating the untrusted credential * against trusted names or validation information */ protected boolean validate(X509Credential untrustedX509Credential, Set trustedNames, Iterable validationInfoSet) throws SecurityException { log.debug("Beginning PKIX validation using trusted validation information"); if (!checkNames(trustedNames, untrustedX509Credential)) { log.debug("Evaluation of credential against trusted names failed. Aborting PKIX validation"); return false; } for (PKIXValidationInformation validationInfo : validationInfoSet) { try { if (pkixTrustEvaluator.validate(validationInfo, untrustedX509Credential)) { log.debug("Credential trust established via PKIX validation"); return true; } } catch (SecurityException e) { // log the operational error, but allow other validation info sets to be tried log.debug("Error performing PKIX validation on untrusted credential", e); } } log.debug("Trust of untrusted credential could not be established via PKIX validation"); return false; } /** * Evaluate the credential against the set of trusted names. * *

Evaluates to true if no intsance of {@link X509CredentialNameEvaluator} is configured.

* * @param trustedNames set of trusted names * @param untrustedCredential the credential being evaluated * @return true if evaluation is successful, false otherwise * @throws SecurityException thrown if there is an error evaluation the credential */ protected boolean checkNames(Set trustedNames, X509Credential untrustedCredential) throws SecurityException { if (credNameEvaluator == null) { log.debug("No credential name evaluator was available, skipping trusted name evaluation"); return true; } else { return credNameEvaluator.evaluate(untrustedCredential, trustedNames); } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy