All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.jboss.security.AuthorizationManager Maven / Gradle / Ivy

/*
 * JBoss, Home of Professional Open Source
 * Copyright 2005, JBoss Inc., and individual contributors as indicated
 * by the @authors tag. See the copyright.txt in the distribution for a
 * full listing of individual contributors.
 *
 * This is free software; you can redistribute it and/or modify it
 * under the terms of the GNU Lesser General Public License as
 * published by the Free Software Foundation; either version 2.1 of
 * the License, or (at your option) any later version.
 *
 * This software is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this software; if not, write to the Free
 * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
 * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
 */
package org.jboss.security;

import java.security.Principal;
import java.security.acl.Group;
import java.util.Map;
import java.util.Set;

import javax.security.auth.Subject;
import javax.security.auth.callback.CallbackHandler;

import org.jboss.security.authorization.AuthorizationException;
import org.jboss.security.authorization.Resource;
import org.jboss.security.identity.RoleGroup;

// $Id$

/**
 * Generalized Authorization Manager Interface. 

Replaces the legacy RealmMapping interface * * @see org.jboss.security.RealmMapping * @author Anil Saldhana * @since Jan 2, 2006 * @version $Revision$ */ public interface AuthorizationManager extends BaseSecurityManager { /** * Authorize a resource Note: The implementation will try to derive the authenticated subject by some means * * @param resource Resource to be authorized * @return AuthorizationContext.PERMIT or AuthorizationContext.DENY * @throws AuthorizationException */ public int authorize(final Resource resource) throws AuthorizationException; /** * Authorize a resource for an authenticated subject * * @param resource Resource to be authorized * @param subject Authenticated Subject * @return AuthorizationContext.PERMIT or AuthorizationContext.DENY * @throws AuthorizationException */ public int authorize(final Resource resource, final Subject subject) throws AuthorizationException; /** * Authorize a resource given a role * * @param resource * @param subject the authenticated subject * @param role a role (which can be a nested role) * @return AuthorizationContext.PERMIT or AuthorizationContext.DENY * @throws AuthorizationException */ public int authorize(final Resource resource, Subject subject, RoleGroup role) throws AuthorizationException; /** * Authorize a resource given a Group of Principals representing roles * * @param resource * @param subject the authenticated subject * @param roleGroup * @return * @throws AuthorizationException */ public int authorize(final Resource resource, Subject subject, Group roleGroup) throws AuthorizationException; /** * Validates the application domain roles to which the operational environment Principal belongs. * * @param principal the caller principal as known in the operation environment. * @param roles The Set for the application domain roles that the principal is to be validated against. * @return true if the principal has at least one of the roles in the roles set, false otherwise. */ public boolean doesUserHaveRole(Principal principal, Set roles); /** * Get the Current Roles for the authenticated Subject The AuthorizationManager will apply role generation and role * mapping logic configured for the security domain * * @param authenticatedSubject * @param cbh a CallbackHandler that can be used by the AuthorizationManager to obtain essentials such as * SecurityContext etc * @return */ public RoleGroup getSubjectRoles(Subject authenticatedSubject, CallbackHandler cbh); /** * Return the set of domain roles the principal has been assigned. * * @return The Set for the application domain roles that the principal has been assigned. */ public Set getUserRoles(Principal principal); /** * Trust usecases may have a need to determine the roles of the target principal which has been derived via a * principal from another domain by the Authentication Manager An implementation of this interface may have to * contact a trust provider for additional information about the principal * * @param targetPrincipal Principal applicable in current domain * @param contextMap Read-Only Contextual Information that may be useful for the implementation in determining the * roles. * @return roles from the target domain */ public Group getTargetRoles(Principal targetPrincipal, Map contextMap); }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy