All Downloads are FREE. Search and download functionalities are using the official Maven repository.

se.swedenconnect.spring.saml.idp.authentication.provider.UserAuthenticationProvider Maven / Gradle / Ivy

There is a newer version: 2.2.1
Show newest version
/*
 * Copyright 2023-2024 Sweden Connect
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package se.swedenconnect.spring.saml.idp.authentication.provider;

import java.util.List;

import org.springframework.security.authentication.AuthenticationProvider;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.AuthenticationException;

import se.swedenconnect.spring.saml.idp.attributes.release.AttributeProducer;
import se.swedenconnect.spring.saml.idp.authentication.Saml2UserAuthentication;
import se.swedenconnect.spring.saml.idp.authentication.Saml2UserAuthenticationInputToken;
import se.swedenconnect.spring.saml.idp.error.Saml2ErrorStatusException;

/**
 * Interface for an {@link AuthenticationProvider} that implements SAML2 Identity Provider user authentication. The
 * {@link #authenticate(org.springframework.security.core.Authentication)} method returns a
 * {@link Saml2UserAuthentication}.
 * 
 * 

* Note: The authentication provider should release all possible attributes about an authentication (user). These will * be filtered by an {@link AttributeProducer} before adding attributes to an assertion. The reason for this is that in * SSO-cases another set of attributes may be requested, and if attributes are filtered by the provider we may not be * able to re-use and authentication. *

*

* Note that the {@link #authenticate(org.springframework.security.core.Authentication)} must only return {@code null} * under one condition and that is when the requested authentication context(s) can not be met by the authentication * provider. *

* * @author Martin Lindström */ public interface UserAuthenticationProvider extends AuthenticationProvider { /** * Gets the name of the provider. * * @return the name of the provider */ String getName(); /** * Maps to {@link #authenticateUser(Saml2UserAuthenticationInputToken)}. */ @Override default Authentication authenticate(final Authentication authentication) throws AuthenticationException { try { return this.authenticateUser((Saml2UserAuthenticationInputToken) authentication); } catch (final ClassCastException e) { return null; } } /** * Performs the user authentication. * * @param token the input token * @return the authentication token or {@code null} if the requested authentication context(s) can not be met by the * authentication provider. * @throws Saml2ErrorStatusException for authentication errors */ Authentication authenticateUser(final Saml2UserAuthenticationInputToken token) throws Saml2ErrorStatusException; /** * Supports {@link Saml2UserAuthenticationInputToken}. */ @Override default boolean supports(final Class authentication) { return Saml2UserAuthenticationInputToken.class.isAssignableFrom(authentication); } /** * Gets the supported authentication context URI:s for the provider. * * @return a list of the authenticator's supported authentication context URI:s */ List getSupportedAuthnContextUris(); /** * Gets a list of all SAML entity categories that this {@link AuthenticationProvider} declares. * * @return a list of entity category URI:s */ List getEntityCategories(); }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy