/* * JOSSO: Java Open Single Sign-On * * Copyright 2004-2009, Atricore, Inc. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. * */ package org.josso.servlet.agent; import java.security.Principal; import java.util.Collections; import java.util.HashSet; import java.util.Set; import javax.security.auth.Subject; import javax.security.auth.callback.*; import javax.security.auth.login.FailedLoginException; import javax.security.auth.login.LoginException; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.josso.agent.Lookup; import org.josso.agent.SSOAgent; import org.josso.agent.SSOAgentRequest; import org.josso.agent.SingleSignOnEntry; import org.josso.agent.http.JOSSOSecurityContext; import org.josso.agent.http.JaasHttpSSOAgent; import org.josso.agent.http.SSOGatewayHandler; import org.josso.gateway.identity.SSORole; import org.josso.gateway.identity.SSOUser; import org.josso.gateway.identity.exceptions.SSOIdentityException; import org.josso.gateway.identity.service.SSOIdentityManagerService; import org.josso.servlet.agent.jaas.SSOGatewayLoginModule; /** * This agent will authenticate users against JAAS Infrastructure directly. It will look up for the "josso" login context. * You have to configure a JAAS context under the name "josso", delcaring the SSOGatewayLoginModule, for example : * <br> * <br> * <pre> * josso { * org.josso.servlet.agent.jaas.SSOGatewayLoginModule required debug=true; * }; * </pre> * * Date: Nov 27, 2007 * Time: 11:47:26 AM * * @org.apache.xbean.XBean element="agent" * * @author <a href="mailto:sgonzalez@josso.org">Sebastian Gonzalez Oyuela</a> * */ public class GenericServletSSOAgent extends JaasHttpSSOAgent { private static final Log log = LogFactory.getLog(GenericServletSSOAgent.class); private boolean _disableJaas = false; /** * This extension will delegate processing to super class and publish JOSSO Security Context * instance in the LocalSession associated to the request. */ protected SingleSignOnEntry execute(SSOAgentRequest request) { GenericServletSSOAgentRequest r = (GenericServletSSOAgentRequest) request; GenericServletLocalSession localSession = (GenericServletLocalSession) r.getLocalSession(); SingleSignOnEntry entry = super.execute(request); if (entry != null) { if (r.getSecurityContext() != null) { if (log.isDebugEnabled()) log.debug("Publishing JOSSO Security Context instance in session ["+(entry != null ? entry.ssoId : "<NO-SSO-ID>") +"]"); localSession.setSecurityContext(r.getSecurityContext()); } } else { if (localSession != null) { if (log.isDebugEnabled()) log.debug("Clearing JOSSO Security Context for session ["+ localSession.getId() + "]"); localSession.setSecurityContext(null); r.setSecurityContext(null); } } return entry; } /** * Resolves an authentication request using JAAS infrastructure. * @param request containing the SSO Session id. * @return null if no principal can be authenticated using the received SSO Session Id */ protected Principal authenticate(SSOAgentRequest request) { String ssoSessionId = request.getSessionId(); Principal ssoUser = null; if (_disableJaas) { log.info("Requested authentication to gateway by " + request.getRequester() + " using sso session " + ssoSessionId ); try { // If no session is found, ignore this module. if (ssoSessionId == null) { log.error("Session authentication failed : " + ssoSessionId); return null; } SSOAgent agent = Lookup.getInstance().lookupSSOAgent(); SSOIdentityManagerService im = request.getConfig(agent).getIdentityManagerService(); if (im == null) { im = agent.getSSOIdentityManager(); if (request.getNodeId() == null && !"".equals(request.getNodeId())) { im = agent.getSSOIdentityManager(request.getNodeId()); } } ssoUser = im.findUserInSession(request.getRequester(), ssoSessionId); log.info("Session authentication succeeded : " + ssoSessionId); } catch (SSOIdentityException e) { // Ignore this ... (user does not exist for this session) if (log.isDebugEnabled()) log.debug(e.getMessage()); } catch (Exception e) { log.error("Session authentication failed : " + ssoSessionId, e); } } else { // Delegate authentication to JAAS Agent ssoUser = super.authenticate(request); } if (ssoUser != null) { Set<Principal> principals = new HashSet<Principal>(); principals.add(ssoUser); SSORole[] ssoRolePrincipals = getRoleSets(request.getRequester(), ssoSessionId, request.getNodeId()); for (int i=0; i < ssoRolePrincipals.length; i++) { principals.add(ssoRolePrincipals[i]); log.debug("Added SSORole Principal to the Subject : " + ssoRolePrincipals[i]); } Subject subject = new Subject(true, principals, Collections.emptySet(), Collections.emptySet()); GenericServletSSOAgentRequest r = (GenericServletSSOAgentRequest) request; JOSSOSecurityContext ctx = new JOSSOSecurityContext(subject); ctx.setSSOSession(ssoSessionId); r.setSecurityContext(ctx); } return ssoUser; } @Override protected boolean isAuthenticationAlwaysRequired() { return true; } public boolean isDisableJaas() { return _disableJaas; } public void setDisableJaas(boolean disableJaas) { _disableJaas = disableJaas; } protected void log(String message) { log.info(message); } protected void log(String message, Throwable throwable) { log.info(message, throwable); } }