/** * Licensed to Apereo under one or more contributor license agreements. See the NOTICE file * distributed with this work for additional information regarding copyright ownership. Apereo * licenses this file to you under the Apache License, Version 2.0 (the "License"); you may not use * this file except in compliance with the License. You may obtain a copy of the License at the * following location: * * <p>http://www.apache.org/licenses/LICENSE-2.0 * * <p>Unless required by applicable law or agreed to in writing, software distributed under the * License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing permissions and * limitations under the License. */ package org.apereo.portal.security.provider; import java.io.Serializable; import javax.security.auth.login.LoginContext; import javax.security.auth.login.LoginException; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apereo.portal.security.IAdditionalDescriptor; import org.apereo.portal.security.ISecurityContext; import org.apereo.portal.security.PortalSecurityException; /** * This is an implementation of a SecurityContext that checks a user's credentials using JAAS. * */ class JAASSecurityContext extends ChainingSecurityContext implements ISecurityContext, Serializable { private static final Log log = LogFactory.getLog(JAASSecurityContext.class); private final int JAASSECURITYAUTHTYPE = 0xFF05; private IAdditionalDescriptor additionalDescriptor; JAASSecurityContext() { super(); } public int getAuthType() { return this.JAASSECURITYAUTHTYPE; } public IAdditionalDescriptor getAdditionalDescriptor() { return additionalDescriptor; } public synchronized void authenticate() throws PortalSecurityException { this.isauth = false; if (this.myPrincipal.UID != null && this.myOpaqueCredentials.credentialstring != null) { try { // JAAS Stuff LoginContext lc = null; lc = new LoginContext( "uPortal", new JAASInlineCallbackHandler( this.myPrincipal.UID, (new String(this.myOpaqueCredentials.credentialstring)) .toCharArray())); // could not come up w/ a better way to do this lc.login(); additionalDescriptor = new JAASSubject(lc.getSubject()); // the above will throw an exception if authentication does not succeed if (log.isInfoEnabled()) log.info("User " + this.myPrincipal.UID + " is authenticated"); this.isauth = true; } catch (LoginException e) { if (log.isInfoEnabled()) log.info("User " + this.myPrincipal.UID + ": invalid password"); if (log.isDebugEnabled()) log.debug("LoginException", e); } } else { log.error("Principal or OpaqueCredentials not initialized prior to authenticate"); } // authenticate all subcontexts. super.authenticate(); return; } }