/* * JBoss, Home of Professional Open Source. * Copyright 2013, Red Hat, Inc., and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.jboss.as.domain.management.security.realms; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertTrue; import static org.junit.Assert.fail; import java.io.IOException; import java.util.List; import java.util.Set; import javax.naming.directory.DirContext; import javax.security.auth.callback.Callback; import javax.security.auth.callback.NameCallback; import javax.security.sasl.RealmCallback; import org.jboss.as.domain.management.AuthMechanism; import org.jboss.as.domain.management.AuthorizingCallbackHandler; import org.jboss.as.domain.management.SecurityRealm; import org.jboss.as.domain.management.connections.ldap.LdapConnectionManager; import org.jboss.as.domain.management.security.operations.SecurityRealmAddBuilder; import org.jboss.as.domain.management.security.operations.CacheBuilder.By; import org.jboss.dmr.ModelNode; import org.junit.AfterClass; import org.junit.BeforeClass; import org.junit.Test; import org.wildfly.security.auth.callback.EvidenceVerifyCallback; import org.wildfly.security.evidence.PasswordGuessEvidence; /** * A test case to test authentication against an LDAP server. * * @see LdapTestSuite * * @author <a href="mailto:darran.lofthouse@jboss.com">Darran Lofthouse</a> */ public class LdapAuthenticationSuiteTest extends BaseLdapSuiteTest { private static final String ADVANCED_REALM = "AdvancedRealm"; private static final String BASE_DN = "dc=simple,dc=wildfly,dc=org"; private static final String ADVANCED_FILTER = "(&(uid={0})(departmentNumber=1))"; private static final String USERNAME_FILTER = "uid"; private static final String USER_ONE = "user_one"; private static final String USER_ONE_PASSWORD = "one_password"; private static final String USER_TWO = "user_two"; private static final String USER_TWO_PASSWORD = "two_password"; private static final String USER_THREE = "referral_user_three"; private static final String USER_THREE_PASSWORD = "three_password"; private static boolean initialised; @BeforeClass public static void startLdapServer() throws Exception { initialised = LdapTestSuite.startLdapServers(false); } @AfterClass public static void stopLdapServer() throws Exception { if (initialised) { LdapTestSuite.stopLdapServers(); } } @Test public void testConnection() throws Exception { LdapConnectionManager connectionManager = getConnectionManager(MASTER_CONNECTION_NAME); assertNotNull("Connection Manager.", connectionManager); // Configured Credentials. DirContext connection = connectionManager.getConnection(); assertNotNull("Connection with configured credentials.", connection); connection.close(); // Supplied Credentials. connectionManager.verifyIdentity("uid=UserOne,dc=simple,dc=wildfly,dc=org","one_password"); // Bad Supplied Credentials. try { connectionManager.verifyIdentity("uid=UserOne,dc=simple,dc=wildfly,dc=org","bad_password"); fail("Expected exception not thrown."); } catch (Exception ignored) {} } @Test public void testSupportedMechanism() { Set<AuthMechanism> supportedMechs = securityRealm.getSupportedAuthenticationMechanisms(); assertEquals("Number of mechanims", 1, supportedMechs.size()); assertTrue("Supports Digest", supportedMechs.contains(AuthMechanism.PLAIN)); } @Test public void testVerifyGoodPassword() throws Exception { AuthorizingCallbackHandler cbh = securityRealm.getAuthorizingCallbackHandler(AuthMechanism.PLAIN); NameCallback ncb = new NameCallback("Username", USER_ONE); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence(USER_ONE_PASSWORD.toCharArray())); cbh.handle(new Callback[] { ncb, rcb, evc }); assertTrue("Password Verified", evc.isVerified()); } @Test public void testVerifyGoodPassword_UserTwo() throws Exception { /* * Essentially a duplicate of the previous test but we want to be sure this works as we later * test that this user can be excluded using an advanced filter. */ AuthorizingCallbackHandler cbh = securityRealm.getAuthorizingCallbackHandler(AuthMechanism.PLAIN); NameCallback ncb = new NameCallback("Username", USER_TWO); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence(USER_TWO_PASSWORD.toCharArray())); cbh.handle(new Callback[] { ncb, rcb, evc }); assertTrue("Password Verified", evc.isVerified()); } @Test public void testVerifyBadPassword() throws Exception { AuthorizingCallbackHandler cbh = securityRealm.getAuthorizingCallbackHandler(AuthMechanism.PLAIN); NameCallback ncb = new NameCallback("Username", USER_ONE); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence(USER_TWO_PASSWORD.toCharArray())); cbh.handle(new Callback[] { ncb, rcb, evc }); assertFalse("Password Not Verified", evc.isVerified()); } @Test public void testVerifyNonExistentUser() throws Exception { AuthorizingCallbackHandler cbh = securityRealm.getAuthorizingCallbackHandler(AuthMechanism.PLAIN); NameCallback ncb = new NameCallback("Username", "UserThree"); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence("three-password".toCharArray())); try { cbh.handle(new Callback[] { ncb, rcb, evc }); fail("Expected exception not thrown"); } catch (IOException e) { } } @Test public void testVerifyEmptyPassword() throws Exception { AuthorizingCallbackHandler cbh = securityRealm.getAuthorizingCallbackHandler(AuthMechanism.PLAIN); NameCallback ncb = new NameCallback("Username", USER_ONE); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence("".toCharArray())); try { cbh.handle(new Callback[] { ncb, rcb, evc }); fail("Expected exception not thrown"); } catch (IOException e) { } } @Test public void testVerifyIgnoredReferral() throws Exception { AuthorizingCallbackHandler cbh = securityRealm.getAuthorizingCallbackHandler(AuthMechanism.PLAIN); NameCallback ncb = new NameCallback("Username", USER_THREE); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence(USER_THREE_PASSWORD.toCharArray())); cbh.handle(new Callback[] { ncb, rcb, evc }); assertFalse("Password Not Verified", evc.isVerified()); } /* * Custom Realm, also filter by additional attribute. */ private AuthorizingCallbackHandler getAdvancedCallbackHandler() { return ((SecurityRealm) getContainer().getService(SecurityRealm.ServiceUtil.createServiceName(ADVANCED_REALM)) .getValue()).getAuthorizingCallbackHandler(AuthMechanism.PLAIN); } @Test public void testVerifyGoodPassword_Advanced() throws Exception { AuthorizingCallbackHandler cbh = getAdvancedCallbackHandler(); NameCallback ncb = new NameCallback("Username", USER_ONE); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence(USER_ONE_PASSWORD.toCharArray())); cbh.handle(new Callback[] { ncb, rcb, evc }); assertTrue("Password Verified", evc.isVerified()); } @Test public void testVerifyBadPassword_Advanced() throws Exception { AuthorizingCallbackHandler cbh = getAdvancedCallbackHandler(); NameCallback ncb = new NameCallback("Username", USER_ONE); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence(USER_TWO_PASSWORD.toCharArray())); cbh.handle(new Callback[] { ncb, rcb, evc }); assertFalse("Password Not Verified", evc.isVerified()); } @Test public void testVerifyFilteredOutUser() throws Exception { AuthorizingCallbackHandler cbh = getAdvancedCallbackHandler(); NameCallback ncb = new NameCallback("Username", USER_TWO); RealmCallback rcb = new RealmCallback("Realm", TEST_REALM); EvidenceVerifyCallback evc = new EvidenceVerifyCallback(new PasswordGuessEvidence(USER_TWO_PASSWORD.toCharArray())); try { cbh.handle(new Callback[] { ncb, rcb, evc }); fail("Expected exception not thrown"); } catch (IOException e) { } } @Override protected void addBootOperations(List<ModelNode> bootOperations) throws Exception { // The super implementation of this method calls initialiseRealm for the realm // being used for testing, however the connection to the LDAP server should be // defined here. super.addBootOperations(bootOperations); // We define a second realm here as well. bootOperations.add(SecurityRealmAddBuilder.builder(ADVANCED_REALM) .authentication().ldap() .setConnection(MASTER_CONNECTION_NAME) .setBaseDn(BASE_DN) .setAdvancedFilter(ADVANCED_FILTER) .cache() .setBy(By.ACCESS_TIME) .setEvictionTime(1) .setMaxCacheSize(1) .build().build().build().build()); } @Override protected void initialiseRealm(SecurityRealmAddBuilder builder) throws Exception { builder.authentication() .ldap() .setConnection(MASTER_CONNECTION_NAME) .setBaseDn(BASE_DN) .setUsernameFilter(USERNAME_FILTER) .cache() .setBy(By.SEARCH_TIME) .setEvictionTime(1) .setMaxCacheSize(1) .build().build().build(); } }