/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.cxf.sts.operation; import java.security.cert.X509Certificate; import java.util.ArrayList; import java.util.Collections; import java.util.HashMap; import java.util.List; import java.util.Map; import java.util.Properties; import javax.security.auth.callback.CallbackHandler; import javax.xml.bind.JAXBElement; import javax.xml.namespace.QName; import org.w3c.dom.Document; import org.w3c.dom.Element; import org.apache.cxf.jaxws.context.WrappedMessageContext; import org.apache.cxf.message.MessageImpl; import org.apache.cxf.rs.security.jose.jws.JwsJwtCompactConsumer; import org.apache.cxf.rs.security.jose.jwt.JwtConstants; import org.apache.cxf.rs.security.jose.jwt.JwtToken; import org.apache.cxf.sts.QNameConstants; import org.apache.cxf.sts.STSConstants; import org.apache.cxf.sts.STSPropertiesMBean; import org.apache.cxf.sts.StaticSTSProperties; import org.apache.cxf.sts.common.PasswordCallbackHandler; import org.apache.cxf.sts.request.KeyRequirements; import org.apache.cxf.sts.request.ReceivedKey; import org.apache.cxf.sts.request.TokenRequirements; import org.apache.cxf.sts.service.EncryptionProperties; import org.apache.cxf.sts.service.ServiceMBean; import org.apache.cxf.sts.service.StaticService; import org.apache.cxf.sts.token.delegation.SAMLDelegationHandler; import org.apache.cxf.sts.token.delegation.TokenDelegationHandler; import org.apache.cxf.sts.token.delegation.UsernameTokenDelegationHandler; import org.apache.cxf.sts.token.provider.SAMLTokenProvider; import org.apache.cxf.sts.token.provider.TokenProvider; import org.apache.cxf.sts.token.provider.TokenProviderParameters; import org.apache.cxf.sts.token.provider.TokenProviderResponse; import org.apache.cxf.sts.token.provider.jwt.JWTTokenProvider; import org.apache.cxf.sts.token.realm.RealmProperties; import org.apache.cxf.sts.token.validator.IssuerSAMLRealmCodec; import org.apache.cxf.sts.token.validator.SAMLTokenValidator; import org.apache.cxf.sts.token.validator.TokenValidator; import org.apache.cxf.sts.token.validator.UsernameTokenValidator; import org.apache.cxf.ws.security.sts.provider.STSException; import org.apache.cxf.ws.security.sts.provider.model.OnBehalfOfType; import org.apache.cxf.ws.security.sts.provider.model.RequestSecurityTokenResponseCollectionType; import org.apache.cxf.ws.security.sts.provider.model.RequestSecurityTokenResponseType; import org.apache.cxf.ws.security.sts.provider.model.RequestSecurityTokenType; import org.apache.cxf.ws.security.sts.provider.model.RequestedSecurityTokenType; import org.apache.cxf.ws.security.sts.provider.model.secext.AttributedString; import org.apache.cxf.ws.security.sts.provider.model.secext.PasswordString; import org.apache.cxf.ws.security.sts.provider.model.secext.UsernameTokenType; import org.apache.wss4j.common.crypto.Crypto; import org.apache.wss4j.common.crypto.CryptoFactory; import org.apache.wss4j.common.crypto.CryptoType; import org.apache.wss4j.common.ext.WSSecurityException; import org.apache.wss4j.common.principal.CustomTokenPrincipal; import org.apache.wss4j.dom.WSConstants; import org.junit.Assert; /** * Issue JWT tokens on behalf of other tokens. */ public class IssueJWTOnbehalfofUnitTest extends org.junit.Assert { public static final QName REQUESTED_SECURITY_TOKEN = QNameConstants.WS_TRUST_FACTORY.createRequestedSecurityToken(null).getName(); /** * Test to successfully issue a JWT token on-behalf-of a SAML 2 token */ @org.junit.Test public void testIssueJWTTokenOnBehalfOfSaml2() throws Exception { TokenIssueOperation issueOperation = new TokenIssueOperation(); // Add Token Provider List<TokenProvider> providerList = new ArrayList<>(); providerList.add(new JWTTokenProvider()); issueOperation.setTokenProviders(providerList); // Add Token Validator List<TokenValidator> validatorList = new ArrayList<>(); validatorList.add(new SAMLTokenValidator()); issueOperation.setTokenValidators(validatorList); // Add Service ServiceMBean service = new StaticService(); service.setEndpoints(Collections.singletonList("http://dummy-service.com/dummy")); issueOperation.setServices(Collections.singletonList(service)); // Add STSProperties object STSPropertiesMBean stsProperties = new StaticSTSProperties(); Crypto crypto = CryptoFactory.getInstance(getEncryptionProperties()); stsProperties.setEncryptionCrypto(crypto); stsProperties.setSignatureCrypto(crypto); stsProperties.setEncryptionUsername("myservicekey"); stsProperties.setSignatureUsername("mystskey"); stsProperties.setCallbackHandler(new PasswordCallbackHandler()); stsProperties.setIssuer("STS"); issueOperation.setStsProperties(stsProperties); TokenDelegationHandler delegationHandler = new SAMLDelegationHandler(); issueOperation.setDelegationHandlers(Collections.singletonList(delegationHandler)); // Mock up a request RequestSecurityTokenType request = new RequestSecurityTokenType(); JAXBElement<String> tokenType = new JAXBElement<String>( QNameConstants.TOKEN_TYPE, String.class, JWTTokenProvider.JWT_TOKEN_TYPE ); request.getAny().add(tokenType); // Get a SAML Token via the SAMLTokenProvider CallbackHandler callbackHandler = new PasswordCallbackHandler(); Element samlToken = createSAMLAssertion(WSConstants.WSS_SAML2_TOKEN_TYPE, crypto, "mystskey", callbackHandler); Document doc = samlToken.getOwnerDocument(); samlToken = (Element)doc.appendChild(samlToken); OnBehalfOfType onbehalfof = new OnBehalfOfType(); onbehalfof.setAny(samlToken); JAXBElement<OnBehalfOfType> onbehalfofType = new JAXBElement<OnBehalfOfType>( QNameConstants.ON_BEHALF_OF, OnBehalfOfType.class, onbehalfof ); request.getAny().add(onbehalfofType); // Mock up message context MessageImpl msg = new MessageImpl(); WrappedMessageContext msgCtx = new WrappedMessageContext(msg); // Issue a token RequestSecurityTokenResponseCollectionType response = issueOperation.issue(request, null, msgCtx); List<RequestSecurityTokenResponseType> securityTokenResponse = response.getRequestSecurityTokenResponse(); assertTrue(!securityTokenResponse.isEmpty()); // Test the generated token. Element token = null; for (Object tokenObject : securityTokenResponse.get(0).getAny()) { if (tokenObject instanceof JAXBElement<?> && REQUESTED_SECURITY_TOKEN.equals(((JAXBElement<?>)tokenObject).getName())) { RequestedSecurityTokenType rstType = (RequestedSecurityTokenType)((JAXBElement<?>)tokenObject).getValue(); token = (Element)rstType.getAny(); break; } } assertNotNull(token); // Validate the token JwsJwtCompactConsumer jwtConsumer = new JwsJwtCompactConsumer(token.getTextContent()); JwtToken jwt = jwtConsumer.getJwtToken(); Assert.assertEquals("alice", jwt.getClaim(JwtConstants.CLAIM_SUBJECT)); } /** * Test to successfully issue a JWT token on-behalf-of a UsernameToken */ @org.junit.Test public void testIssueJWTTokenOnBehalfOfUsernameToken() throws Exception { TokenIssueOperation issueOperation = new TokenIssueOperation(); // Add Token Provider List<TokenProvider> providerList = new ArrayList<>(); providerList.add(new JWTTokenProvider()); issueOperation.setTokenProviders(providerList); // Add Token Validator List<TokenValidator> validatorList = new ArrayList<>(); validatorList.add(new UsernameTokenValidator()); issueOperation.setTokenValidators(validatorList); // Add Service ServiceMBean service = new StaticService(); service.setEndpoints(Collections.singletonList("http://dummy-service.com/dummy")); issueOperation.setServices(Collections.singletonList(service)); // Add STSProperties object STSPropertiesMBean stsProperties = new StaticSTSProperties(); Crypto crypto = CryptoFactory.getInstance(getEncryptionProperties()); stsProperties.setEncryptionCrypto(crypto); stsProperties.setSignatureCrypto(crypto); stsProperties.setEncryptionUsername("myservicekey"); stsProperties.setSignatureUsername("mystskey"); stsProperties.setCallbackHandler(new PasswordCallbackHandler()); stsProperties.setIssuer("STS"); issueOperation.setStsProperties(stsProperties); // Mock up a request RequestSecurityTokenType request = new RequestSecurityTokenType(); JAXBElement<String> tokenType = new JAXBElement<String>( QNameConstants.TOKEN_TYPE, String.class, JWTTokenProvider.JWT_TOKEN_TYPE ); request.getAny().add(tokenType); // Create a UsernameToken JAXBElement<UsernameTokenType> usernameTokenType = createUsernameToken("alice", "clarinet"); OnBehalfOfType onbehalfof = new OnBehalfOfType(); onbehalfof.setAny(usernameTokenType); JAXBElement<OnBehalfOfType> onbehalfofType = new JAXBElement<OnBehalfOfType>( QNameConstants.ON_BEHALF_OF, OnBehalfOfType.class, onbehalfof ); request.getAny().add(onbehalfofType); // Mock up message context MessageImpl msg = new MessageImpl(); WrappedMessageContext msgCtx = new WrappedMessageContext(msg); // Issue a token // This should fail as the default DelegationHandler does not allow UsernameTokens try { issueOperation.issue(request, null, msgCtx); fail("Failure expected as UsernameTokens are not accepted for OnBehalfOf by default"); } catch (STSException ex) { // expected } TokenDelegationHandler delegationHandler = new UsernameTokenDelegationHandler(); issueOperation.setDelegationHandlers(Collections.singletonList(delegationHandler)); RequestSecurityTokenResponseCollectionType response = issueOperation.issue(request, null, msgCtx); List<RequestSecurityTokenResponseType> securityTokenResponse = response.getRequestSecurityTokenResponse(); assertTrue(!securityTokenResponse.isEmpty()); // Test the generated token. Element token = null; for (Object tokenObject : securityTokenResponse.get(0).getAny()) { if (tokenObject instanceof JAXBElement<?> && REQUESTED_SECURITY_TOKEN.equals(((JAXBElement<?>)tokenObject).getName())) { RequestedSecurityTokenType rstType = (RequestedSecurityTokenType)((JAXBElement<?>)tokenObject).getValue(); token = (Element)rstType.getAny(); break; } } assertNotNull(token); // Validate the token JwsJwtCompactConsumer jwtConsumer = new JwsJwtCompactConsumer(token.getTextContent()); JwtToken jwt = jwtConsumer.getJwtToken(); Assert.assertEquals("alice", jwt.getClaim(JwtConstants.CLAIM_SUBJECT)); } /** * Test to successfully issue a JWT Token (realm "B") on-behalf-of a SAML 2 token * on-behalf-of token issued by realm "A". */ @org.junit.Test public void testIssueJWTTokenOnBehalfOfSaml2DifferentRealm() throws Exception { TokenIssueOperation issueOperation = new TokenIssueOperation(); // Add Token Provider List<TokenProvider> providerList = new ArrayList<>(); JWTTokenProvider tokenProvider = new JWTTokenProvider(); providerList.add(tokenProvider); issueOperation.setTokenProviders(providerList); TokenDelegationHandler delegationHandler = new SAMLDelegationHandler(); issueOperation.setDelegationHandlers(Collections.singletonList(delegationHandler)); // Add Token Validator List<TokenValidator> validatorList = new ArrayList<>(); SAMLTokenValidator samlTokenValidator = new SAMLTokenValidator(); samlTokenValidator.setSamlRealmCodec(new IssuerSAMLRealmCodec()); validatorList.add(samlTokenValidator); issueOperation.setTokenValidators(validatorList); // Add Service ServiceMBean service = new StaticService(); service.setEndpoints(Collections.singletonList("http://dummy-service.com/dummy")); issueOperation.setServices(Collections.singletonList(service)); // Add STSProperties object STSPropertiesMBean stsProperties = new StaticSTSProperties(); Crypto crypto = CryptoFactory.getInstance(getEncryptionProperties()); stsProperties.setEncryptionCrypto(crypto); stsProperties.setSignatureCrypto(crypto); stsProperties.setEncryptionUsername("myservicekey"); stsProperties.setSignatureUsername("mystskey"); stsProperties.setCallbackHandler(new PasswordCallbackHandler()); stsProperties.setIssuer("STS"); stsProperties.setRealmParser(new CustomRealmParser()); stsProperties.setIdentityMapper(new CustomIdentityMapper()); issueOperation.setStsProperties(stsProperties); Map<String, RealmProperties> realms = createSamlRealms(); // Mock up a request RequestSecurityTokenType request = new RequestSecurityTokenType(); JAXBElement<String> tokenType = new JAXBElement<String>( QNameConstants.TOKEN_TYPE, String.class, JWTTokenProvider.JWT_TOKEN_TYPE ); request.getAny().add(tokenType); // Get a SAML Token via the SAMLTokenProvider CallbackHandler callbackHandler = new PasswordCallbackHandler(); Element samlToken = createSAMLAssertion(WSConstants.WSS_SAML2_TOKEN_TYPE, crypto, "mystskey", callbackHandler, realms, STSConstants.BEARER_KEY_KEYTYPE); Document doc = samlToken.getOwnerDocument(); samlToken = (Element)doc.appendChild(samlToken); OnBehalfOfType onbehalfof = new OnBehalfOfType(); onbehalfof.setAny(samlToken); JAXBElement<OnBehalfOfType> onbehalfofType = new JAXBElement<OnBehalfOfType>( QNameConstants.ON_BEHALF_OF, OnBehalfOfType.class, onbehalfof ); request.getAny().add(onbehalfofType); // Mock up message context MessageImpl msg = new MessageImpl(); WrappedMessageContext msgCtx = new WrappedMessageContext(msg); msgCtx.put("url", "https"); tokenProvider.setRealmMap(realms); RequestSecurityTokenResponseCollectionType response = issueOperation.issue(request, null, msgCtx); List<RequestSecurityTokenResponseType> securityTokenResponse = response.getRequestSecurityTokenResponse(); assertTrue(!securityTokenResponse.isEmpty()); // Test the generated token. Element token = null; for (Object tokenObject : securityTokenResponse.get(0).getAny()) { if (tokenObject instanceof JAXBElement<?> && REQUESTED_SECURITY_TOKEN.equals(((JAXBElement<?>)tokenObject).getName())) { RequestedSecurityTokenType rstType = (RequestedSecurityTokenType)((JAXBElement<?>)tokenObject).getValue(); token = (Element)rstType.getAny(); break; } } assertNotNull(token); // Validate the token JwsJwtCompactConsumer jwtConsumer = new JwsJwtCompactConsumer(token.getTextContent()); JwtToken jwt = jwtConsumer.getJwtToken(); Assert.assertEquals("ALICE", jwt.getClaim(JwtConstants.CLAIM_SUBJECT)); } /* * Mock up an SAML assertion element */ private Element createSAMLAssertion( String tokenType, Crypto crypto, String signatureUsername, CallbackHandler callbackHandler ) throws WSSecurityException { return createSAMLAssertion(tokenType, crypto, signatureUsername, callbackHandler, null, STSConstants.BEARER_KEY_KEYTYPE); } /* * Mock up an SAML assertion element */ private Element createSAMLAssertion( String tokenType, Crypto crypto, String signatureUsername, CallbackHandler callbackHandler, Map<String, RealmProperties> realms, String keyType ) throws WSSecurityException { SAMLTokenProvider samlTokenProvider = new SAMLTokenProvider(); samlTokenProvider.setRealmMap(realms); TokenProviderParameters providerParameters = createProviderParameters( tokenType, keyType, crypto, signatureUsername, callbackHandler ); if (realms != null) { providerParameters.setRealm("A"); } TokenProviderResponse providerResponse = samlTokenProvider.createToken(providerParameters); assertTrue(providerResponse != null); assertTrue(providerResponse.getToken() != null && providerResponse.getTokenId() != null); return (Element)providerResponse.getToken(); } private TokenProviderParameters createProviderParameters( String tokenType, String keyType, Crypto crypto, String signatureUsername, CallbackHandler callbackHandler ) throws WSSecurityException { TokenProviderParameters parameters = new TokenProviderParameters(); TokenRequirements tokenRequirements = new TokenRequirements(); tokenRequirements.setTokenType(tokenType); parameters.setTokenRequirements(tokenRequirements); KeyRequirements keyRequirements = new KeyRequirements(); keyRequirements.setKeyType(keyType); CryptoType cryptoType = new CryptoType(CryptoType.TYPE.ALIAS); cryptoType.setAlias("myclientkey"); X509Certificate[] certs = crypto.getX509Certificates(cryptoType); ReceivedKey receivedKey = new ReceivedKey(); receivedKey.setX509Cert(certs[0]); keyRequirements.setReceivedKey(receivedKey); parameters.setKeyRequirements(keyRequirements); parameters.setPrincipal(new CustomTokenPrincipal("alice")); // Mock up message context MessageImpl msg = new MessageImpl(); WrappedMessageContext msgCtx = new WrappedMessageContext(msg); parameters.setMessageContext(msgCtx); parameters.setAppliesToAddress("http://dummy-service.com/dummy"); // Add STSProperties object StaticSTSProperties stsProperties = new StaticSTSProperties(); stsProperties.setSignatureCrypto(crypto); stsProperties.setSignatureUsername(signatureUsername); stsProperties.setCallbackHandler(callbackHandler); stsProperties.setIssuer("STS"); stsProperties.setEncryptionUsername("myservicekey"); stsProperties.setEncryptionCrypto(crypto); parameters.setStsProperties(stsProperties); parameters.setEncryptionProperties(new EncryptionProperties()); return parameters; } private JAXBElement<UsernameTokenType> createUsernameToken(String name, String password) { UsernameTokenType usernameToken = new UsernameTokenType(); AttributedString username = new AttributedString(); username.setValue(name); usernameToken.setUsername(username); // Add a password if (password != null) { PasswordString passwordString = new PasswordString(); passwordString.setValue(password); passwordString.setType(WSConstants.PASSWORD_TEXT); JAXBElement<PasswordString> passwordType = new JAXBElement<PasswordString>( QNameConstants.PASSWORD, PasswordString.class, passwordString ); usernameToken.getAny().add(passwordType); } return new JAXBElement<UsernameTokenType>( QNameConstants.USERNAME_TOKEN, UsernameTokenType.class, usernameToken ); } private Map<String, RealmProperties> createSamlRealms() { // Create Realms Map<String, RealmProperties> samlRealms = new HashMap<>(); RealmProperties samlRealm = new RealmProperties(); samlRealm.setIssuer("A-Issuer"); samlRealms.put("A", samlRealm); samlRealm = new RealmProperties(); samlRealm.setIssuer("B-Issuer"); samlRealms.put("B", samlRealm); return samlRealms; } private Properties getEncryptionProperties() { Properties properties = new Properties(); properties.put( "org.apache.wss4j.crypto.provider", "org.apache.wss4j.common.crypto.Merlin" ); properties.put("org.apache.wss4j.crypto.merlin.keystore.password", "stsspass"); properties.put("org.apache.wss4j.crypto.merlin.keystore.file", "keys/stsstore.jks"); return properties; } }