/* * JBoss, Home of Professional Open Source * Copyright 2005, JBoss Inc., and individual contributors as indicated * by the @authors tag. See the copyright.txt in the distribution for a * full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.jboss.security; import java.security.Principal; import java.util.Arrays; import java.util.HashSet; import java.util.Map; import java.util.Set; import javax.security.auth.Subject; import javax.security.auth.callback.Callback; import javax.security.auth.callback.CallbackHandler; import javax.security.auth.callback.NameCallback; import javax.security.auth.callback.PasswordCallback; import javax.security.auth.callback.UnsupportedCallbackException; import javax.security.auth.login.LoginException; import javax.security.auth.spi.LoginModule; /** A simple implementation of LoginModule for use by JBoss clients for the establishment of the caller identity and credentials. This simply sets the SecurityAssociation principal to the value of the NameCallback filled in by the CallbackHandler, and the SecurityAssociation credential to the value of the PasswordCallback filled in by the CallbackHandler. This is a variation of the original ClientLoginModule that does not set the SecurityAssociation information until commit and that uses the Subject principal over a SimplePrincipal if available. It has the following options: <ul> <li>multi-threaded=[true|false] When the multi-threaded option is set to true, the SecurityAssociation.setServer() so that each login thread has its own principal and credential storage. <li>password-stacking=tryFirstPass|useFirstPass When password-stacking option is set, this module first looks for a shared username and password using "javax.security.auth.login.name" and "javax.security.auth.login.password" respectively. This allows a module configured prior to this one to establish a valid username and password that should be passed to JBoss. </ul> @author Scott.Stark@jboss.org @version $Revision$ */ public class AltClientLoginModule implements LoginModule { private static final String MULTI_TREADED = "multi-threaded"; private static final String PASSWORD_STACKING = "password-stacking"; private static final String USE_FIRST_PASSWORD = "useFirstPass"; private static final String PRINCIPAL_CLASS = "principalClass"; private static final String[] ALL_VALID_OPTIONS = { MULTI_TREADED,PASSWORD_STACKING,PRINCIPAL_CLASS, SecurityConstants.SECURITY_DOMAIN_OPTION }; private Subject subject; private CallbackHandler callbackHandler; /** Shared state between login modules */ private Map<String,?> sharedState; /** Flag indicating if the shared password should be used */ private boolean useFirstPass; private String username; private char[] password = null; /** * Initialize this LoginModule. */ public void initialize(Subject subject, CallbackHandler callbackHandler, Map<String,?> sharedState, Map<String,?> options) { /* TODO: this module should really extend AbstractServerLoginModule where the options check is integrated. * the code here has been intentionally kept identical */ HashSet<String> validOptions = new HashSet<String>(Arrays.asList(ALL_VALID_OPTIONS)); for (Object key : options.keySet()) { if (!validOptions.contains((String)key)) { PicketBoxLogger.LOGGER.warnInvalidModuleOption((String)key); } } this.subject = subject; this.callbackHandler = callbackHandler; this.sharedState = sharedState; //log securityDomain, if set. PicketBoxLogger.LOGGER.debugModuleOption(SecurityConstants.SECURITY_DOMAIN_OPTION, options.get(SecurityConstants.SECURITY_DOMAIN_OPTION)); // Check for multi-threaded option String mt = (String) options.get(MULTI_TREADED); if( Boolean.valueOf(mt).booleanValue() == true ) { /* Turn on the server mode which uses thread local storage for the principal information. */ PicketBoxLogger.LOGGER.debugModuleOption(MULTI_TREADED, mt); } /* Check for password sharing options. Any non-null value for password_stacking sets useFirstPass as this module has no way to validate any shared password. */ String passwordStacking = (String) options.get(PASSWORD_STACKING); if(passwordStacking != null && passwordStacking.equalsIgnoreCase(USE_FIRST_PASSWORD)) useFirstPass = true; PicketBoxLogger.LOGGER.debugModuleOption(PASSWORD_STACKING, passwordStacking); } /** * Method to authenticate a Subject (phase 1). */ public boolean login() throws LoginException { // If useFirstPass is true, look for the shared password if( useFirstPass == true ) { return true; } /* There is no password sharing or we are the first login module. Get the username and password from the callback hander. */ if (callbackHandler == null) throw PicketBoxMessages.MESSAGES.noCallbackHandlerAvailable(); PasswordCallback pc = new PasswordCallback(PicketBoxMessages.MESSAGES.enterPasswordMessage(), false); NameCallback nc = new NameCallback(PicketBoxMessages.MESSAGES.enterUsernameMessage(), "guest"); Callback[] callbacks = {nc, pc}; try { char[] tmpPassword; callbackHandler.handle(callbacks); username = nc.getName(); tmpPassword = pc.getPassword(); if (tmpPassword != null) { password = new char[tmpPassword.length]; System.arraycopy(tmpPassword, 0, password, 0, tmpPassword.length); pc.clearPassword(); } } catch (java.io.IOException ioe) { throw new LoginException(ioe.toString()); } catch (UnsupportedCallbackException uce) { LoginException le = new LoginException(uce.getLocalizedMessage()); le.initCause(uce); throw le; } return true; } /** Method to commit the authentication process (phase 2). This is where the * SecurityAssociation information is set. The principal is obtained from: * The shared state javax.security.auth.login.name property when useFirstPass * is true. If the value is a Principal it is used as is, else a SimplePrincipal * using the value.toString() as its name is used. If useFirstPass the * username obtained from the callback handler is used to build the * SimplePrincipal. Both may be overriden if the resulting authenticated * Subject principals set it not empty. * */ public boolean commit() throws LoginException { Set<Principal> principals = subject.getPrincipals(); Principal p = null; Object credential = password; if( useFirstPass == true ) { Object user = sharedState.get("javax.security.auth.login.name"); if( (user instanceof Principal) == false ) { username = user != null ? user.toString() : ""; p = new SimplePrincipal(username); } else { p = (Principal) user; } credential = sharedState.get("javax.security.auth.login.password"); } else { p = new SimplePrincipal(username); } if( principals.isEmpty() == false ) p = principals.iterator().next(); SecurityAssociationActions.setPrincipalInfo(p, credential, subject); return true; } /** * Method to abort the authentication process (phase 2). */ public boolean abort() throws LoginException { int length = password != null ? password.length : 0; for(int n = 0; n < length; n ++) password[n] = 0; SecurityAssociationActions.clear(); return true; } public boolean logout() throws LoginException { SecurityAssociationActions.clear(); return true; } }