/* * JBoss, Home of Professional Open Source. * Copyright 2006, Red Hat Middleware LLC, and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.picketbox.datasource.security; import java.security.AccessController; import java.security.Principal; import java.security.PrivilegedActionException; import java.security.PrivilegedExceptionAction; import java.security.acl.Group; import java.util.Map; import javax.management.MBeanServer; import javax.management.ObjectName; import javax.security.auth.Subject; import javax.security.auth.callback.CallbackHandler; import javax.security.auth.login.LoginException; import org.jboss.security.PicketBoxLogger; import org.jboss.security.PicketBoxMessages; import org.jboss.security.SimplePrincipal; /** A login module for statically defining a data source username and password that uses a password that has been ecrypted by a JaasSecurityDomain. The base64 format of the data source password may be generated using the PBEUtils command: java -cp jbosssx.jar org.jboss.security.plugins.PBEUtils salt count domain-password data-source-password salt : the Salt attribute from the JaasSecurityDomain count : the IterationCount attribute from the JaasSecurityDomain domain-password : the plaintext password that maps to the KeyStorePass attribute from the JaasSecurityDomain data-source-password : the plaintext password for the data source that should be encrypted with the JaasSecurityDomain password for example: java -cp jbosssx.jar org.jboss.security.plugins.PBEUtils abcdefgh 13 master '' Encoded password: E5gtGMKcXPP A sample login-config.xml configuration entry would be: <application-policy name = "EncryptedHsqlDbRealm"> <authentication> <login-module code = "org.jboss.resource.security.JaasSecurityDomainIdentityLoginModule" flag = "required"> <module-option name = "userName">sa</module-option> <module-option name = "password">E5gtGMKcXPP</module-option> <module-option name = "managedConnectionFactoryName">jboss.jca:service=LocalTxCM,name=DefaultDS</module-option> <module-option name = "jaasSecurityDomain">jboss.security:service=JaasSecurityDomain,domain=ServerMasterPassword</module-option> </login-module> </authentication> </application-policy> @author Scott.Stark@jboss.org @author <a href="mailto:noel.rocher@jboss.org">Noel Rocher</a> 29, june 2004 username & userName issue @version $Revision: 71545 $ @deprecated security domains are not used for encryption currently */ @Deprecated @SuppressWarnings("unchecked") public class JaasSecurityDomainIdentityLoginModule extends AbstractPasswordCredentialLoginModule { private String username; private String password; @SuppressWarnings("unused") private ObjectName jaasSecurityDomain; @SuppressWarnings("rawtypes") public void initialize(Subject subject, CallbackHandler handler, Map sharedState, Map options) { super.initialize(subject, handler, sharedState, options); // NR : we keep this username for compatibility username = (String) options.get("username"); if( username == null ) { // NR : try with userName username = (String) options.get("userName"); if( username == null ) { throw new IllegalArgumentException(PicketBoxMessages.MESSAGES.missingRequiredModuleOptionMessage("username")); } } password = (String) options.get("password"); if( password == null ) { throw new IllegalArgumentException(PicketBoxMessages.MESSAGES.missingRequiredModuleOptionMessage("password")); } String name = (String) options.get("jaasSecurityDomain"); if( name == null ) { throw new IllegalArgumentException(PicketBoxMessages.MESSAGES.missingRequiredModuleOptionMessage("jaasSecurityDomain")); } try { jaasSecurityDomain = new ObjectName(name); } catch(Exception e) { throw new IllegalArgumentException(e); } } public boolean login() throws LoginException { PicketBoxLogger.LOGGER.traceBeginLogin(); if( super.login() == true ) return true; super.loginOk = true; return true; } public boolean commit() throws LoginException { Principal principal = new SimplePrincipal(username); SubjectActions.addPrincipals(subject, principal); sharedState.put("javax.security.auth.login.name", username); // Decode the encrypted password // try // { // char[] decodedPassword = DecodeAction.decode(password, // jaasSecurityDomain, getServer()); // PasswordCredential cred = new PasswordCredential(username, decodedPassword); // cred.setManagedConnectionFactory(getMcf()); // SubjectActions.addCredentials(subject, cred); // } // catch(Exception e) // { // throw new LoginException(ErrorCodes.PROCESSING_FAILED + "Failed to decode password: " + e.getMessage()); // } return true; } public boolean abort() { username = null; password = null; return true; } protected Principal getIdentity() { PicketBoxLogger.LOGGER.traceBeginGetIdentity(username); Principal principal = new SimplePrincipal(username); return principal; } protected Group[] getRoleSets() throws LoginException { Group[] empty = new Group[0]; return empty; } @SuppressWarnings({"rawtypes", "unused"}) private static class DecodeAction implements PrivilegedExceptionAction { String password; ObjectName jaasSecurityDomain; MBeanServer server; DecodeAction(String password, ObjectName jaasSecurityDomain, MBeanServer server) { this.password = password; this.jaasSecurityDomain = jaasSecurityDomain; this.server = server; } /** * * @return * @throws Exception */ public Object run() throws Exception { // Invoke the jaasSecurityDomain.decodeb64 op Object[] args = {password}; String[] sig = {String.class.getName()}; byte[] secret = (byte[]) server.invoke(jaasSecurityDomain, "decode64", args, sig); // Convert to UTF-8 base char array String secretPassword = new String(secret, "UTF-8"); return secretPassword.toCharArray(); } static char[] decode(String password, ObjectName jaasSecurityDomain, MBeanServer server) throws Exception { DecodeAction action = new DecodeAction(password, jaasSecurityDomain, server); try { char[] decode = (char[]) AccessController.doPrivileged(action); return decode; } catch(PrivilegedActionException e) { throw e.getException(); } } } }