/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.wss4j.policy.stax.assertionStates; import javax.xml.namespace.QName; import org.apache.wss4j.common.saml.SamlAssertionWrapper; import org.apache.wss4j.common.WSSPolicyException; import org.apache.wss4j.policy.SPConstants; import org.apache.wss4j.policy.model.AbstractSecurityAssertion; import org.apache.wss4j.policy.model.AbstractToken; import org.apache.wss4j.policy.model.SamlToken; import org.apache.wss4j.policy.stax.PolicyAsserter; import org.apache.wss4j.stax.securityToken.WSSecurityTokenConstants; import org.apache.xml.security.exceptions.XMLSecurityException; import org.opensaml.saml.common.SAMLVersion; import org.apache.wss4j.stax.securityEvent.SamlTokenSecurityEvent; import org.apache.wss4j.stax.securityEvent.WSSecurityEventConstants; import org.apache.xml.security.stax.securityEvent.SecurityEventConstants; import org.apache.xml.security.stax.securityEvent.TokenSecurityEvent; import org.apache.xml.security.stax.securityToken.SecurityToken; import org.apache.xml.security.stax.securityToken.SecurityTokenConstants.KeyIdentifier; /** * WSP1.3, 5.4.8 SamlToken Assertion */ public class SamlTokenAssertionState extends TokenAssertionState { public SamlTokenAssertionState(AbstractSecurityAssertion assertion, boolean asserted, PolicyAsserter policyAsserter, boolean initiator) { super(assertion, asserted, policyAsserter, initiator); if (asserted) { SamlToken token = (SamlToken) getAssertion(); String namespace = token.getName().getNamespaceURI(); if (token.isRequireKeyIdentifierReference()) { getPolicyAsserter().assertPolicy(new QName(namespace, SPConstants.REQUIRE_KEY_IDENTIFIER_REFERENCE)); } if (token.getSamlTokenType() != null) { getPolicyAsserter().assertPolicy(new QName(namespace, token.getSamlTokenType().name())); } } } @Override public SecurityEventConstants.Event[] getSecurityEventType() { return new SecurityEventConstants.Event[]{ WSSecurityEventConstants.SAML_TOKEN }; } @Override public boolean assertToken(TokenSecurityEvent<? extends SecurityToken> tokenSecurityEvent, AbstractToken abstractToken) throws WSSPolicyException, XMLSecurityException { if (!(tokenSecurityEvent instanceof SamlTokenSecurityEvent)) { throw new WSSPolicyException("Expected a SamlTokenSecurityEvent but got " + tokenSecurityEvent.getClass().getName()); } SamlTokenSecurityEvent samlTokenSecurityEvent = (SamlTokenSecurityEvent) tokenSecurityEvent; SamlToken samlToken = (SamlToken) abstractToken; if (samlToken.getIssuerName() != null && !samlToken.getIssuerName().equals(samlTokenSecurityEvent.getIssuerName())) { setErrorMessage("IssuerName in Policy (" + samlToken.getIssuerName() + ") didn't match with the one in the SamlToken (" + samlTokenSecurityEvent.getIssuerName() + ")"); getPolicyAsserter().unassertPolicy(getAssertion(), getErrorMessage()); return false; } String namespace = getAssertion().getName().getNamespaceURI(); if (samlToken.isRequireKeyIdentifierReference()) { KeyIdentifier keyIdentifier = samlTokenSecurityEvent.getSecurityToken().getKeyIdentifier(); if (!WSSecurityTokenConstants.KeyIdentifier_X509KeyIdentifier.equals(keyIdentifier)) { setErrorMessage("Policy enforces KeyIdentifierReference but we got " + samlTokenSecurityEvent.getSecurityToken().getTokenType()); getPolicyAsserter().unassertPolicy(new QName(namespace, SPConstants.REQUIRE_KEY_IDENTIFIER_REFERENCE), getErrorMessage()); return false; } else { getPolicyAsserter().assertPolicy(new QName(namespace, SPConstants.REQUIRE_KEY_IDENTIFIER_REFERENCE)); } } if (samlToken.getSamlTokenType() != null) { final SamlAssertionWrapper samlAssertionWrapper = samlTokenSecurityEvent.getSamlAssertionWrapper(); switch (samlToken.getSamlTokenType()) { case WssSamlV11Token10: if (samlAssertionWrapper.getSamlVersion() != SAMLVersion.VERSION_11) { setErrorMessage("Policy enforces SamlVersion11Profile10 but we got " + samlAssertionWrapper.getSamlVersion()); getPolicyAsserter().unassertPolicy(new QName(namespace, samlToken.getSamlTokenType().name()), getErrorMessage()); return false; } getPolicyAsserter().assertPolicy(new QName(namespace, samlToken.getSamlTokenType().name())); break; case WssSamlV11Token11: if (samlAssertionWrapper.getSamlVersion() != SAMLVersion.VERSION_11) { setErrorMessage("Policy enforces SamlVersion11Profile11 but we got " + samlAssertionWrapper.getSamlVersion()); getPolicyAsserter().unassertPolicy(new QName(namespace, samlToken.getSamlTokenType().name()), getErrorMessage()); return false; } getPolicyAsserter().assertPolicy(new QName(namespace, samlToken.getSamlTokenType().name())); break; case WssSamlV20Token11: if (samlAssertionWrapper.getSamlVersion() != SAMLVersion.VERSION_20) { setErrorMessage("Policy enforces SamlVersion20Profile11 but we got " + samlAssertionWrapper.getSamlVersion()); getPolicyAsserter().unassertPolicy(new QName(namespace, samlToken.getSamlTokenType().name()), getErrorMessage()); return false; } getPolicyAsserter().assertPolicy(new QName(namespace, samlToken.getSamlTokenType().name())); break; case WssSamlV10Token10: case WssSamlV10Token11: setErrorMessage("Unsupported token type: " + samlToken.getSamlTokenType()); getPolicyAsserter().unassertPolicy(new QName(namespace, samlToken.getSamlTokenType().name()), getErrorMessage()); return false; } } //always return true to prevent false alarm in case additional tokens with the same usage //appears in the message but do not fulfill the policy and are also not needed to fulfil the policy. getPolicyAsserter().assertPolicy(getAssertion()); return true; } }