krb5loginmodule.java

来自「JAVA 所有包」· Java 代码 · 共 1,143 行 · 第 1/3 页

JAVA
1,143
字号
/* * @(#)Krb5LoginModule.java	1.32 06/06/01 * * Copyright 2006 Sun Microsystems, Inc. All rights reserved. * SUN PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. */package com.sun.security.auth.module;import java.io.*;import java.net.*;import java.text.MessageFormat;import java.util.*;import javax.security.auth.*;import javax.security.auth.kerberos.*;import javax.security.auth.callback.*;import javax.security.auth.login.*;import javax.security.auth.spi.*;import sun.security.krb5.*;import sun.security.krb5.Config;import sun.security.krb5.RealmException;import sun.security.util.AuthResources;import sun.security.jgss.krb5.Krb5Util;import sun.security.krb5.Credentials;import sun.misc.HexDumpEncoder;/** * <p> This <code>LoginModule</code> authenticates users using  * Kerberos protocols.  * * <p> The configuration entry for <code>Krb5LoginModule</code> has  * several options that control the authentication process and  * additions to the <code>Subject</code>'s private credential * set. Irrespective of these options, the <code>Subject</code>'s * principal set and private credentials set are updated only when  * <code>commit</code> is called. * When <code>commit</code> is called, the <code>KerberosPrincipal</code> * is added to the  <code>Subject</code>'s * principal set and <code>KerberosTicket</code> is * added to the <code>Subject</code>'s private credentials. * * <p> If the configuration entry for <code>KerberosLoginModule</code>  * has the option <code>storeKey</code> set to true, then   * <code>KerberosKey</code> will also be added to the  * subject's private credentials. <code>KerberosKey</code>, the principal's * key will be either obtained from the keytab or * derived from user's password. *  * <p> This <code>LoginModule</code> recognizes the <code>doNotPrompt</code>  * option. If set to true the user will not be prompted for the password. * * <p> The user can  specify the location of the ticket cache by using  * the option <code>ticketCache</code> in the configuration entry.  *  * <p>The user can specify the keytab location by using  * the option <code>keyTab</code> * in the configuration entry. * * <p> The principal name can be specified in the configuration entry  * by using the option <code>principal</code>. The principal name  * can either be a simple user name or a service name such as * <code>host/mission.eng.sun.com</code>. The principal can also  * be set using the system property <code>sun.security.krb5.principal</code>.  * This property is checked during login. If this property is not set, then * the principal name from the configuration is used. In the * case where the principal property is not set and the principal * entry also does not exist, the user is prompted for the name.    * * <p> The following is a list of configuration options supported  * for <code>Krb5LoginModule</code>: * <dl> * <blockquote><dt><b><code>refreshKrb5Config</code></b>:</dt> * <dd> Set this to true, if you want the configuration * to be refreshed before the <code>login</code> method is called.</dd> * <P> * <dt><b><code>useTicketCache</code></b>:</dt>  * <dd>Set this to true, if you want the  * TGT to be obtained * from the ticket cache. Set this option  * to false if you do not want this module to use the ticket cache. * (Default is False). * This module will  * search for the tickect  * cache in the following locations: * For Windows 2000, it will use Local Security Authority (LSA) API  * to get the TGT. On Solaris and Linux  * it will look for the ticket cache in /tmp/krb5cc_<code>uid</code> * where the uid is numeric user * identifier. If the ticket cache is  * not available in either of the above locations, or if we are on a * different Windows platform,  it will look for the cache as  * {user.home}{file.separator}krb5cc_{user.name}. * You can override the ticket cache location by using * <code>ticketCache</code>  * <P> * <dt><b><code>ticketCache</code></b>:</dt>  * <dd>Set this to the name of the ticket  * cache that  contains user's TGT.  * If this is set,  <code>useTicketCache</code>  * must also be set to true; Otherwise a configuration error will  * be returned.</dd> *  <P>  * <dt><b><code>renewTGT</code></b>:</dt>  * <dd>Set this to true, if you want to renew * the TGT. If this is set, <code>useTicketCache</code> must also be  * set to true; otherwise a configuration error will be returned.</dd>  * <p> * <dt><b><code>doNotPrompt</code></b>:</dt>  * <dd>Set this to true if you do not want to be * prompted for the password  * if credentials can  * not be obtained from the cache or keytab.(Default is false)   * If set to true authentication will fail if credentials can  * not be obtained from the cache or keytab.</dd>  * <P> * <dt><b><code>useKeyTab</code></b>:</dt>  * <dd>Set this to true if you  * want the module to get the principal's key from the * the keytab.(default value is False)  * If <code>keyatb</code>  * is not set then * the module will locate the keytab from the  * Kerberos configuration file.</dd>  * If it is not specifed in the Kerberos configuration file  * then it will look for the file * <code>{user.home}{file.separator}</code>krb5.keytab.</dd> * <P> * <dt><b><code>keyTab</code></b>:</dt>  * <dd>Set this to the file name of the  * keytab to get principal's secret key.</dd> * <P> * <dt><b><code>storeKey</code></b>:</dt>  * <dd>Set this to true to if you want the * principal's key to be stored in the Subject's private credentials. </dd> * <p>  * <dt><b><code>principal</code></b>:</dt> * <dd>The name of the principal that should  * be used. The principal can be a simple username such as  * "<code>testuser</code>" or a service name such as * "<code>host/testhost.eng.sun.com</code>". You can use the * <code>principal</code>  option to set the principal when there are * credentials for multiple principals in the * <code>keyTab</code> or when you want a specific ticket cache only.   * The principal can also be set using the system property  * <code>sun.security.krb5.principal</code>. In addition, if this  * system property is defined, then it will be used. If this property  * is not set, then the principal name from the configuration will be  * used.</dd> * <P> * <dt><b><code>isInitiator</code></b>:</dt>  * <dd>Set this to true, if initiator. Set this to false, if acceptor only. * (Default is true). * Note: Do not set this value to false for initiators.</dd> * </dl></blockquote> * * <p> This <code>LoginModule</code> also recognizes the following additional  * <code>Configuration</code> * options that enable you to share username and passwords across different  * authentication modules: * <pre> * *    useFirstPass   if, true, this LoginModule retrieves the *                   username and password from the module's shared state, *                   using "javax.security.auth.login.name" and *                   "javax.security.auth.login.password" as the respective *                   keys. The retrieved values are used for authentication. *                   If authentication fails, no attempt for a retry *                   is made, and the failure is reported back to the *                   calling application. * *    tryFirstPass   if, true, this LoginModule retrieves the *                   the username and password from the module's shared *                   state using "javax.security.auth.login.name" and *                   "javax.security.auth.login.password" as the respective *                   keys.  The retrieved values are used for *                   authentication. *                   If authentication fails, the module uses the *                   CallbackHandler to retrieve a new username *                   and password, and another attempt to authenticate *                   is made. If the authentication fails,  *                   the failure is reported back to the calling application * *    storePass      if, true, this LoginModule stores the username and *                   password obtained from the CallbackHandler in the *                   modules shared state, using  *                   "javax.security.auth.login.name" and  *                   "javax.security.auth.login.password" as the respective *                   keys.  This is not performed if existing values already *                   exist for the username and password in the shared *                   state, or if authentication fails. * *    clearPass     if, true, this <code>LoginModule</code> clears the *                  username and password stored in the module's shared *                  state  after both phases of authentication *                  (login and commit)  have completed. * </pre> * <p>Examples of some configuration values for Krb5LoginModule in  * JAAS config file and the results are: * <ul> * <p> <code>doNotPrompt</code>=true; * </ul> * <p> This is an illegal combination since <code>useTicketCache</code> * is not set and the user can not be prompted for the password. *<ul> * <p> <code>ticketCache</code> = < filename >; *</ul> * <p> This is an illegal combination since <code>useTicketCache</code> * is not set to true and the ticketCache is set. A configuration error * will occur. * <ul> * <p> <code>renewTGT</code>=true; *</ul> * <p> This is an illegal combination since <code>useTicketCache</code> is * not set to true and renewTGT is set. A configuration error will occur. * <ul> * <p> <code>storeKey</code>=true * <code>useTicketCache</code> = true * <code>doNotPrompt</code>=true;; *</ul> * <p> This is an illegal combination since  <code>storeKey</code> is set to * true but the key can not be obtained either by prompting the user or from * the keytab.A configuration error will occur. * <ul> * <p>  <code>keyTab</code> = < filename > <code>doNotPrompt</code>=true ; * </ul> * <p>This is an illegal combination since useKeyTab is not set to true and * the keyTab is set. A configuration error will occur. * <ul> * <p> <code>debug=true </code> *</ul> * <p> Prompt the user for the principal name and the password. * Use the authentication exchange to get TGT from the KDC and  * populate the <code>Subject</code> with the principal and TGT.  * Output debug messages. * <ul> * <p> <code>useTicketCache</code> = true <code>doNotPrompt</code>=true; *</ul> * <p>Check the default cache for TGT and populate the <code>Subject</code> * with the principal and TGT. If the TGT is not available,  * do not prompt the user, instead fail the authentication. * <ul> * <p><code>principal</code>=< name ><code>useTicketCache</code> = true  * <code>doNotPrompt</code>=true; *</ul> * <p> Get the TGT from the default cache for the principal and populate the * Subject's principal and private creds set. If ticket cache is * not available or does not contain the principal's TGT  * authentication will fail. * <ul> * <p> <code>useTicketCache</code> = true  * <code>ticketCache</code>=< file name ><code>useKeyTab</code> = true  * <code> keyTab</code>=< keytab filename > * <code>principal</code> = < principal name > * <code>doNotPrompt</code>=true; *</ul> * <p>  Search the cache for the principal's TGT. If it is not available  * use the key in the keytab to perform authentication exchange with the  * KDC and acquire the TGT. * The Subject will be populated with the principal and the TGT. * If the key is not available or valid then authentication will fail. * <ul> * <p><code>useTicketCache</code> = true  * <code>ticketCache</code>=< file name > *</ul> * <p> The TGT will be obtained from the cache specified.  * The Kerberos principal name used will be the principal name in * the Ticket cache. If the TGT is not available in the * ticket cache the user will be prompted for the principal name  * and the password. The TGT will be obtained using the authentication  * exchange with the KDC. * The Subject will be populated with the TGT. *<ul> * <p> <code>useKeyTab</code> = true  * <code>keyTab</code>=< keytab filename > * <code>principal</code>= < principal name >  * <code>storeKey</code>=true; *</ul> * <p>  The key for the principal will be retrieved from the keytab. * If the key is not available in the keytab the user will be prompted * for the principal's password. The Subject will be populated * with the principal's key either from the keytab or derived from the * password entered. * <ul> * <p> <code>useKeyTab</code> = true  * <code>keyTab</code>=< keytabname > * <code>storeKey</code>=true * <code>doNotPrompt</code>=true; *</ul> * <p>The user will be prompted for the service principal name.  * If the principal's * longterm key is available in the keytab , it will be added to the * Subject's private credentials. An authentication exchange will be  * attempted with the principal name and the key from the Keytab.  * If successful the TGT will be added to the * Subject's private credentials set. Otherwise the authentication will * fail. *<ul> * <p><code>useKeyTab</code> = true * <code>keyTab</code>=< file name > <code>storeKey</code>=true * <code>principal</code>= < principal name >  * <code>useTicketCache</code>=true * <code>ticketCache</code>=< file name >; *</ul> * <p>The principal's key will be retrieved from the keytab and added * to the <code>Subject</code>'s private credentials. If the key  * is not available, the * user will be prompted for the password; the key derived from the password * will be added to the Subject's private credentials set. The * client's TGT will be retrieved from the ticket cache and added to the * <code>Subject</code>'s private credentials. If the TGT is not available   * in the ticket cache, it will be obtained using the authentication * exchange and added to the Subject's private credentials. * <ul> * <p><code>isInitiator</code> = false  *</ul> * <p>Configured to act as acceptor only, credentials are not acquired * via AS exchange. For acceptors only, set this value to false.  * For initiators, do not set this value to false. * <ul> * <p><code>isInitiator</code> = true  *</ul> * <p>Configured to act as initiator, credentials are acquired * via AS exchange. For initiators, set this value to true, or leave this * option unset, in which case default value (true) will be used. * * @version 1.18, 01/11/00 * @author Ram Marti */public class Krb5LoginModule implements LoginModule {    // initial state    private Subject subject;    private CallbackHandler callbackHandler;    private Map sharedState;    private Map options;    // configurable option    private boolean debug = false;    private boolean storeKey = false;    private boolean doNotPrompt = false;    private boolean useTicketCache = false;    private boolean useKeyTab = false;    private String ticketCacheName = null;    private String keyTabName = null;    private String princName = null;    private boolean useFirstPass = false;    private boolean tryFirstPass = false;    private boolean storePass = false;    private boolean clearPass = false;    private boolean refreshKrb5Config = false;    private boolean renewTGT = false;    // specify if initiator.    // perform authentication exchange if initiator    private boolean isInitiator = true;    // the authentication status    private boolean succeeded = false;    private boolean commitSucceeded = false;    private String username;    private EncryptionKey[] encKeys = null;    private Credentials cred = null;    private PrincipalName principal = null;    private KerberosPrincipal kerbClientPrinc = null;    private KerberosTicket kerbTicket = null;    private KerberosKey[] kerbKeys = null;    private StringBuffer krb5PrincName = null;    private char[] password = null;    private static final String NAME = "javax.security.auth.login.name";    private static final String PWD = "javax.security.auth.login.password";    static final java.util.ResourceBundle rb =        java.util.ResourceBundle.getBundle("sun.security.util.AuthResources");    /**

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?