gluu
公開メンバ関数 | 非公開メンバ関数 | 非公開変数類 | 静的非公開変数類 | 全メンバ一覧
org.gluu.oxtrust.action.Authenticator クラス
org.gluu.oxtrust.action.Authenticator の継承関係図
Inheritance graph
org.gluu.oxtrust.action.Authenticator 連携図
Collaboration graph

公開メンバ関数

boolean preAuthenticate () throws IOException, Exception
 
boolean authenticate ()
 
void processLogout () throws Exception
 
String postLogout ()
 
void oAuthlLogout () throws Exception
 
boolean Shibboleth3Authenticate ()
 
boolean oAuthLogin () throws IOException, Exception
 
String oAuthGetAccessToken () throws JSONException
 

非公開メンバ関数

void postLogin (User user)
 
User findUserByUserName (String userName)
 
GluuCustomPerson findPersonByDn (String userDn)
 
String requestAccessToken (String oxAuthHost, String authorizationCode, String sessionState, String scopes, String clientID, String clientPassword)
 
String getOxAuthHost (String oxAuthAuthorizeUrl)
 

非公開変数類

Logger log
 
Identity identity
 
Credentials credentials
 
FacesService facesService
 
IPersonService personService
 
SecurityService securityService
 
SsoLoginAction ssoLoginAction
 
ApplianceService applianceService
 
OpenIdService openIdService
 
FacesMessages facesMessages
 
AppConfiguration appConfiguration
 
EncryptionService encryptionService
 

静的非公開変数類

static final String LOGIN_FAILED_OX_TRUST = "Login failed, oxTrust wasn't allowed to access user data"
 
static final long serialVersionUID = -3975272457541385597L
 

詳解

Provides authentication using oAuth

著者
Reda Zerrad Date: 05.11.2012
Yuriy Movchan Date: 02.12.2013

関数詳解

◆ authenticate()

boolean org.gluu.oxtrust.action.Authenticator.authenticate ( )
inline
124  {
125  String userName = null;
126  try {
127  userName = identity.getOauthData().getUserUid();
128  identity.getCredentials().setUsername(userName);
129  log.info("Authenticating user '{}'", userName);
130 
131  User user = findUserByUserName(userName);
132  if (user == null) {
133  log.error("Person '{}' not found in LDAP", userName);
134  return false;
135  } else if (GluuStatus.EXPIRED.getValue().equals(user.getAttribute("gluuStatus"))
136  || GluuStatus.REGISTER.getValue().equals(user.getAttribute("gluuStatus"))) {
137  HashMap<String, Object> params = new HashMap<String, Object>();
138  params.put("inum", user.getInum());
139  facesService.redirect("/register.xhtml", params);
140  return false;
141  }
142 
143  postLogin(user);
144  log.info("User '{}' authenticated successfully", userName);
145  } catch (Exception ex) {
146  log.error("Failed to authenticate user '{}'", userName, ex);
147  return false;
148  }
149 
150  return true;
151  }
String getUserUid()
Definition: OauthData.java:38
OauthData getOauthData()
Definition: Identity.java:31
Identity identity
Definition: Authenticator.java:83
User findUserByUserName(String userName)
Definition: Authenticator.java:176
Logger log
Definition: Authenticator.java:80
void postLogin(User user)
Definition: Authenticator.java:158
FacesService facesService
Definition: Authenticator.java:89

◆ findPersonByDn()

GluuCustomPerson org.gluu.oxtrust.action.Authenticator.findPersonByDn ( String  userDn)
inlineprivate
187  {
188  GluuCustomPerson person = null;
189  try {
190  person = personService.getPersonByDn(userDn);
191  } catch (Exception ex) {
192  log.error("Failed to find person '{}' in ldap", userDn, ex);
193  }
194 
195  return person;
196  }
IPersonService personService
Definition: Authenticator.java:92
abstract GluuCustomPerson getPersonByDn(String dn)
Logger log
Definition: Authenticator.java:80

◆ findUserByUserName()

User org.gluu.oxtrust.action.Authenticator.findUserByUserName ( String  userName)
inlineprivate
176  {
177  User user = null;
178  try {
179  user = personService.getUserByUid(userName);
180  } catch (Exception ex) {
181  log.error("Failed to find user '{}' in ldap", userName, ex);
182  }
183 
184  return user;
185  }
IPersonService personService
Definition: Authenticator.java:92
abstract User getUserByUid(String uid)
Logger log
Definition: Authenticator.java:80

◆ getOxAuthHost()

String org.gluu.oxtrust.action.Authenticator.getOxAuthHost ( String  oxAuthAuthorizeUrl)
inlineprivate
538  {
539  try {
540  URL url = new URL(oxAuthAuthorizeUrl);
541  return String.format("%s://%s:%s", url.getProtocol(), url.getHost(), url.getPort());
542  } catch (MalformedURLException ex) {
543  log.error("Invalid oxAuth authorization URI: '{}'", oxAuthAuthorizeUrl, ex);
544  }
545 
546  return null;
547  }
Logger log
Definition: Authenticator.java:80

◆ oAuthGetAccessToken()

String org.gluu.oxtrust.action.Authenticator.oAuthGetAccessToken ( ) throws JSONException
inline

After successful login, oxAuth will redirect user to this method. Obtains access token using authorization code and verifies if access token is valid

戻り値
例外
JSONException
358  {
359  String oxAuthAuthorizeUrl = openIdService.getOpenIdConfiguration().getAuthorizationEndpoint();
360  String oxAuthHost = getOxAuthHost(oxAuthAuthorizeUrl);
361  if (StringHelper.isEmpty(oxAuthHost)) {
362  log.info("Failed to determine oxAuth host using oxAuthAuthorizeUrl: '{}'", oxAuthAuthorizeUrl);
363  facesMessages.add(FacesMessage.SEVERITY_ERROR, LOGIN_FAILED_OX_TRUST);
364  return OxTrustConstants.RESULT_NO_PERMISSIONS;
365  }
366 
367  Map<String, String> requestParameterMap = FacesContext.getCurrentInstance().getExternalContext()
368  .getRequestParameterMap();
369  Map<String, Object> requestCookieMap = FacesContext.getCurrentInstance().getExternalContext()
370  .getRequestCookieMap();
371 
372  String authorizationCode = requestParameterMap.get(OxTrustConstants.OXAUTH_CODE);
373 
374  // Check state
375  String authorizationState = requestParameterMap.get(OxTrustConstants.OXAUTH_STATE);
376  String stateSession = (String) identity.getSessionMap().get(OxTrustConstants.OXAUTH_STATE);
377  if (!StringHelper.equals(stateSession, authorizationState)) {
378  String error = requestParameterMap.get(OxTrustConstants.OXAUTH_ERROR);
379  String errorDescription = requestParameterMap.get(OxTrustConstants.OXAUTH_ERROR_DESCRIPTION);
380  log.error("No state sent. Error: " + error + ". Error description: " + errorDescription);
381  facesMessages.add(FacesMessage.SEVERITY_ERROR, LOGIN_FAILED_OX_TRUST);
382 
383  return OxTrustConstants.RESULT_NO_PERMISSIONS;
384  }
385 
386  Object sessionStateCookie = requestCookieMap.get(OxTrustConstants.OXAUTH_SESSION_STATE);
387  String sessionState = null;
388  if (sessionStateCookie != null) {
389  sessionState = ((Cookie) sessionStateCookie).getValue();
390  }
391 
392  if (authorizationCode == null) {
393  String error = requestParameterMap.get(OxTrustConstants.OXAUTH_ERROR);
394  String errorDescription = requestParameterMap.get(OxTrustConstants.OXAUTH_ERROR_DESCRIPTION);
395 
396  log.error("No authorization code sent. Error: " + error + ". Error description: " + errorDescription);
397  facesMessages.add(FacesMessage.SEVERITY_ERROR, LOGIN_FAILED_OX_TRUST);
398 
399  return OxTrustConstants.RESULT_NO_PERMISSIONS;
400  }
401 
402  // todo hardcoded for now. Once clients are dynamically registered with
403  // oxAuth, change this
404  // String credentials = appConfiguration.getOxAuthClientId() +
405  // ":secret";
406  // String credentials = appConfiguration.getOxAuthClientId() +
407  // ":5967d41c-ce9c-4137-9068-42578df0c606";
408  // String clientCredentials =
409  // appConfiguration.getOxAuthClientCredentials();
410  log.info("authorizationCode : " + authorizationCode);
411 
412  String scopes = requestParameterMap.get(OxTrustConstants.OXAUTH_SCOPE);
413  log.info(" scopes : " + scopes);
414 
415  String clientID = appConfiguration.getOxAuthClientId();
416  log.info("clientID : " + clientID);
417 
418  String clientPassword = appConfiguration.getOxAuthClientPassword();
419  if (clientPassword != null) {
420  try {
421  clientPassword = encryptionService.decrypt(clientPassword);
422  } catch (EncryptionException ex) {
423  log.error("Failed to decrypt client password", ex);
424  }
425  }
426 
427  String result = requestAccessToken(oxAuthHost, authorizationCode, sessionState, scopes, clientID,
428  clientPassword);
429 
430  if (OxTrustConstants.RESULT_NO_PERMISSIONS.equals(result)) {
431  facesMessages.add(FacesMessage.SEVERITY_ERROR, LOGIN_FAILED_OX_TRUST);
432  } else if (OxTrustConstants.RESULT_FAILURE.equals(result)) {
433  facesMessages.add(FacesMessage.SEVERITY_ERROR, "Login failed");
434  }
435 
436  return result;
437  }
String getOxAuthHost(String oxAuthAuthorizeUrl)
Definition: Authenticator.java:538
String decrypt(String encryptedString)
Definition: EncryptionService.java:34
OpenIdService openIdService
Definition: Authenticator.java:104
OpenIdConfigurationResponse getOpenIdConfiguration()
Definition: OpenIdService.java:66
AppConfiguration appConfiguration
Definition: Authenticator.java:110
FacesMessages facesMessages
Definition: Authenticator.java:107
Map< String, Object > getSessionMap()
Definition: Identity.java:47
Identity identity
Definition: Authenticator.java:83
String requestAccessToken(String oxAuthHost, String authorizationCode, String sessionState, String scopes, String clientID, String clientPassword)
Definition: Authenticator.java:439
static final String LOGIN_FAILED_OX_TRUST
Definition: Authenticator.java:75
String getAuthorizationEndpoint()
Definition: OpenIdConfigurationResponse.java:174
Logger log
Definition: Authenticator.java:80
EncryptionService encryptionService
Definition: Authenticator.java:113

◆ oAuthlLogout()

void org.gluu.oxtrust.action.Authenticator.oAuthlLogout ( ) throws Exception
inline
213  {
214  OauthData oauthData = identity.getOauthData();
215  if (StringHelper.isEmpty(oauthData.getUserUid())) {
216  return;
217  }
218 
219  ClientRequest clientRequest = new ClientRequest(openIdService.getOpenIdConfiguration().getEndSessionEndpoint());
220 
221  clientRequest.queryParameter(OxTrustConstants.OXAUTH_SESSION_STATE, oauthData.getSessionState());
222  clientRequest.queryParameter(OxTrustConstants.OXAUTH_ID_TOKEN_HINT, oauthData.getIdToken());
223  clientRequest.queryParameter(OxTrustConstants.OXAUTH_POST_LOGOUT_REDIRECT_URI,
224  appConfiguration.getLogoutRedirectUrl());
225 
226  // Clean up OAuth token
227  oauthData.setUserUid(null);
228  oauthData.setIdToken(null);
229  oauthData.setSessionState(null);
230  oauthData = null;
231 
232  FacesContext.getCurrentInstance().getExternalContext().redirect(clientRequest.getUri());
233  }
OpenIdService openIdService
Definition: Authenticator.java:104
OpenIdConfigurationResponse getOpenIdConfiguration()
Definition: OpenIdService.java:66
OauthData getOauthData()
Definition: Identity.java:31
AppConfiguration appConfiguration
Definition: Authenticator.java:110
String getEndSessionEndpoint()
Definition: OpenIdConfigurationResponse.java:268
Identity identity
Definition: Authenticator.java:83
void setUserUid(String userUid)
Definition: OauthData.java:42

◆ oAuthLogin()

boolean org.gluu.oxtrust.action.Authenticator.oAuthLogin ( ) throws IOException, Exception
inline

Main entry point for oAuth authentication.

例外
IOException
Exception
316  {
317  ClientRequest clientRequest = new ClientRequest(
319  String clientId = appConfiguration.getOxAuthClientId();
320  String scope = appConfiguration.getOxAuthClientScope();
321  String responseType = "code";
322  String nonce = UUID.randomUUID().toString();
323  String state = UUID.randomUUID().toString();
324 
325  clientRequest.queryParameter(OxTrustConstants.OXAUTH_CLIENT_ID, clientId);
326  clientRequest.queryParameter(OxTrustConstants.OXAUTH_REDIRECT_URI, appConfiguration.getLoginRedirectUrl());
327  clientRequest.queryParameter(OxTrustConstants.OXAUTH_RESPONSE_TYPE, responseType);
328  clientRequest.queryParameter(OxTrustConstants.OXAUTH_SCOPE, scope);
329  clientRequest.queryParameter(OxTrustConstants.OXAUTH_NONCE, nonce);
330  clientRequest.queryParameter(OxTrustConstants.OXAUTH_STATE, state);
331 
332  // Store state and nonce
333  identity.getSessionMap().put(OxTrustConstants.OXAUTH_NONCE, nonce);
334  identity.getSessionMap().put(OxTrustConstants.OXAUTH_STATE, state);
335 
336  GluuAppliance appliance = applianceService.getAppliance(new String[] { "oxTrustAuthenticationMode" });
337  String acrValues = appliance.getOxTrustAuthenticationMode();
338  if (StringHelper.isNotEmpty(acrValues)) {
339  clientRequest.queryParameter(OxTrustConstants.OXAUTH_ACR_VALUES, acrValues);
340 
341  // Store authentication method
342  identity.getSessionMap().put(OxTrustConstants.OXAUTH_ACR_VALUES, acrValues);
343  }
344 
345  facesService.redirectToExternalURL(clientRequest.getUri().replaceAll("%2B", "+"));
346 
347  return true;
348  }
GluuAppliance getAppliance(String[] returnAttributes)
Definition: ApplianceService.java:111
OpenIdService openIdService
Definition: Authenticator.java:104
OpenIdConfigurationResponse getOpenIdConfiguration()
Definition: OpenIdService.java:66
ApplianceService applianceService
Definition: Authenticator.java:101
AppConfiguration appConfiguration
Definition: Authenticator.java:110
Map< String, Object > getSessionMap()
Definition: Identity.java:47
Identity identity
Definition: Authenticator.java:83
String getOxTrustAuthenticationMode()
Definition: GluuAppliance.java:237
String getAuthorizationEndpoint()
Definition: OpenIdConfigurationResponse.java:174
FacesService facesService
Definition: Authenticator.java:89

◆ postLogin()

void org.gluu.oxtrust.action.Authenticator.postLogin ( User  user)
inlineprivate

Set session variables after user login

例外
Exception
158  {
159  identity.login();
160  log.debug("Configuring application after user '{}' login", user.getUid());
161  GluuCustomPerson person = findPersonByDn(user.getDn());
162  identity.setUser(person);
163 
164  // Set user roles
165  UserRole[] userRoles = securityService.getUserRoles(user);
166  if (ArrayHelper.isNotEmpty(userRoles)) {
167  log.debug("Get '{}' user roles", Arrays.toString(userRoles));
168  } else {
169  log.debug("Get 0 user roles");
170  }
171  for (UserRole userRole : userRoles) {
172  identity.addRole(userRole.getRoleName());
173  }
174  }
Identity identity
Definition: Authenticator.java:83
GluuCustomPerson findPersonByDn(String userDn)
Definition: Authenticator.java:187
SecurityService securityService
Definition: Authenticator.java:95
UserRole [] getUserRoles(User user)
Definition: SecurityService.java:54
Logger log
Definition: Authenticator.java:80
void setUser(GluuCustomPerson user)
Definition: Identity.java:43

◆ postLogout()

String org.gluu.oxtrust.action.Authenticator.postLogout ( )
inline
205  {
206  if (identity.isLoggedIn()) {
207  identity.logout();
208  }
209 
210  return OxTrustConstants.RESULT_SUCCESS;
211  }
Identity identity
Definition: Authenticator.java:83

◆ preAuthenticate()

boolean org.gluu.oxtrust.action.Authenticator.preAuthenticate ( ) throws IOException, Exception
inline
115  {
116  boolean result = true;
117  if (!identity.isLoggedIn()) {
118  result = oAuthLogin();
119  }
120 
121  return result;
122  }
Identity identity
Definition: Authenticator.java:83
boolean oAuthLogin()
Definition: Authenticator.java:316

◆ processLogout()

void org.gluu.oxtrust.action.Authenticator.processLogout ( ) throws Exception
inline
198  {
200  oAuthlLogout();
201 
202  postLogout();
203  }
void oAuthlLogout()
Definition: Authenticator.java:213
String logout()
Definition: SsoLoginAction.java:139
String postLogout()
Definition: Authenticator.java:205
SsoLoginAction ssoLoginAction
Definition: Authenticator.java:98

◆ requestAccessToken()

String org.gluu.oxtrust.action.Authenticator.requestAccessToken ( String  oxAuthHost,
String  authorizationCode,
String  sessionState,
String  scopes,
String  clientID,
String  clientPassword 
)
inlineprivate
440  {
441  OpenIdConfigurationResponse openIdConfiguration = openIdService.getOpenIdConfiguration();
442  // 1. Request access token using the authorization code.
443  TokenClient tokenClient1 = new TokenClient(openIdConfiguration.getTokenEndpoint());
444 
445  log.info("Sending request to token endpoint");
446  String redirectURL = appConfiguration.getLoginRedirectUrl();
447  log.info("redirectURI : " + redirectURL);
448  TokenResponse tokenResponse = tokenClient1.execAuthorizationCode(authorizationCode, redirectURL, clientID,
449  clientPassword);
450 
451  log.debug(" tokenResponse : " + tokenResponse);
452  if (tokenResponse == null) {
453  log.error("Get empty token response. User rcan't log into application");
454  return OxTrustConstants.RESULT_NO_PERMISSIONS;
455  }
456 
457  log.debug(" tokenResponse.getErrorType() : " + tokenResponse.getErrorType());
458 
459  String accessToken = tokenResponse.getAccessToken();
460  log.debug(" accessToken : " + accessToken);
461 
462  String idToken = tokenResponse.getIdToken();
463  log.debug(" idToken : " + idToken);
464 
465  log.info("Session validation successful. User is logged in");
466  UserInfoClient userInfoClient = new UserInfoClient(openIdConfiguration.getUserInfoEndpoint());
467  UserInfoResponse userInfoResponse = userInfoClient.execUserInfo(accessToken);
468  if (userInfoResponse == null) {
469  log.error("Get empty token response. User can't log into application");
470  return OxTrustConstants.RESULT_NO_PERMISSIONS;
471  }
472 
473  OauthData oauthData = identity.getOauthData();
474 
475  oauthData.setHost(oxAuthHost);
476 
477  // Parse JWT
478  Jwt jwt;
479  try {
480  jwt = Jwt.parse(idToken);
481  } catch (InvalidJwtException ex) {
482  log.error("Failed to parse id_token");
483  return OxTrustConstants.RESULT_NO_PERMISSIONS;
484  }
485 
486  // Check nonce
487  String nonceResponse = (String) jwt.getClaims().getClaim(JwtClaimName.NONCE);
488  String nonceSession = (String) identity.getSessionMap().get(OxTrustConstants.OXAUTH_NONCE);
489  if (!StringHelper.equals(nonceSession, nonceResponse)) {
490  log.error("User info response : nonce is not matching.");
491  return OxTrustConstants.RESULT_NO_PERMISSIONS;
492  }
493 
494  // Determine uid
495  List<String> uidValues = userInfoResponse.getClaims().get(JwtClaimName.USER_NAME);
496  if ((uidValues == null) || (uidValues.size() == 0)) {
497  log.error("User info response doesn't contains uid claim");
498  return OxTrustConstants.RESULT_NO_PERMISSIONS;
499  }
500 
501  // Check requested authentication method
502  if (identity.getSessionMap().containsKey(OxTrustConstants.OXAUTH_ACR_VALUES)) {
503  String requestAcrValues = (String) identity.getSessionMap().get(OxTrustConstants.OXAUTH_ACR_VALUES);
504 
505  String issuer = openIdConfiguration.getIssuer();
506  String responseIssuer = (String) jwt.getClaims().getClaim(JwtClaimName.ISSUER);
507  if (issuer == null || responseIssuer == null || !issuer.equals(responseIssuer)) {
508  log.error("User info response : Issuer.");
509  return OxTrustConstants.RESULT_NO_PERMISSIONS;
510  }
511 
512  List<String> acrValues = jwt.getClaims()
513  .getClaimAsStringList(JwtClaimName.AUTHENTICATION_CONTEXT_CLASS_REFERENCE);
514  if ((acrValues == null) || (acrValues.size() == 0) || !acrValues.contains(requestAcrValues)) {
515  log.error("User info response doesn't contains acr claim");
516  return OxTrustConstants.RESULT_NO_PERMISSIONS;
517  }
518  if (!acrValues.contains(requestAcrValues)) {
519  log.error("User info response contains acr='{}' claim but expected acr='{}'", acrValues,
520  requestAcrValues);
521  return OxTrustConstants.RESULT_NO_PERMISSIONS;
522  }
523  }
524 
525  oauthData.setUserUid(uidValues.get(0));
526  oauthData.setAccessToken(accessToken);
527  oauthData.setAccessTokenExpirationInSeconds(tokenResponse.getExpiresIn());
528  oauthData.setScopes(scopes);
529  oauthData.setIdToken(idToken);
530  oauthData.setSessionState(sessionState);
531 
532  log.info("user uid:" + oauthData.getUserUid());
533 
534  return OxTrustConstants.RESULT_SUCCESS;
535 
536  }
OpenIdService openIdService
Definition: Authenticator.java:104
OpenIdConfigurationResponse getOpenIdConfiguration()
Definition: OpenIdService.java:66
OauthData getOauthData()
Definition: Identity.java:31
AppConfiguration appConfiguration
Definition: Authenticator.java:110
Map< String, Object > getSessionMap()
Definition: Identity.java:47
Identity identity
Definition: Authenticator.java:83
void setHost(String host)
Definition: OauthData.java:34
Logger log
Definition: Authenticator.java:80

◆ Shibboleth3Authenticate()

boolean org.gluu.oxtrust.action.Authenticator.Shibboleth3Authenticate ( )
inline

Authenticate using credentials passed from web request header

238  {
239  log.debug("Checking if user authenticated with shibboleth already");
240  boolean result = false;
241  HttpServletRequest request = (HttpServletRequest) FacesContext.getCurrentInstance().getExternalContext()
242  .getRequest();
243 
244  String authType = request.getAuthType();
245  String userUid = request.getHeader("REMOTE_USER");
246  String userUidlower = request.getHeader("remote_user");
247  Enumeration<?> headerNames = request.getHeaderNames();
248  while (headerNames.hasMoreElements()) {
249  String headerName = (String) headerNames.nextElement();
250  log.trace(headerName + "-->" + request.getHeader(headerName));
251  }
252  log.debug("Username is " + userUid);
253  log.debug("UsernameLower is " + userUidlower);
254  log.debug("AuthType is " + authType);
255 
256  Map<String, String[]> headers = FacesContext.getCurrentInstance().getExternalContext()
257  .getRequestHeaderValuesMap();
258  for (String name : headers.keySet()) {
259  log.trace(name + "==>" + StringUtils.join(headers.get(name)));
260  }
261 
262  if (StringHelper.isEmpty(userUid) || StringHelper.isEmpty(authType) || !authType.equals("shibboleth")) {
263  result = false;
264  return result;
265  }
266 
267  Pattern pattern = Pattern.compile(".+@.+\\.[a-z]+");
268  Matcher matcher = pattern.matcher(userUid);
269 
270  User user = null;
271  if (matcher.matches()) {
272  // Find user by uid
273  user = personService.getPersonByEmail(userUid);
274  } else {
275  // Find user by uid
276  user = personService.getUserByUid(userUid);
277  }
278 
279  if (user == null) {
280  result = false;
281  return result;
282  }
283  log.debug("Person Inum is " + user.getInum());
284 
285  if (GluuStatus.ACTIVE.getValue().equals(user.getAttribute("gluuStatus"))) {
286 
287  credentials.setUsername(user.getUid());
288  // credentials.setPassword("");
289  Principal principal = new SimplePrincipal(user.getUid());
290  log.debug("Principal is " + principal.toString());
291 
292  identity.acceptExternallyAuthenticatedPrincipal(principal);
293 
294  log.info("User '{}' authenticated with shibboleth already", userUid);
295  identity.quietLogin();
296  postLogin(user);
297 
298  identity.getSessionMap().put(OxTrustConstants.APPLICATION_AUTHORIZATION_TYPE,
299  OxTrustConstants.APPLICATION_AUTHORIZATION_NAME_SHIBBOLETH3);
300 
301  result = true;
302  } else {
303  result = false;
304  }
305 
306  return result;
307  }
IPersonService personService
Definition: Authenticator.java:92
abstract User getUserByUid(String uid)
Map< String, Object > getSessionMap()
Definition: Identity.java:47
Identity identity
Definition: Authenticator.java:83
Credentials credentials
Definition: Authenticator.java:86
abstract GluuCustomPerson getPersonByEmail(String email)
Logger log
Definition: Authenticator.java:80
void postLogin(User user)
Definition: Authenticator.java:158

メンバ詳解

◆ appConfiguration

AppConfiguration org.gluu.oxtrust.action.Authenticator.appConfiguration
private

◆ applianceService

ApplianceService org.gluu.oxtrust.action.Authenticator.applianceService
private

◆ credentials

Credentials org.gluu.oxtrust.action.Authenticator.credentials
private

◆ encryptionService

EncryptionService org.gluu.oxtrust.action.Authenticator.encryptionService
private

◆ facesMessages

FacesMessages org.gluu.oxtrust.action.Authenticator.facesMessages
private

◆ facesService

FacesService org.gluu.oxtrust.action.Authenticator.facesService
private

◆ identity

Identity org.gluu.oxtrust.action.Authenticator.identity
private

◆ log

Logger org.gluu.oxtrust.action.Authenticator.log
private

◆ LOGIN_FAILED_OX_TRUST

final String org.gluu.oxtrust.action.Authenticator.LOGIN_FAILED_OX_TRUST = "Login failed, oxTrust wasn't allowed to access user data"
staticprivate

◆ openIdService

OpenIdService org.gluu.oxtrust.action.Authenticator.openIdService
private

◆ personService

IPersonService org.gluu.oxtrust.action.Authenticator.personService
private

◆ securityService

SecurityService org.gluu.oxtrust.action.Authenticator.securityService
private

◆ serialVersionUID

final long org.gluu.oxtrust.action.Authenticator.serialVersionUID = -3975272457541385597L
staticprivate

◆ ssoLoginAction

SsoLoginAction org.gluu.oxtrust.action.Authenticator.ssoLoginAction
private

このクラス詳解は次のファイルから抽出されました: