public Principal run() { try { KerberosServiceExceptionAction action = new KerberosServiceExceptionAction(this.ticket, this.serviceName, this.isUsernameServiceNameForm, false); KerberosServiceContext krbServiceCtx = action.run(); return krbServiceCtx.getPrincipal(); } catch (Exception e) { if (LOG.isDebugEnabled()) { LOG.debug("Error in validating a Kerberos token", e); } } return null; }
byte[] returnedToken = secContext.acceptSecContext(ticket, 0, ticket.length); krbServiceCtx = new KerberosServiceContext(); krbServiceCtx.setDelegationCredential(secContext.getDelegCred()); krbServiceCtx.setPrincipal(new KerberosPrincipal(clientName.toString())); krbServiceCtx.setGssContext(secContext); krbServiceCtx.setKerberosToken(returnedToken); Key key = (Key) inquireSecContext.invoke(secContext, Enum.valueOf(inquireType, EXTENDED_JGSS_CONTEXT_INQUIRE_TYPE_KRB5_GET_SESSION_KEY)); krbServiceCtx.setSessionKey(key);
krbCtx = (KerberosServiceContext) Subject.doAs(subject, action); token = krbCtx.getKerberosToken(); if (token == null) { throw new WSSecurityException( secContext = krbCtx.getGssContext(); delegationCredential = krbCtx.getDelegationCredential(); spnegoPrincipal = krbCtx.getPrincipal(); } catch (PrivilegedActionException e) { Throwable cause = e.getCause();
credential.setPrincipal(krbServiceCtx.getPrincipal()); if (credential.getPrincipal() == null) { throw new WSSecurityException( ); credential.setDelegationCredential(krbServiceCtx.getDelegationCredential()); Key sessionKey = krbServiceCtx.getSessionKey(); if (null != sessionKey) { log.debug("Found session key in the KerberosServiceContext.");
byte[] returnedToken = secContext.acceptSecContext(ticket, 0, ticket.length); krbServiceCtx = new KerberosServiceContext(); krbServiceCtx.setDelegationCredential(secContext.getDelegCred()); krbServiceCtx.setPrincipal(new KerberosPrincipal(clientName.toString())); krbServiceCtx.setGssContext(secContext); krbServiceCtx.setKerberosToken(returnedToken); Key key = (Key) inquireSecContext.invoke(secContext, Enum.valueOf(inquireType, EXTENDED_JGSS_CONTEXT_INQUIRE_TYPE_KRB5_GET_SESSION_KEY)); krbServiceCtx.setSessionKey(key);
krbCtx = (KerberosServiceContext) Subject.doAs(subject, action); token = krbCtx.getKerberosToken(); if (token == null) { throw new WSSecurityException( secContext = krbCtx.getGssContext(); delegationCredential = krbCtx.getDelegationCredential(); spnegoPrincipal = krbCtx.getPrincipal(); } catch (PrivilegedActionException e) { Throwable cause = e.getCause();
credential.setPrincipal(krbServiceCtx.getPrincipal()); if (credential.getPrincipal() == null) { throw new WSSecurityException( ); credential.setDelegationCredential(krbServiceCtx.getDelegationCredential()); Key sessionKey = krbServiceCtx.getSessionKey(); if (null != sessionKey) { log.debug("Found session key in the KerberosServiceContext.");
public Principal run() { try { KerberosServiceExceptionAction action = new KerberosServiceExceptionAction(this.ticket, this.serviceName, this.isUsernameServiceNameForm, false); KerberosServiceContext krbServiceCtx = action.run(); return krbServiceCtx.getPrincipal(); } catch (Exception e) { if (LOG.isDebugEnabled()) { LOG.debug("Error in validating a Kerberos token", e); } } return null; }