/** * Return the principal that has been authenticated for this Request. */ protected Principal doGetUserPrincipal() { if (USE_PRINCIPAL_FROM_SESSION && userPrincipal == null) { Session session = doGetSession(false); Principal principal = session.getPrincipal(); if (principal != null) return principal; } return userPrincipal; }
/** * Return the principal that has been authenticated for this Request. */ protected Principal doGetUserPrincipal() { if (USE_PRINCIPAL_FROM_SESSION && userPrincipal == null) { Session session = doGetSession(false); Principal principal = session.getPrincipal(); if (principal != null) { return principal; } } return userPrincipal; }
Principal principal = request.getUserPrincipal(); if (principal == null) { Session session = request.getSessionInternal(false); if (session != null) { principal = session.getPrincipal(); if (principal != null) { if (log.isDebugEnabled()) log.debug("We have cached auth type " + session.getAuthType() + " for principal " + session.getPrincipal()); request.setAuthType(session.getAuthType()); request.setUserPrincipal(principal); } } }
426 if (cache) { 427 Principal principal = request.getUserPrincipal(); 428 if (principal == null) { 429 Session session = request.getSessionInternal(false); 430 if (session != null) { 431 principal = session.getPrincipal(); 432 if (principal != null) { 433 if (log.isDebugEnabled()) { 434 log.debug("We have cached auth type " + 435 session.getAuthType() + 436 " for principal " + 437 session.getPrincipal()); 438 } 439 request.setAuthType(session.getAuthType()); 440 request.setUserPrincipal(principal); 441 } 442 } 443 } 444 }
protected Principal getPrincipal(HttpServletRequest httpRequest) { Request request = getRequest(httpRequest); Session session = request.getSessionInternal(false); return (session != null ? session.getPrincipal() : null); }
protected Principal getPrincipal(HttpServletRequest httpRequest) { Request request = getRequest(httpRequest); Session session = request.getSessionInternal(false); return (session != null ? session.getPrincipal() : null); }
protected Principal getPrincipal(HttpServletRequest httpRequest) { CoyoteRequest request = getRequest(httpRequest); Session session = request.getSessionInternal(false); return (session != null ? session.getPrincipal() : null); }
protected GenericPrincipal checkLoggedIn(Request request, HttpServletResponse response) { if (request.getPrincipal() != null) { return (GenericPrincipal) request.getPrincipal(); } else if (request.getSessionInternal() != null && request.getSessionInternal().getPrincipal() != null) { return (GenericPrincipal) request.getSessionInternal().getPrincipal(); } return null; }
public void sessionEvent(SessionEvent event) { // We only care about session destroyed events if (!Session.SESSION_DESTROYED_EVENT.equals(event.getType()) && (!Session.SESSION_PASSIVATED_EVENT.equals(event.getType()))) return; // Look up the single session id associated with this session (if any) Session session = event.getSession(); GenericPrincipal principal = (GenericPrincipal) session.getPrincipal(); if (principal == null) return; session.setPrincipal(null); session.setAuthType(null); String username = principal.getUserPrincipal().getName(); Map<String, Session> map = userSessionMap.get(username); if (map == null) return; synchronized (map) { map.remove(session.getId()); if (map.isEmpty()) userSessionMap.remove(username); } } }
public void sessionEvent(SessionEvent event) { // We only care about session destroyed events if (!Session.SESSION_DESTROYED_EVENT.equals(event.getType())) return; // Look up the single session id associated with this session (if any) Session session = event.getSession(); log.debugf("Session %s destroyed", session.getId()); GenericPrincipal principal = (GenericPrincipal) session.getPrincipal(); if (principal == null) return; session.setPrincipal(null); session.setAuthType(null); } }
public void sessionEvent(SessionEvent event) { // We only care about session destroyed events if (!Session.SESSION_DESTROYED_EVENT.equals(event.getType())) return; // Look up the single session id associated with this session (if any) Session session = event.getSession(); log.debugf("Session %s destroyed", session.getId()); GenericPrincipal principal = (GenericPrincipal) session.getPrincipal(); if (principal == null) return; session.setPrincipal(null); session.setAuthType(null); } }
protected boolean checkLoggedIn(Request request, HttpServletResponse response) { if (request.getSessionInternal() == null || request.getSessionInternal().getPrincipal() == null) return false; LogMessages.LOGGER.debug(Messages.MESSAGES.remoteLoggedInAlready()); GenericPrincipal principal = (GenericPrincipal) request.getSessionInternal().getPrincipal(); request.setUserPrincipal(principal); request.setAuthType("OAUTH"); Session session = request.getSessionInternal(); if (session != null && !remoteSkeletonKeyConfig.isCancelPropagation()) { SkeletonKeySession skSession = (SkeletonKeySession) session.getNote(SkeletonKeySession.class.getName()); if (skSession != null) { request.setAttribute(SkeletonKeySession.class.getName(), skSession); ResteasyProviderFactory.pushContext(SkeletonKeySession.class, skSession); } } return true; }
protected void logoutCurrentUser(Request request, HttpServletResponse response) throws IOException { if (request.getSessionInternal() == null || request.getSessionInternal().getPrincipal() == null) { redirectToWelcomePage(request, response); return; } GenericPrincipal principal = (GenericPrincipal) request.getSessionInternal().getPrincipal(); String username = principal.getName(); String admin = username; userSessionManagement.logout(username); request.setUserPrincipal(null); request.setAuthType(null); // logout user on all declared authenticated resources logoutResources(username, admin); redirectToWelcomePage(request, response); }
public void logout() throws SecurityServiceException { ServletGraniteContext graniteContext = (ServletGraniteContext)GraniteContext.getCurrentInstance(); if (graniteContext instanceof HttpGraniteContext) { Session session = getSession(graniteContext.getRequest(), false); if (session != null && session.getPrincipal() != null) { session.setAuthType(null); session.setPrincipal(null); session.removeNote(Constants.SESS_USERNAME_NOTE); session.removeNote(Constants.SESS_PASSWORD_NOTE); endLogout(); session.expire(); } } else { HttpSession session = graniteContext.getSession(); if (session != null) { session.removeAttribute(AuthenticationContext.class.getName()); endLogout(); session.invalidate(); } } }
private void handleMatch(Request request, Principal principal) { TomcatLoginHolder.setLogin(new TomcatLoginImpl(this, request)); // Copy over user principal and auth type values, just like in AuthenticatorBase.invoke() if (principal != null) return; Session session = getSession(request, false); if (session == null) return; principal = session.getPrincipal(); if (principal != null) { request.setAuthType(session.getAuthType()); request.setUserPrincipal(principal); } }
@Override public boolean isCached(RequestAuthenticator authenticator) { Session session = request.getSessionInternal(false); if (session == null) return false; SerializableKeycloakAccount account = (SerializableKeycloakAccount) session.getSession().getAttribute(SerializableKeycloakAccount.class.getName()); if (account == null) { return false; } log.fine("remote logged in already. Establish state from session"); RefreshableKeycloakSecurityContext securityContext = account.getKeycloakSecurityContext(); if (!deployment.getRealm().equals(securityContext.getRealm())) { log.fine("Account from cookie is from a different realm than for the request."); cleanSession(session); return false; } securityContext.setCurrentRequestInfo(deployment, this); request.setAttribute(KeycloakSecurityContext.class.getName(), securityContext); GenericPrincipal principal = (GenericPrincipal) session.getPrincipal(); // in clustered environment in JBossWeb, principal is not serialized or saved if (principal == null) { principal = principalFactory.createPrincipal(request.getContext().getRealm(), account.getPrincipal(), account.getRoles()); session.setPrincipal(principal); session.setAuthType("KEYCLOAK"); } request.setUserPrincipal(principal); request.setAuthType("KEYCLOAK"); restoreRequest(); return true; }
private void handleMatch(Request request, Principal principal) { TomcatLoginHolder.setLogin(new TomcatLoginImpl(getContainer(), request)); // Copy over user principal and auth type values, just like in AuthenticatorBase.invoke() if (principal != null) return; Session session = getSession(request, false); if (session == null) return; principal = session.getPrincipal(); if (principal != null) { request.setAuthType(session.getAuthType()); request.setUserPrincipal(principal); } }
public void logout() throws SecurityServiceException { HttpGraniteContext context = (HttpGraniteContext)GraniteContext.getCurrentInstance(); Session session = getSession(context.getRequest(), false); if (session != null && session.getPrincipal() != null) { session.setAuthType(null); session.setPrincipal(null); session.removeNote(Constants.SESS_USERNAME_NOTE); session.removeNote(Constants.SESS_PASSWORD_NOTE); endLogout(); session.expire(); } }
public void logout() throws SecurityServiceException { HttpGraniteContext context = (HttpGraniteContext)GraniteContext.getCurrentInstance(); Session session = getSession(context.getRequest(), false); if (session != null && session.getPrincipal() != null) { session.setAuthType(null); session.setPrincipal(null); session.removeNote(Constants.SESS_USERNAME_NOTE); session.removeNote(Constants.SESS_PASSWORD_NOTE); endLogout(); session.expire(); } }
@Override public void saveAccount(SamlSession account) { Session session = request.getSessionInternal(true); session.getSession().setAttribute(SamlSession.class.getName(), account); GenericPrincipal principal = (GenericPrincipal) session.getPrincipal(); // in clustered environment in JBossWeb, principal is not serialized or saved if (principal == null) { principal = principalFactory.createPrincipal(request.getContext().getRealm(), account.getPrincipal(), account.getRoles()); session.setPrincipal(principal); session.setAuthType("KEYCLOAK-SAML"); } request.setUserPrincipal(principal); request.setAuthType("KEYCLOAK-SAML"); String newId = changeSessionId(session); idMapperUpdater.map(idMapper, account.getSessionIndex(), account.getPrincipal().getSamlSubject(), newId); }