public Credential handleSAMLToken( SamlAssertionWrapper samlAssertion, RequestData data, Validator validator ) throws WSSecurityException { // Parse the subject if it exists samlAssertion.parseSubject( new WSSSAMLKeyInfoProcessor(data), data.getSigVerCrypto(), data.getCallbackHandler() ); // Now delegate the rest of the verification to the Validator Credential credential = new Credential(); credential.setSamlAssertion(samlAssertion); if (validator != null) { return validator.validate(credential, data); } return credential; }
public List<WSSecurityEngineResult> handleToken( Element elem, RequestData data ) throws WSSecurityException { LOG.debug("Found Timestamp list element"); // // Decode Timestamp, add the found time (created/expiry) to result // Timestamp timestamp = new Timestamp(elem, data.getBSPEnforcer()); Credential credential = new Credential(); credential.setTimestamp(timestamp); WSSecurityEngineResult result = new WSSecurityEngineResult(WSConstants.TS, timestamp); String tokenId = timestamp.getID(); if (!"".equals(tokenId)) { result.put(WSSecurityEngineResult.TAG_ID, tokenId); } Validator validator = data.getValidator(WSConstants.TIMESTAMP); if (validator != null) { validator.validate(credential, data); result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE); } data.getWsDocInfo().addTokenElement(elem); data.getWsDocInfo().addResult(result); return java.util.Collections.singletonList(result); }
protected void validate(Message message) throws WSSecurityException { AuthorizationPolicy policy = message.get(AuthorizationPolicy.class); if (policy == null || policy.getUserName() == null || policy.getPassword() == null) { String name = null; if (policy != null) { name = policy.getUserName(); } String errorMsg = "No user name and/or password is available, name: " + name; LOG.warning(errorMsg); throw new SecurityException(errorMsg); } UsernameToken token = convertPolicyToToken(policy); Credential credential = new Credential(); credential.setUsernametoken(token); RequestData data = new RequestData(); data.setMsgContext(message); data.setCallbackHandler(callbackHandler); credential = getValidator().validate(credential, data); // Create a Principal/SecurityContext SecurityContext sc = null; if (credential != null && credential.getPrincipal() != null) { sc = createSecurityContext(message, credential); } else { Principal p = new WSUsernameTokenPrincipalImpl(policy.getUserName(), false); ((WSUsernameTokenPrincipalImpl)p).setPassword(policy.getPassword()); sc = createSecurityContext(p); } message.put(SecurityContext.class, sc); }
credential.setSecurityContextToken(sct); Credential returnedCredential = validator.validate(credential, data); result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE); String tokenId = sct.getID();
signatureValidator.validate(trustCredential, requestData); } catch (WSSecurityException e) { LOG.debug("Error in validating signature on SAML AuthnRequest: {}", e.getMessage(), e);
credential.setCertificates(certs); Credential returnedCredential = validator.validate(credential, data); result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE); result.put(WSSecurityEngineResult.TAG_SECRET, returnedCredential.getSecretKey());
Credential credential = new Credential(); credential.setUsernametoken(ut); credential = validator.validate(credential, requestData); principal = credential.getPrincipal(); if (credential.getSubject() != null && roleParser != null) {
signatureValidator.validate(trustCredential, requestData); } catch (WSSecurityException e) { LOG.log(Level.FINE, "Error in validating signature on SAML Response: " + e.getMessage(), e);
trustCredential.setCertificates(samlKeyInfo.getCerts()); trustCredential = validator.validate(trustCredential, requestData); principal = trustCredential.getPrincipal();
Credential credential = new Credential(); credential.setUsernametoken(ut); credential = validator.validate(credential, requestData); principal = credential.getPrincipal(); if (credential.getSubject() != null && roleParser != null) {
Credential returnedCredential = validator.validate(credential, requestData); Principal principal = returnedCredential.getPrincipal(); if (principal == null) {
Credential returnedCredential = validator.validate(credential, requestData); Principal principal = returnedCredential.getPrincipal(); if (principal == null) {
trustCredential.setCertificates(samlKeyInfo.getCerts()); trustCredential = validator.validate(trustCredential, requestData); principal = trustCredential.getPrincipal();
Credential credential = new Credential(); credential.setSamlAssertion(assertion); samlValidator.validate(credential, data);
Credential credential = new Credential(); credential.setSamlAssertion(assertion); samlValidator.validate(credential, data);
Credential credential = new Credential(); credential.setSamlAssertion(assertion); samlValidator.validate(credential, data);
Credential credential = new Credential(); credential.setSamlAssertion(assertion); samlValidator.validate(credential, data);
credential.setUsernametoken(ut); if (validator != null) { return validator.validate(credential, data);
signatureValidator.validate(trustCredential, requestData); } catch (WSSecurityException e) { throw new SignatureException("Error validating signature", e);