`

JAAS

阅读更多

http://publib.boulder.ibm.com/infocenter/iseries/v6r1m0/index.jsp?topic=/rzaha/api.htm

 

Java Authentication and Authorization Service (JAAS) 1.0

The Java™ Authentication and Authorization Service (JAAS) is a standard extension to the Java 2 Software Development Kit, version 1.3. Currently, Java 2 provides codesource-based access controls (access controls based on where the code originated from and who signed the code). It lacks, however, the ability to additionally enforce access controls based on who runs the code. JAAS provides a framework that augments the Java 2 security model with such support.

<!-- -->

Overview

The Java Authentication and Authorization Service (JAAS) is a standard extension to the Java 2 Software Development Kit, version 1.3. Currently, Java 2 provides codesource-based access controls (access controls based on where the code originated from and who signed the code). It lacks, however, the ability to additionally enforce access controls based on who runs the code. JAAS provides a framework that augments the Java 2 security model with such support.

This document was last updated March 17, 2000.

<!-- -->

Who Should Read This Document

This document is intended for experienced programmers wanting to create applications constrained by a codesource-based and Subject-based security model.

<!-- -->

Related Documentation

This document assumes you have already read the following documentation:

A supplement to this guide is the LoginModule Developer's Guide that is supplied by Sun Microsystems, Inc.

<!-- -->

Introduction

The JAAS infrastructure can be divided into two main components: an authentication component and an authorization component. The JAAS authentication component provides the ability to reliably and securely determine who is currently processing Java code, regardless of whether the code is running as an application, an applet, a bean, or a servlet. The JAAS authorization component supplements the existing Java 2 security framework by providing the means to restrict the processing Java code from performing sensitive tasks, depending on its codesource (as is done in Java 2) and depending on who was authenticated.

JAAS authentication is performed in a pluggable fashion. This permits Java applications to remain independent from underlying authentication technologies. Therefore new or updated authentication technologies can be plugged under an application without requiring modifications to the application itself. Applications enable the authentication process by instantiating a

LoginContext
object, which in turn references a
Configuration
to determine the authentication technology, or
LoginModule
, to be used in performing the authentication. Typical LoginModules may prompt for and verify a username and password. Others may read and verify a voice or fingerprint sample.

Once the user processing the code has been authenticated, the JAAS authorization component works in conjunction with the existing Java 2 access control model to protect access to sensitive resources. Unlike in Java 2, where access control decisions are based solely on code location and code signers (a

CodeSource
), in JAAS access control decisions are based both on the processing code's
CodeSource
, as well as on the user running the code, or the
Subject
. Note that the JAAS policy merely extends the Java 2 policy with the relevant Subject-based information. Therefore permissions recognized and understood in Java 2 (
java.io.FilePermission
and
java.net.SocketPermission
, for example) are also understood and recognized by JAAS. Furthermore, although the JAAS security policy is physically separate from the existing Java 2 security policy, the two policies, together, form one logical policy.
<!-- -->

Core Classes

The JAAS core classes can be broken into 3 categories: Common, Authentication, and Authorization.
  • Common Classes
    • Subject, Principals, Credentials
  • Authentication Classes
    • LoginContext, LoginModule, CallbackHandler, Callback
  • Authorization Classes
    • Policy, AuthPermission, PrivateCredentialPermission
<!-- -->

Common Classes

Common classes are shared within both the JAAS authentication and authorization components.

The key JAAS class is

Subject
, which represents a grouping of related information for a single entity such as a person. It encompasses the entity's Principals, public credentials, and private credentials.

Note that JAAS uses the existing Java 2

java.security.Principal
interface to represent a Principal. Also note that JAAS does not introduce a separate credential interface or class. A credential, as defined by JAAS, may be any Object.
<!-- -->

Subject

To authorize access to resources, applications first need to authenticate the source of the request. The JAAS framework defines the term, Subject, to represent the source of a request. A Subject may be any entity, such as a person or service. Once authenticated, a Subject is populated with associated identities, or Principals. A Subject may have many Principals. For example, a person may have a name Principal ("John Doe") and a SSN Principal ("123-45-6789") which distinguishes it from other Subjects.

A

Subject
may also own security-related attributes, which are referred to as credentials. Sensitive credentials that require special protection, such as private cryptographic keys, are stored within a private credential
Set
. Credentials intended to be shared, such as public key certificates or Kerberos tickets are stored within a public credential
Set
. Different permissions are required to access and modify the different credential Sets.

Subjects are created using these constructors:

    public Subject();

    public Subject(boolean readOnly, Set principals,
                   Set pubCredentials, Set privCredentials);
The first constructor creates a Subject with empty (non-null) Sets of Principals and credentials. The second constructor creates a Subject with the specified Sets of Principals and credentials. It also has a boolean argument which can create a read-only Subject (immutable Principal and credential Sets).

An alternative way to obtain a reference to an authenticated Subject without using these constructors will be shown in the LoginContext section.

If a Subject was not instantiated to be in a read-only state, it can be set to a read-only state by calling this method:

    public void setReadOnly();
An
AuthPermission("setReadOnly")
is required to invoke this method. Once in a read-only state, any attempt to add or remove Principals or credentials will result in an
IllegalStateException
being thrown.

This method may be called to test a Subject's read-only state:

    public boolean isReadOnly();
To retrieve the Principals associated with a Subject, two methods are available:
    public Set getPrincipals();
    public Set getPrincipals(Class c);
The first method returns all Principals contained in the Subject, while the second method only returns those Principals that are an instance of the specified Class c, or an instance of a subclass of Class c. An empty set will be returned if the Subject does not have any associated Principals.

To retrieve the public credentials associated with a Subject, these methods are available:

    public Set getPublicCredentials();
    public Set getPublicCredentials(Class c);
The observed behavior of these methods is identical to that for the
getPrincipals
method.

To access private credentials associated with a Subject, the following methods are available:

    public Set getPrivateCredentials();
    public Set getPrivateCredentials(Class c);
The observed behavior of these methods is identical to that for the
getPrincipals
and
getPublicCredentials
methods.

To modify or operate upon a Subject's Principal Set, public credential Set, or private credential Set, callers use the methods defined in the

java.util.Set
class. The following example demonstrates this:
    Subject subject;
    Principal principal;
    Object credential;

    // add a Principal and credential to the Subject
    subject.getPrincipals().add(principal);
    subject.getPublicCredentials().add(credential);
Note that an
AuthPermission("modifyPrincipals")
,
AuthPermission("modifyPublicCredentials")
, or
AuthPermission("modifyPrivateCredentials")
is required to modify the respective Sets. Also note that only the sets returned via the
getPrincipals
,
getPublicCredentials
, and
getPrivateCredentials
methods are backed by the Subject's respective internal sets. Therefore any modification to the returned set affects the internal sets as well. The sets returned via the
getPrincipals(Class c)
,
getPublicCredentials(Class c)
, and
getPrivateCredentials(Class c)
methods are not backed by the Subject's respective internal sets. A new set is created and returned for each method invocation. Modifications to these sets will not affect the Subject's internal sets. The following method returns the Subject associated with the specified
AccessControlContext
, or null if no Subject is associated with the specified
AccessControlContext
.
    public static Subject getSubject(final AccessControlContext acc);
An
AuthPermission("getSubject")
is required to call
Subject.getSubject
.

The Subject class also includes these methods inherited from

java.lang.Object
:
    public boolean equals(Object o);
    public String toString();
    public int hashCode();

<!-- --> The following static methods may be called to perform work as a particular Subject:

    public static Object doAs(final Subject subject,
                         final java.security.PrivilegedAction action);

    public static Object doAs(final Subject subject,
                         final java.security.PrivilegedExceptionAction action)
                         throws java.security.PrivilegedActionException;
Both methods first associate the specified subject with the current Thread's
AccessControlContext
, and then process the action . This achieves the effect of having the action run as the subject . The first method can throw runtime exceptions but normal processing has it returning an Object from the run() method of its action argument. The second method behaves similarly except that it can throw a checked exception from its
PrivilegedExceptionAction
run() method. An
AuthPermission("doAs")
is required to call the
doAs
methods.

Here are two examples utilizing the first

doAs
method. Assume that a
Subject
with a Principal of class
com.ibm.security.Principal
named "BOB" has been authenticated by a
LoginContext
"lc". Also, assume that a SecurityManager has been installed, and the following exists in the JAAS access control policy (see the Policy section for more details on the JAAS policy file):
   // Grant "BOB" permission to read the file "foo.txt"
   grant Principal com.ibm.security.Principal "BOB" {
      permission java.io.FilePermission "foo.txt", "read";
};

Subject.doAs Example 1

    class ExampleAction implements java.security.PrivilegedAction {
        public Object run() {
            java.io.File f = new java.io.File("foo.txt");

            // exists() invokes a security check
            if (f.exists()) {
                System.out.println("File foo.txt exists.");
            }
            return null;
        }
    }

    public class Example1 {
        public static void main(String[] args) {

            // Authenticate the subject, "BOB".
            // This process is described in the
            // LoginContext section
.

            Subject bob;
            ...

            // perform "ExampleAction" as "BOB":
            Subject.doAs(bob, new ExampleAction());
        }
    }
During processing,
ExampleAction
will encounter a security check when it makes a call to,
f.exists()
. However, since
ExampleAction
is running as "BOB", and because the JAAS policy (above) grants the necessary
FilePermission
to "BOB", the
ExampleAction
will pass the security check.

Example 2 has the same scenario as Example 1.

Subject.doAs Example 2

    public class Example2 {
        // Example of using an anonymous action class.
        public static void main(String[] args) {
            // Authenticate the subject, "BOB".
            // This process is described in the
            // LoginContext section
.

            Subject bob;
            ...

            // perform "ExampleAction" as "BOB":
            Subject.doAs(bob, new ExampleAction() {
                public Object run() {
                    java.io.File f = new java.io.File("foo.txt");
                    if (f.exists()) {
                        System.out.println("File foo.txt exists.");
                    }
                    return null;
                }
            });
        }
    }
Both examples throw a
SecurityException
if the example permission grant statement is altered incorrectly, such as adding an incorrect CodeBase or changing the Principal to "MOE". Removing the Principal field from the grant block and then moving it to a Java 2 policy file will not cause a
SecurityException
to be thrown because the permission is more general now (available to all Principals).

Since both examples perform the same function, there must be a reason to write code one way over the other. Example 1 may be easier to read for some programmers unfamiliar with anonymous classes. Also, the action class could be placed in a separate file with a unique CodeBase and then the permission grant could utilize this information. Example 2 is more compact and the action to be performed is easier to find since it is right there in the

doAs
call.

<!-- --> The following methods also perform work as a particular Subject. However, the

doAsPrivileged
methods will have security checks based on the supplied action and subject . The supplied context will be tied to the specified subject and action . A null context object will disregard the current
AccessControlContext
altogether.
    public static Object doAsPrivileged(final Subject subject,
                         final java.security.PrivilegedAction action,
                         final java.security.AccessControlContext acc);

    public static Object doAsPrivileged(final Subject subject,
                         final java.security.PrivilegedExceptionAction action,
                         final java.security.AccessControlContext acc)
                         throws java.security.PrivilegedActionException;
The
doAsPrivileged
methods behave similarly to the
doAs
methods: the subject is associated with the context acc , an action is performed, and runtime exceptions or checked exceptions may be thrown. However, the
doAsPrivileged
methods first empties the existing Thread's
AccessControlContext
before associating the subject with the supplied context, and before invoking the action . A null acc argument has the effect of causing access control decisions (invoked while the action processes) to be based solely upon the subject and action . An
AuthPermission("doAsPrivileged")
is required when calling the
doAsPrivileged
methods.
<!-- -->

Principals

As mentioned previously, Principals may be associated with a Subject. Principals represent Subject identities, and must implement the
java.security.Principal
and
java.io.Serializable
interfaces. The Subject section describes ways to update the Principals associated with a Subject.
<!-- -->

Credentials

Public and private credential classes are not part of the core JAAS class library. Any java class, therefore, can represent a credential. However, developers may elect to have their credential classes implement two interfaces related to credentials: Refreshable and Destroyable.
<!-- -->

Refreshable

This interface provides the capability for a credential to refresh itself. For example, a credential with a particular time-restricted lifespan may implement this interface to allow callers to refresh the time period for which it is valid. The interface has two abstract methods:
    boolean isCurrent();
Determines if the credential is current or valid.
    void refresh() throws RefreshFailedException;
Updates or extends the validity of the credential. This method implementation performs an
AuthPermission("refreshCredential")
security check to ensure the caller has permission to refresh the credential.
<!-- -->

Destroyable

This interface provides the capability of destroying the contents within a credential. The interface has two abstract methods:
    boolean isDestroyed();
Determines if the credential has been destroyed.
    void destroy() throws DestroyFailedException;
Destroys and clears the information associated with this credential. Subsequent calls to certain methods on this credential will result in an
IllegalStateException
being thrown. This method implementation performs an
AuthPermission("destroyCredential")
security check to ensure the caller has permission to destroy the credential.
<!-- -->

Authentication Classes

To authenticate a
Subject
, the following steps are performed:
  1. An application instantiates a
    LoginContext
    .
  2. The
    LoginContext
    consults a configuration to load all of the LoginModules configured for that application.
  3. The application invokes the LoginContext's login method.
  4. The login method invokes all of the loaded LoginModules. Each
    LoginModule
    attempts to authenticate the
    Subject
    . Upon success, LoginModules associate relevant Principals and credentials with the
    Subject
    .
  5. The
    LoginContext
    returns the authentication status to the application.
  6. If authentication succeeded, the application retrieves the authenticated
    Subject
    from the
    LoginContext
    .
<!-- -->

LoginContext

The
LoginContext
class provides the basic methods used to authenticate Subjects, and provides a way to develop an application independent of the underlying authentication technology. The
LoginContext
consults a configuration
Configuration
to determine the authentication services, or LoginModules, configured for a particular application. Therefore, different LoginModules can be plugged in under an application without requiring any modifications to the application itself.
LoginContext
offers four constructors to choose from:
    public LoginContext(String name) throws LoginException;

    public LoginContext(String name, Subject subject) throws LoginException;

    public LoginContext(String name, CallbackHandler callbackHandler)
           throws LoginException

    public LoginContext(String name, Subject subject,
           CallbackHandler callbackHandler) throws LoginException
All of the constructors share a common parameter: name . This argument is used by the
LoginContext
to index the login Configuration. Constructors that do not take a
Subject
as an input parameter instantiate a new
Subject
. Null inputs are disallowed for all constructors. Callers require an
AuthPermission("createLoginContext")
to instantiate a
LoginContext
.

Actual authentication occurs with a call to the following method:

    public void login() throws LoginException;
When login is invoked, all of the configured LoginModules' respective login methods are invoked to perform the authentication. If the authentication succeeded, the authenticated
Subject
(which may now hold Principals, public credentials, and private credentials) can be retrieved by using the following method:
    public Subject getSubject();
To logout a
Subject
and remove its authenticated Principals and credentials, the following method is provided:
    public void logout() throws LoginException;

The following snippet of code in an application will authenticate a Subject called "bob" after accessing a configuration file with a configuration entry named "moduleFoo":

    Subject bob = new Subject();
    LoginContext lc = new LoginContext("moduleFoo", bob);
    try {
        lc.login();
        System.out.println("authentication successful");
    } catch (LoginException le) {
        System.out.println("authentication unsuccessful"+le.printStackTrace());
    }
This snippet of code in an application will authenticate a "nameless" Subject and then use the getSubject method to retrieve it:
    LoginContext lc = new LoginContext("moduleFoo");
    try {
        lc.login();
        System.out.println("authentication successful");
    } catch (LoginException le) {
        System.out.println("authentication unsuccessful"+le.printStackTrace());
    }
    Subject subject = lc.getSubject();
If the authentication failed, then getSubject returns null. Also, there isn't an
AuthPermission("getSubject")
required to do this as is the case for
Subject.getSubject
<!-- -->

LoginModule

The LoginModule interface gives developers the ability to implement different kinds of authentication technologies that can be plugged under an application. For example, one type of

LoginModule
may perform a username/password-based form of authentication.

The LoginModule Developer's Guide is a detailed document that gives developers step-by-step instructions for implementing LoginModules.

To instantiate a

LoginModule
, a
LoginContext
expects each
LoginModule
to provide a public constructor that takes no arguments. Then, to initialize a
LoginModule
with the relevant information, a
LoginContext
calls the LoginModule's
initialize
method. The provided subject is guaranteed to be non-null.
   void initialize(Subject subject, CallbackHandler callbackHandler,
        Map sharedState, Map options);
This following method begins the authentication process:
     boolean login() throws LoginException;
An example method implementation may prompt the user for a username and password, and then verify the information against the data stored in a naming service such as NIS or LDAP. Alternative implementations might interface smart cards and biometric devices, or may simply extract user information from the underlying operating system. This is considered phase 1 of the JAAS authentication process.

The following method completes and finalizes the authentication process:

     boolean commit() throws LoginException;
If phase 1 of the authentication process was successful, then this method continues with phase 2 : associating Principals, public credentials, and private credentials with the Subject. If phase 1 failed, then the commit method removes any previously stored authentication state, such as usernames and passwords.

The following method halts the authentication process if phase 1 was unsuccessful:

    boolean abort() throws LoginException;
Typical implementations of this method clean up previously stored authentication state, such as usernames or passwords. The following method logs out a Subject:
    boolean logout() throws LoginException;
This method removes the Principals and credentials originally associated with the
Subject
during the
commit
operation. Credentials are destroyed upon removal.
<!-- -->

CallbackHandler

In some cases a LoginModule must communicate with the user to obtain authentication information. LoginModules use a CallbackHandler for this purpose. Applications implement the CallbackHandler interface and pass it to the LoginContext, which forwards it directly to the underlying LoginModules. LoginModules use the CallbackHandler both to gather input from users (such as a password or smart card pin number) or to supply information to users (such as status information). By allowing the application to specify the CallbackHandler, underlying LoginModules can remain independent of the different ways applications interact with users. For example, the implementation of a CallbackHandler for a GUI application might display a Window to solicit input from a user. The implementation of a CallbackHandler for a non-GUI tool might prompt the user for input directly from the command line.

CallbackHandler
is an interface with one method to implement:
     void handle(Callback[] callbacks)
     throws java.io.IOException, UnsupportedCallbackException;
<!-- -->

Callback

The javax.security.auth.callback package contains the Callback interface as well as several implementations. LoginModules may pass an array of Callbacks directly to the handle method of a CallbackHandler.

Consult the various Callback APIs for more information on their use.

<!-- -->

Authorization Classes

Upon successful authentication of a
Subject
, fine-grained access controls can be placed upon that
Subject
by invoking the Subject.doAs or Subject.doAsPrivileged methods. The permissions granted to that
Subject
are configured in a JAAS
Policy
.
<!-- -->

Policy

This is an abstract class for representing the system-wide JAAS access control. As a default, JAAS provides a file-based subclass implementation, PolicyFile. Each
Policy
subclass must implement the following methods:
    public abstract java.security.PermissionCollection getPermissions
                    (Subject subject,
                    java.security.CodeSource cs);
    public abstract void refresh();
The
getPermissions
method returns the permissions granted to the specified
Subject
and
CodeSource
. The
refresh
method updates the runtime
Policy
with any modifications made since the last time it was loaded from its permanent store (a file or database, for example). The
refresh
method requires an
AuthPermission("refreshPolicy")
.

The following method retrieves the current runtime

Policy
object, and is protected with a security check that requires the caller to have an
AuthPermission("getPolicy")
.
    public static Policy getPolicy();
The following example code demonstrates how a
Policy
object can be queried for the set of permissions granted to the specified
Subject
and
CodeSource
:
    policy = Policy.getPolicy();
    PermissionCollection perms = policy.getPermissions(subject, codeSource);
To set a new
Policy
object for the Java runtime, the
Policy.setPolicy
method may be used. This method requires the caller to have an
AuthPermission("setPolicy")
.
    public static void setPolicy(Policy policy);

Policy File Sample Entries:

These examples are relevant only for the default PolicyFile implementation.

Each entry in the

Policy
is represented as a grant entry. Each grant entry specifies a codebase/code-signers/Principals triplet, as well as the Permissions granted to that triplet. Specifically, the permissions will be granted to any code downloaded from the specified codebase and signed by the specified code signers , so long as the
Subject
running that code has all of the specified Principals in its
Principal
set. Refer to the Subject.doAs examples to see how a
Subject
becomes associated with running code.
    grant CodeBase ["URL"],
          Signedby ["signers"],
          Principal [Principal_Class] "Principal_Name",
          Principal ... {
        permission Permission_Class ["Target_Name"]
                                    [, "Permission_Actions"]
                                    [, signedBy "SignerName"];
    };

    // example grant entry
    grant CodeBase "http://griffin.ibm.com", Signedby "davis",
          Principal com.ibm.security.auth.NTUserPrincipal "kent" {
        permission java.io.FilePermission "c:/kent/files/*", "read, write";
    };
If no Principal information is specified in the JAAS
Policy
grant entry, a parsing exception will be thrown. However, grant entries that already exist in the regular Java 2 codesource-based policy file (and therefore have no Principal information) are still valid. In those cases, the Principal information is implied to be '*' (the grant entries applies to all Principals).

The CodeBase and Signedby components of the grant entry are optional in the JAAS

Policy
. If they are not present, then any codebase will match, and any signer (including unsigned code) will match.

In the example above, the grant entry specifies that code downloaded from "http://griffin.ibm.com", signed by "davis", and running as the NT user "kent", has one

Permission
. This
Permission
permits the processing code to read and write files in the directory "c:\kent\files".

Multiple Principals may be listed within one grant entry. The current

Subject
running the code must have all of the specified Principals in its
Principal
set to be granted the entry's Permissions.
    grant Principal com.ibm.security.auth.NTUserPrincipal "kent",
          Principal com.ibm.security.auth.NTSidGroupPrincipal "S-1-1-0" {
        permission java.io.FilePermission "c:/user/kent/", "read, write";
        permission java.net.SocketPermission "griffin.ibm.com", "connect";
    };
This entry grants any code running as both the NT user "kent" with the NT group identification number "S-1-1-0", permission to read and write files in "c:\user\kent", as well as permission to make socket connections to "griffin.ibm.com".
<!-- -->

AuthPermission

This class encapsulates the basic permissions required for JAAS. An AuthPermission contains a name (also referred to as a "target name") but no actions list; you either have the named permission or you don't. In addition to inherited methods (from the
Permission
class), an
AuthPermission
has two public constructors:
    public AuthPermission(String name);
    public AuthPermission(String name, String actions);
The first constructor creates a new AuthPermission with the specified name. The second constructor also creates a new AuthPermission object with the specified name, but has an additional actions argument which is currently unused and are null. This constructor exists solely for the
Policy
object to instantiate new Permission objects. For most code, the first constructor is appropriate.

The AuthPermission object is used to guard access to the Policy, Subject, LoginContext, and Configuration objects. Refer to the AuthPermission Javadoc for the list of valid names that are supported.

<!-- -->

PrivateCredentialPermission

This class protects access to a Subject's private credentials and provides one public constructor:
    public PrivateCredentialPermission(String name, String actions);
Refer to the PrivateCredentialPermission Javadoc for more detailed information on this class.
<!-- -->

Implementation

Note: Appendix A contains a sample java.security file that includes the static properties mentioned here.

Because there exists default values for JAAS providers and policy files, users need not statically (in the java.security file) nor dynamically (command line -D option) list their values in order to implement JAAS. Also, the default configuration and policy file providers may be replaced by a user-developed provider. Therefore this section is an attempt to explain the JAAS default providers and policy files as well as the properties that enable alternative providers.

Read the Default Policy File API and Default Configuration File API for more information than is summarized here.

Authentication Provider

The authentication provider, or configuration class, is statically set with

login.configuration.provider=[class]
in the java.security file. This provider creates the
Configuration
object.

For example:

  login.configuration.provider=com.foo.Config
If the Security property
login.configuration.provider
is not found in java.security, then JAAS will set it to the default value:
com.ibm.security.auth.login.ConfigFile
.

If a security manager is set before the

Configuration
is created, then an
AuthPermission("getLoginConfiguration")
will be required to be granted.

There isn't a way to dynamically set the configuration provider on the command line.

Authentication Configuration File

The authentication configuration files may be statically set in java.security with

login.config.url.n
=[URL]
, where n is a consecutively number integer starting with 1. The format is identical to the format for Java security policy files (policy.url.n=[URL]).

If the Security property

policy.allowSystemProperty
is set to "true" in java.security, then users can dynamically set policy files on the command line utilizing the -D option with this property:
java.security.auth.login.config
. The value may be a path or URL. For example (on NT):
  ... -Djava.security.auth.login.config=c:\config_policy\login.config ...
  or
  ... -Djava.security.auth.login.config=file:c:/config_policy/login.config ...
Note: using double equal signs (==) on the command line allows a user to override all other policy files found.

If no configuration files can be found statically or dynamically, JAAS will try to load the configuration file from this default location:

${user.home}
\.java.login.config
where ${user.home} is a system dependent location.

<!-- --> Authorization Provider

The authorization provider, or JAAS Policy class, is statically set with

auth.policy.provider=[class]
in the java.security file. This provider creates the JAAS Subject-based
Policy
object.

For example:

  auth.policy.provider=com.foo.Policy
If the Security property
auth.policy.provider
is not found in java.security, then JAAS will set it to the default value:
com.ibm.security.auth.PolicyFile
.

If a security manager is set before the

Configuration
is created, then an
AuthPermission("getPolicy")
will be required to be granted.

There isn't a way to dynamically set the authorization provider on the command line.

Authorization Policy File

The authorization policy files may be statically set in java.security with

auth.policy.url.n
=[URL]
, where n is a consecutively number integer starting with 1. The format is identical to the format for Java security policy files (policy.url.n=[URL]).

If the Security property

policy.allowSystemProperty
is set to "true" in java.security, then users can dynamically set policy files on the command line utilizing the -D option with this property:
java.security.auth.policy
. The value may be a path or URL. For example (on NT):
  ... -Djava.security.auth.policy=c:\auth_policy\java.auth.policy ...
  or
  ... -Djava.security.auth.policy=file:c:/auth_policy/java.auth.policy ...
Note: using double equal signs (==) on the command line allows a user to override all other policy files found.

There is not a default location to load an authorization policy from.

<!-- -->

"Hello World", JAAS style!

Put on your dark sunglasses and favorite fedora hat, then grab an alto sax ... it's time to get JAAS -y! Yes, another "Hello World!" program. In this section, a program will be made available to test your JAAS installation.

Installation It is assumed that JAAS has been installed. For example, the JAAS JAR files have been copied to your Development Kit's extensions directory.

Retrieve Files Download theHelloWorld.tar to your test directory. Expand it using "jar xvf HelloWorld.tar".

Verify the contents of your test directory.

source files :
  • HWLoginModule.java
  • HWPrincipal.java
  • HelloWorld.java
class files
  • The source files have been precompiled for you into the classes directory.
policy files
  • jaas.config
  • java2.policy
  • jaas.policy

Compile Source Files The three source files, HWLoginModule.java , HWPrincipal.java and HelloWorld.java , are already compiled and therefore do not need to be compiled.

If any of the source files are modified, then change to the test directory that they were saved to and enter:

javac -d .\classes *.java
The classpath needs the classes directory (.\classes) added to it in order to compile the classes.

Note:

HWLoginModule
and
HWPrincipal
are in the
com.ibm.security
package and will be created in the appropriate directory during compilation (>test_dir<\classes\com\ibm\security).

Examine Policy Files The configuration file, jaas.config , contains one entry:

helloWorld {
   com.ibm.security.HWLoginModule required debug=true;
};
Only one
LoginModule
is supplied with the test case. When processing the HelloWorld application, experiment by changing the
LoginModuleControlFlag
(required, requisite, sufficient, optional) and deleting the debug flag. If more LoginModules are available for testing, then feel free to alter this configuration and experiment with multiple LoginModules.
HWLoginModule
will be discussed shortly.

The Java 2 policy file, java2.policy , contains one permission block:

grant {
   permission javax.security.auth.AuthPermission "createLoginContext";
   permission javax.security.auth.AuthPermission "modifyPrincipals";
   permission javax.security.auth.AuthPermission "doAsPrivileged";
};
The three permissions are required because the HelloWorld application (1) creates a LoginContext object, (2) modifies the Principals of the the authenticated
Subject
and (3) calls the doAsPrivileged method of the
Subject
class.

The JAAS policy file, jaas.policy , also contains one permission block:

grant Principal com.ibm.security.HWPrincipal "bob" {
   permission java.util.PropertyPermission "java.home", "read";
   permission java.util.PropertyPermission "user.home", "read";
   permission java.io.FilePermission "foo.txt", "read";
};
The three permissions are initially granted to an
HWPrincipal
named bob . The actual Principal added to the authenticated
Subject
is the username used during the login process (more later).

<!-- -->

Here's the action code from HelloWorld with the three system calls (the reason for the required permissions) in bold :
Subject.doAsPrivileged(lc.getSubject(), new PrivilegedAction() {
    public Object run() {
        System.out.println("\nYour java.home property: "
                           +System.getProperty("java.home")
);

        System.out.println("\nYour user.home property: "
                           +System.getProperty("user.home")
);

        File f = new File("foo.txt");
        System.out.print("\nfoo.txt does ");
        if (!f.exists()
) System.out.print("not ");
        System.out.println("exist in your current directory");

        System.out.println("\nOh, by the way ...");

        try {
            Thread.currentThread().sleep(2000);
        } catch (Exception e) {
            // ignore
        }
        System.out.println("\n\nHello World!\n");
        return null;
    }
}, null);
When running the HelloWorld program, use various usernames and alter jaas.policy accordingly. There is no need to alter java2.policy . Also, create a file called foo.txt in the test directory to test the last system call.

Examine Source Files The LoginModule,

HWLoginModule
, authenticates any user who enters the correct password (case sensitive): Go JAAS .

The HelloWorld application permits users three attempts to do so. When Go JAAS is correctly entered, an

HWPrincipal
with a name equal the the username is added to the authenticated
Subject
.

The Principal class,

HWPrincipal
, represents a Principal based on the username entered. It is this name that is important when granting permissions to authenticated Subjects.

The main application,

HelloWorld
, first creates a
LoginContext
based on a configuration entry with the name helloWorld . The configuration file has already been discussed. Callbacks are used to retrieve user input. Look at the
MyCallbackHandler
class located in the HelloWorld.java file to see this process.
    LoginContext lc = null;
    try {
        lc = new LoginContext("helloWorld", new MyCallbackHandler());
    } catch (LoginException le) {
        le.printStackTrace();
        System.exit(-1);
    }
The user enters a username/password (up to three times) and if Go JAAS is entered as the password, then the Subject is authenticated (
HWLoginModule
adds a
HWPrincipal
to the Subject).

As mentioned previously, work is then performed as the authenticated Subject.

Run HelloWorld Test

To run the HelloWorld program, first change to the test directory. The configuration and policy files will need to be loaded. See Implementation for the correct properties to set either in java.security or on the command line. The latter method will be discussed here.

The following command has been broken up into several lines for clarity. Enter as one continuous command.

java -Djava.security.manager=
     -Djava.security.auth.login.config=.\jaas.config
     -Djava.security.policy=.\java2.policy
     -Djava.security.auth.policy=.\jaas.policy
     HelloWorld
Note: the use of ".\filename" for the policy files is necessary because each user's test directory canonical path will vary. If desired, substitute "." with the path to the test directory. For example, if the test directory is "c:\test\hello", then the first file is changed to:
     -Djava.security.auth.login.config=c:\test\hello\jaas.config
If the policy files are not found, a
SecurityException
will be thrown. Otherwise, information concerning your java.home and user.home properties will be displayed. Also, the existence of a file called foo.txt in your test directory will be checked. Finally, the ubiquitous "Hello World" message is displayed.

Having Fun With HelloWorld

Rerun HelloWorld as many times as you like. It has already been suggested to vary the username/passwords entered, change the configuration file entries, change the policy file permissions, and to even add (stack) additional LoginModules to the helloWorld configuration entry. You could add codebase fields to the policy files too.

Finally, try running the program without a SecurityManager to see how it works if you run into problems.

<!-- -->

Appendix A: JAAS Settings in the java.security Security Properties File

Below is a copy of the

java.security
file that appears in every Java 2 installation. This file appears in the
lib/security
(
lib\security
on Windows®) directory of the Java 2 runtime. Thus, if the Java 2 runtime is installed in a directory called
jdk1.3
, the file is
  • jdk1.3/lib/security/java.security
    (Unix)
  • jdk1.3\lib\security\java.security
    (Windows)
JAAS adds four new properties to
java.security
:
  • Authentication Properties
    • login.configuration.provider
    • login.policy.url.n
  • Authorization Properties
    • auth.policy.provider
    • auth.policy.url.n

The new JAAS properties are located at the end of this file:

#
# This is the "master security properties file".
#
# In this file, various security properties are set for use by
# java.security classes. This is where users can statically register
# Cryptography Package Providers ("providers" for short). The term
# "provider" refers to a package or set of packages that supply a
# concrete implementation of a subset of the cryptography aspects of
# the Java Security API. A provider may, for example, implement one or
# more digital signature algorithms or message digest algorithms.
#
# Each provider must implement a subclass of the Provider class.
# To register a provider in this master security properties file,
# specify the Provider subclass name and priority in the format
#
#    security.provider.n=className
#
# This declares a provider, and specifies its preference
# order n. The preference order is the order in which providers are
# searched for requested algorithms (when no specific provider is
# requested). The order is 1-based; 1 is the most preferred, followed
# by 2, and so on.
#
# className must specify the subclass of the Provider class whose
# constructor sets the values of various properties that are required
# for the Java Security API to look up the algorithms or other
# facilities implemented by the provider.
#
# There must be at least one provider specification in java.security.
# There is a default provider that comes standard with the JDK. It
# is called the "SUN" provider, and its Provider subclass
# named Sun appears in the sun.security.provider package. Thus, the
# "SUN" provider is registered via the following:
#
#    security.provider.1=sun.security.provider.Sun
#
# (The number 1 is used for the default provider.)
#
# Note: Statically registered Provider subclasses are instantiated
# when the system is initialized. Providers can be dynamically
# registered instead by calls to either the addProvider or
# insertProviderAt method in the Security class.

#
# List of providers and their preference orders (see above):
#
security.provider.1=sun.security.provider.Sun

#
# Class to instantiate as the system Policy. This is the name of the class
# that will be used as the Policy object.
#
policy.provider=sun.security.provider.PolicyFile

# The default is to have a single system-wide policy file,
# and a policy file in the user's home directory.
policy.url.1=file:${java.home}/lib/security/java.policy
policy.url.2=file:${user.home}/.java.policy

# whether or not we expand properties in the policy file
# if this is set to false, properties (${...}) will not be expanded in policy
# files.
policy.expandProperties=true

# whether or not we allow an extra policy to be passed on the command line
# with -Djava.security.policy=somefile. Comment out this line to disable
# this feature.
policy.allowSystemProperty=true

# whether or not we look into the IdentityScope for trusted Identities
# when encountering a 1.1 signed JAR file. If the identity is found
# and is trusted, we grant it AllPermission.
policy.ignoreIdentityScope=false

#
# Default keystore type.
#
keystore.type=jks

#
# Class to instantiate as the system scope:
#
system.scope=sun.security.provider.IdentityDatabase

##############################################################################
#
# Java Authentication and Authorization Service (JAAS)
# properties and policy files:
#

# Class to instantiate as the system Configuration for authentication.
# This is the name of the class that will be used as the Authentication
# Configuration object.
#
login.configuration.provider=com.ibm.security.auth.login.ConfigFile

# The default is to have a system-wide login configuration file found in
# the user's home directory.  For multiple files, the format is similar to
# that of CodeSource-base policy files above, that is policy

  


  
分享到:
评论

相关推荐

    JAAS简介及实例

    Java Authentication and Authorization Service (JAAS) 是Java平台提供的一种安全框架,用于实现用户身份验证和权限管理。这个框架使得开发者可以轻松地在Java应用程序中集成安全性,而不必深入理解底层的复杂安全...

    JAAS简介及示例代码

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全性的核心组件,它为开发者提供了一种机制来处理用户身份验证和权限控制。这个服务允许应用程序执行基于角色的安全性,这意味着用户的...

    Java JAAS安全认证 demo

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于实现用户身份验证和权限管理的核心组件。这个"Java JAAS安全认证 demo"是一个示例项目,旨在帮助开发者理解如何在Java应用中实施安全认证...

    jaas规范实现代码

    Java Authentication and Authorization Service (JAAS) 是 Java 平台中用于安全管理的重要组件,它提供了一种框架,使得应用程序可以进行用户身份验证和权限控制。在本文中,我们将深入探讨 JAAS 的核心概念、工作...

    java JAAS登陆验证

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全性的框架,主要用于用户身份验证和权限授权。在Java应用程序中,尤其是服务器端应用,确保只有合法的用户能够访问资源是至关重要的。...

    JAAS登录验证文档

    ### JAAS登录验证知识点 #### 一、JAAS概述 Java Authentication and Authorization Service(JAAS)是Java平台提供的一种安全框架,它允许开发者为应用程序添加认证和授权功能。与传统的基于容器的身份验证不同,...

    JAAS认证与授权教程

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全性的关键组件,它提供了一种框架,使得应用程序能够实现用户身份验证和权限管理。在这个教程中,我们将深入探讨JAAS的核心概念、工作...

    JAAS in Web Applications

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全性的关键组件,它提供了一种标准框架来实现用户身份验证和授权。在Web应用程序中,JAAS被用来控制对资源的访问,确保只有经过验证的用户...

    JAAS认证(mac版tomcat)

    **Java Authentication and Authorization Service (JAAS) 认证在Mac版Tomcat中的应用** Java Authentication and Authorization Service (JAAS) 是Java平台的核心组件,用于提供安全的用户认证和权限管理。在Mac版...

    jaas详细配置精讲

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全认证和授权的核心组件。它为开发者提供了一种标准的方式来管理用户的身份验证和访问控制,从而确保应用程序的安全性。在本精讲中,我们...

    websphere 6 JAAS登陆例子

    标题 "websphere 6 JAAS登陆例子" 描述了一个在Websphere 6版本中集成LDAP用户和实现Single Sign-On (SSO)的实践案例。这个主题涉及到Java Authentication and Authorization Service (JAAS)的安全框架,以及它如何...

    java软件包文件 jaas.jar

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全性的关键组件,它提供了一种框架,用于在Java应用程序中实现认证(Authentication)和授权(Authorization)。`jaas.jar` 文件是这个...

    JAAS简介及实例.

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全管理的框架,它是Java Cryptography Extension (JCE) 安全框架的重要补充。JAAS的主要目标是提供用户认证和授权服务,确保应用程序能...

    在JAAS基础上的Java安全编程

    ### 在JAAS基础上的Java安全编程 #### 一、引言 随着互联网技术的发展和企业对数据安全的重视,Java作为一种广泛应用的编程语言,在安全领域扮演着越来越重要的角色。JAAS(Java Authentication and Authorization...

    JAAS登录验证文档,里面有详细步骤及例子

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于安全认证和授权的核心组件。它提供了一个框架,使得应用程序可以通过统一的方式来处理用户身份验证和权限控制。JAAS的主要目标是简化应用的...

    基于JAAS的Java安全编程

    ### 基于JAAS的Java安全编程 #### JAAS概览 JAAS(Java Authentication and Authorization Service,Java认证与授权服务)是Sun Microsystems为Java 2平台开发的一套安全框架扩展,旨在加强Java应用程序的安全性。...

    JAAS 身份验证技术入门

    ### JAAS身份验证技术入门详解 #### 一、JAAS概览 JAAS,全称为Java Authentication and Authorization Service(Java认证与授权服务),是Java Standard Edition(Java SE)中的一个核心组成部分,旨在为Java应用...

    JAAS灵活的Java安全机制

    Java Authentication and Authorization Service (JAAS) 是Java平台中用于实现用户认证和权限授权的一个核心组件。它为开发者提供了一种灵活的方式来实现安全控制,确保只有经过验证和授权的用户能够访问敏感资源或...

Global site tag (gtag.js) - Google Analytics