@Override public boolean verifyEvidence(Evidence evidence) throws RealmUnavailableException { if (domainContext == null || domainContext.getAuthenticationManager() == null) { throw new RealmUnavailableException(); } else { final Subject jaasSubject = new Subject(); Object jaasCredential = evidence; if (evidence instanceof PasswordGuessEvidence) { jaasCredential = ((PasswordGuessEvidence) evidence).getGuess(); } final boolean isValid = domainContext.getAuthenticationManager().isValid(principal, jaasCredential, jaasSubject); if (isValid) { // set the authenticated subject when the authentication succeeds. this.authenticatedSubject = jaasSubject; } return isValid; } }
authenticated = authenticationManager.isValid(principal, credential, subject);
private Account verifyCredential(final AccountImpl account, final Object credential) { final AuthenticationManager authenticationManager = securityDomainContext.getAuthenticationManager(); final AuthorizationManager authorizationManager = securityDomainContext.getAuthorizationManager(); final SecurityContext sc = SecurityActions.getSecurityContext(); Principal incomingPrincipal = account.getOriginalPrincipal(); Subject subject = new Subject(); try { boolean isValid = authenticationManager.isValid(incomingPrincipal, credential, subject); if (isValid) { UndertowLogger.ROOT_LOGGER.tracef("User: %s is authenticated", incomingPrincipal); if (sc == null) { throw UndertowLogger.ROOT_LOGGER.noSecurityContext(); } Principal userPrincipal = getPrincipal(subject); sc.getUtil().createSubjectInfo(incomingPrincipal, credential, subject); SecurityContextCallbackHandler scb = new SecurityContextCallbackHandler(sc); RoleGroup roles = authorizationManager.getSubjectRoles(subject, scb); Set<String> roleSet = new HashSet<>(); for (Role role : roles.getRoles()) { roleSet.add(role.getRoleName()); } return new AccountImpl(userPrincipal, roleSet, credential, account.getOriginalPrincipal()); } } catch (Exception e) { throw new RuntimeException(e); } return null; }
public boolean validateUser(final String user, final String password) { SimplePrincipal principal = new SimplePrincipal(user); char[] passwordChars = null; if (password != null) { passwordChars = password.toCharArray(); } Subject subject = new Subject(); return authenticationManager.isValid(principal, passwordChars, subject); }
@Override public boolean isValid(Principal principal, Object credential, Subject activeSubject) { return context.getAuthenticationManager().isValid(principal, credential, activeSubject); }
public boolean validateUser(final String user, final String password) { SimplePrincipal principal = new SimplePrincipal(user); char[] passwordChars = null; if (password != null) { passwordChars = password.toCharArray(); } Subject subject = new Subject(); return authenticationManager.isValid(principal, passwordChars, subject); }
@Override public boolean isValid(Principal principal, Object credential, Subject activeSubject) { return context.getAuthenticationManager().isValid(principal, credential, activeSubject); }
@Override public boolean isValid(Principal principal, Object credential, Subject activeSubject) { return context.getAuthenticationManager().isValid(principal, credential, activeSubject); }
@Override public boolean validateUser(String username, String password) { if (defaultUser.equals(username) && defaultPassword.equals(password)) return true; if (securityDomainContext == null) throw MessagingLogger.ROOT_LOGGER.securityDomainContextNotSet(); return securityDomainContext.getAuthenticationManager().isValid(new SimplePrincipal(username), password, new Subject()); }
@Override public boolean validateUser(String username, String password) { if (defaultUser.equals(username) && defaultPassword.equals(password)) return true; if (securityDomainContext == null) throw MessagingLogger.ROOT_LOGGER.securityDomainContextNotSet(); return securityDomainContext.getAuthenticationManager().isValid(new SimplePrincipal(username), password, new Subject()); }
@Override public ExecutionContext authenticate( Credentials credentials, String repositoryName, String workspaceName, ExecutionContext repositoryContext, Map<String, Object> sessionAttributes ) { if (!(credentials instanceof SimpleCredentials)) { return null; } final SimpleCredentials simpleCredentials = (SimpleCredentials) credentials; final Principal principal = new Principal() { @Override public String getName() { return simpleCredentials.getUserID(); } }; String pass = String.valueOf(simpleCredentials.getPassword()); Subject subject = new Subject(); if (this.authenticationManager.isValid(principal, pass, subject)) { //we've been successfully authenticated, so we need to set ourselves as a security context in order to be //able to perform custom authorization return repositoryContext.with(newProviderWithSubject(subject)); } else { // were unable to perform authentication return null; } }
if (authenticationManager.isValid(principal, credential, subject) == false)
@Override public boolean verifyEvidence(Evidence evidence) throws RealmUnavailableException { if (domainContext == null || domainContext.getAuthenticationManager() == null) { throw new RealmUnavailableException(); } else { final Subject jaasSubject = new Subject(); Object jaasCredential = evidence; if (evidence instanceof PasswordGuessEvidence) { jaasCredential = ((PasswordGuessEvidence) evidence).getGuess(); } final boolean isValid = domainContext.getAuthenticationManager().isValid(principal, jaasCredential, jaasSubject); if (isValid) { // set the authenticated subject when the authentication succeeds. this.authenticatedSubject = jaasSubject; } return isValid; } }
authenticated = authenticationManager.isValid(principal, credential, subject);
authenticated = authenticationManager.isValid(principal, credential, subject);
public Boolean run() { SecurityContext sc = SecurityContextAssociation.getSecurityContext(); Principal principal = sc.getUtil().getUserPrincipal(); char[] passwordChars = (char[])sc.getUtil().getCredential(); Subject subject = sc.getSubjectInfo().getAuthenticatedSubject(); boolean authenticated = authenticationManager.isValid(principal, passwordChars, subject); if (authenticated) { Set<Principal> rolePrincipals = getRolePrincipals(checkType, roles); authenticated = realmMapping.doesUserHaveRole(principal, rolePrincipals); if (trace) { ActiveMQJBossLogger.LOGGER.trace("user " + principal.getName() + (authenticated ? " is " : " is NOT ") + "authorized"); } } return authenticated; }
public Boolean run() { SecurityContext sc = SecurityContextAssociation.getSecurityContext(); Principal principal = sc.getUtil().getUserPrincipal(); char[] passwordChars = (char[])sc.getUtil().getCredential(); Subject subject = sc.getSubjectInfo().getAuthenticatedSubject(); boolean authenticated = authenticationManager.isValid(principal, passwordChars, subject); if (authenticated) { Set<Principal> rolePrincipals = getRolePrincipals(checkType, roles); authenticated = realmMapping.doesUserHaveRole(principal, rolePrincipals); if (trace) { HornetQJBossLogger.LOGGER.trace("user " + principal.getName() + (authenticated ? " is " : " is NOT ") + "authorized"); } } return authenticated; }
private Account verifyCredential(final AccountImpl account, final Object credential) { final AuthenticationManager authenticationManager = securityDomainContext.getAuthenticationManager(); final AuthorizationManager authorizationManager = securityDomainContext.getAuthorizationManager(); final SecurityContext sc = SecurityActions.getSecurityContext(); Principal incomingPrincipal = account.getOriginalPrincipal(); Subject subject = new Subject(); try { boolean isValid = authenticationManager.isValid(incomingPrincipal, credential, subject); if (isValid) { UndertowLogger.ROOT_LOGGER.tracef("User: %s is authenticated", incomingPrincipal); if (sc == null) { throw UndertowLogger.ROOT_LOGGER.noSecurityContext(); } Principal userPrincipal = getPrincipal(subject); sc.getUtil().createSubjectInfo(incomingPrincipal, credential, subject); SecurityContextCallbackHandler scb = new SecurityContextCallbackHandler(sc); RoleGroup roles = authorizationManager.getSubjectRoles(subject, scb); Set<String> roleSet = new HashSet<>(); for (Role role : roles.getRoles()) { roleSet.add(role.getRoleName()); } return new AccountImpl(userPrincipal, roleSet, credential, account.getOriginalPrincipal()); } } catch (Exception e) { throw new RuntimeException(e); } return null; }
private Account verifyCredential(final AccountImpl account, final Object credential) { final AuthenticationManager authenticationManager = securityDomainContext.getAuthenticationManager(); final AuthorizationManager authorizationManager = securityDomainContext.getAuthorizationManager(); final SecurityContext sc = SecurityActions.getSecurityContext(); Principal incomingPrincipal = account.getOriginalPrincipal(); Subject subject = new Subject(); try { boolean isValid = authenticationManager.isValid(incomingPrincipal, credential, subject); if (isValid) { UndertowLogger.ROOT_LOGGER.tracef("User: %s is authenticated", incomingPrincipal); if (sc == null) { throw UndertowLogger.ROOT_LOGGER.noSecurityContext(); } Principal userPrincipal = getPrincipal(subject); sc.getUtil().createSubjectInfo(incomingPrincipal, credential, subject); SecurityContextCallbackHandler scb = new SecurityContextCallbackHandler(sc); RoleGroup roles = authorizationManager.getSubjectRoles(subject, scb); Set<String> roleSet = new HashSet<>(); for (Role role : roles.getRoles()) { roleSet.add(role.getRoleName()); } return new AccountImpl(userPrincipal, roleSet, credential, account.getOriginalPrincipal()); } } catch (Exception e) { throw new RuntimeException(e); } return null; }
private ExecutionContext validateSimpleCredentials( SimpleCredentials credentials, ExecutionContext repositoryContext) { if (LOGGER.isDebugEnabled()) { LOGGER.debugv("Authenticating {0} in the {1} security domain using the JBoss Server security manager", credentials.getUserID(), securityDomain()); } Subject subject = new Subject(); if (authenticationManager.isValid(SimplePrincipal.newInstance(credentials.getUserID()), credentials.getPassword(), subject)) { if (LOGGER.isDebugEnabled()) { LOGGER.debug("Authentication successful...."); } return repositoryContext.with(new JBossSecurityContext(new JaasSecurityContext(subject))); } else { if (LOGGER.isDebugEnabled()) { LOGGER.debugv("Credentials for {0} are not valid for the {1} security domain", credentials.getUserID(), securityDomain()); } return null; } }