This document was last updated March 17, 2000.
The Java™ Authentication and Authorization Service (JAAS) is a standard extension to the Java 2 Software Development Kit, version 1.3. Currently, Java 2 provides codesource-based access controls (access controls based on where the code originated from and who signed the code). It lacks, however, the ability to additionally enforce access controls based on who runs the code. JAAS provides a framework that augments the Java 2 security model with such support.
This document is intended for experienced programmers wanting to create applications constrained by a codesource-based and Subject-based security model.
This document assumes you have already read the following documentation:
A supplement to this guide is the LoginModule Developer's Guide that is supplied by Sun Microsystems, Inc.
The JAAS infrastructure can be divided into two main components: an authentication component and an authorization component. The JAAS authentication component provides the ability to reliably and securely determine who is currently processing Java code, regardless of whether the code is running as an application, an applet, a bean, or a servlet. The JAAS authorization component supplements the existing Java 2 security framework by providing the means to restrict the processing Java code from performing sensitive tasks, depending on its codesource (as is done in Java 2) and depending on who was authenticated.
JAAS authentication is performed in a pluggable fashion. This permits Java applications to remain independent from underlying authentication technologies. Therefore new or updated authentication technologies can be plugged under an application without requiring modifications to the application itself. Applications enable the authentication process by instantiating a
LoginContextobject, which in turn references a
Configurationto determine the authentication technology, or
LoginModule, to be used in performing the authentication. Typical LoginModules may prompt for and verify a username and password. Others may read and verify a voice or fingerprint sample.
Once the user processing the code has been authenticated, the JAAS authorization component works in conjunction with the existing Java 2 access control model to protect access to sensitive resources. Unlike in Java 2, where access control decisions are based solely on code location and code signers (a
CodeSource), in JAAS access control decisions are based both on the processing code's
CodeSource, as well as on the user running the code, or the
Subject. Note that the JAAS policy merely extends the Java 2 policy with the relevant Subject-based information. Therefore permissions recognized and understood in Java 2 (
java.io.FilePermissionand
java.net.SocketPermission, for example) are also understood and recognized by JAAS. Furthermore, although the JAAS security policy is physically separate from the existing Java 2 security policy, the two policies, together, form one logical policy.
The key JAAS class is
Subject, which represents a grouping of related information for a single entity such as a person. It encompasses the entity's Principals, public credentials, and private credentials.
Note that JAAS uses the existing Java 2
java.security.Principalinterface to represent a Principal. Also note that JAAS does not introduce a separate credential interface or class. A credential, as defined by JAAS, may be any Object.
A
Subjectmay also own security-related attributes, which are referred to as credentials. Sensitive credentials that require special protection, such as private cryptographic keys, are stored within a private credential
Set. Credentials intended to be shared, such as public key certificates or Kerberos tickets are stored within a public credential
Set. Different permissions are required to access and modify the different credential Sets.
Subjects are created using these constructors:
public Subject(); public Subject(boolean readOnly, Set principals, Set pubCredentials, Set privCredentials);The first constructor creates a Subject with empty (non-null) Sets of Principals and credentials. The second constructor creates a Subject with the specified Sets of Principals and credentials. It also has a boolean argument which can create a read-only Subject (immutable Principal and credential Sets).
An alternative way to obtain a reference to an authenticated Subject without using these constructors will be shown in the LoginContext section.
If a Subject was not instantiated to be in a read-only state, it can be set to a read-only state by calling this method:
public void setReadOnly();An
AuthPermission("setReadOnly")is required to invoke this method. Once in a read-only state, any attempt to add or remove Principals or credentials will result in an
IllegalStateExceptionbeing thrown.
This method may be called to test a Subject's read-only state:
public boolean isReadOnly();To retrieve the Principals associated with a Subject, two methods are available:
public Set getPrincipals(); public Set getPrincipals(Class c);The first method returns all Principals contained in the Subject, while the second method only returns those Principals that are an instance of the specified Class c, or an instance of a subclass of Class c. An empty set will be returned if the Subject does not have any associated Principals.
To retrieve the public credentials associated with a Subject, these methods are available:
public Set getPublicCredentials(); public Set getPublicCredentials(Class c);The observed behavior of these methods is identical to that for the
getPrincipalsmethod.
To access private credentials associated with a Subject, the following methods are available:
public Set getPrivateCredentials(); public Set getPrivateCredentials(Class c);The observed behavior of these methods is identical to that for the
getPrincipalsand
getPublicCredentialsmethods.
To modify or operate upon a Subject's Principal Set, public credential Set, or private credential Set, callers use the methods defined in the
java.util.Setclass. The following example demonstrates this:
Subject subject; Principal principal; Object credential; // add a Principal and credential to the Subject subject.getPrincipals().add(principal); subject.getPublicCredentials().add(credential);Note that an
AuthPermission("modifyPrincipals"),
AuthPermission("modifyPublicCredentials"), or
AuthPermission("modifyPrivateCredentials")is required to modify the respective Sets. Also note that only the sets returned via the
getPrincipals,
getPublicCredentials, and
getPrivateCredentialsmethods are backed by the Subject's respective internal sets. Therefore any modification to the returned set affects the internal sets as well. The sets returned via the
getPrincipals(Class c),
getPublicCredentials(Class c), and
getPrivateCredentials(Class c)methods are not backed by the Subject's respective internal sets. A new set is created and returned for each method invocation. Modifications to these sets will not affect the Subject's internal sets. The following method returns the Subject associated with the specified
AccessControlContext, or null if no Subject is associated with the specified
AccessControlContext.
public static Subject getSubject(final AccessControlContext acc);An
AuthPermission("getSubject")is required to call
Subject.getSubject.
The Subject class also includes these methods inherited from
java.lang.Object:
public boolean equals(Object o); public String toString(); public int hashCode();
The following static methods may be called to perform work as a particular Subject:
public static Object doAs(final Subject subject, final java.security.PrivilegedAction action); public static Object doAs(final Subject subject, final java.security.PrivilegedExceptionAction action) throws java.security.PrivilegedActionException;Both methods first associate the specified subject with the current Thread's
AccessControlContext, and then process the action. This achieves the effect of having the action run as the subject. The first method can throw runtime exceptions but normal processing has it returning an Object from the run() method of its action argument. The second method behaves similarly except that it can throw a checked exception from its
PrivilegedExceptionActionrun() method. An
AuthPermission("doAs")is required to call the
doAsmethods.
Here are two examples utilizing the first
doAsmethod. Assume that a
Subjectwith a Principal of class
com.ibm.security.Principalnamed "BOB" has been authenticated by a
LoginContext"lc". Also, assume that a SecurityManager has been installed, and the following exists in the JAAS access control policy (see the Policy section for more details on the JAAS policy file):
// Grant "BOB" permission to read the file "foo.txt" grant Principal com.ibm.security.Principal "BOB" { permission java.io.FilePermission "foo.txt", "read"; };
Subject.doAs Example 1
class ExampleAction implements java.security.PrivilegedAction { public Object run() { java.io.File f = new java.io.File("foo.txt"); // exists() invokes a security check if (f.exists()) { System.out.println("File foo.txt exists."); } return null; } } public class Example1 { public static void main(String[] args) { // Authenticate the subject, "BOB". // This process is described in the // LoginContext section. Subject bob; ... // perform "ExampleAction" as "BOB": Subject.doAs(bob, new ExampleAction()); } }During processing,
ExampleActionwill encounter a security check when it makes a call to,
f.exists(). However, since
ExampleActionis running as "BOB", and because the JAAS policy (above) grants the necessary
FilePermissionto "BOB", the
ExampleActionwill pass the security check.
Example 2 has the same scenario as Example 1.
Subject.doAs Example 2
public class Example2 { // Example of using an anonymous action class. public static void main(String[] args) { // Authenticate the subject, "BOB". // This process is described in the // LoginContext section. Subject bob; ... // perform "ExampleAction" as "BOB": Subject.doAs(bob, new ExampleAction() { public Object run() { java.io.File f = new java.io.File("foo.txt"); if (f.exists()) { System.out.println("File foo.txt exists."); } return null; } }); } }Both examples throw a
SecurityExceptionif the example permission grant statement is altered correctly, such as adding an incorrect CodeBase or changing the Principal to "MOE". Removing the Principal field from the grant block and then moving it to a Java 2 policy file will not cause a
SecurityExceptionto be thrown because the permission is more general now (available to all Principals).
Since both examples perform the same function, there must be a reason to write code one way over the other. Example 1 may be easier to read for some programmers unfamiliar with anonymous classes. Also, the action class could be placed in a separate file with a unique CodeBase and then the permission grant could utilize this information. Example 2 is more compact and the action to be performed is easier to find since it is right there in the
doAscall.
The following methods also perform work as a particular Subject. However, the
doAsPrivilegedmethods will have security checks based on the supplied action and subject. The supplied context will be tied to the specified subject and action. A null context object will disregard the current
AccessControlContextaltogether.
public static Object doAsPrivileged(final Subject subject, final java.security.PrivilegedAction action, final java.security.AccessControlContext acc); public static Object doAsPrivileged(final Subject subject, final java.security.PrivilegedExceptionAction action, final java.security.AccessControlContext acc) throws java.security.PrivilegedActionException;The
doAsPrivilegedmethods behave similarly to the
doAsmethods: the subject is associated with the context acc, an action is performed, and runtime exceptions or checked exceptions may be thrown. However, the
doAsPrivilegedmethods first empties the existing Thread's
AccessControlContextbefore associating the subject with the supplied context, and before invoking the action. A null acc argument has the effect of causing access control decisions (invoked while the action processes) to be based solely upon the subject and action. An
AuthPermission("doAsPrivileged")is required when calling the
doAsPrivilegedmethods.
java.security.Principaland
java.io.Serializableinterfaces. The Subject section describes ways to update the Principals associated with a Subject.
boolean isCurrent();Determines if the credential is current or valid.
void refresh() throws RefreshFailedException;Updates or extends the validity of the credential. This method implementation performs an
AuthPermission("refreshCredential")security check to ensure the caller has permission to refresh the credential.
boolean isDestroyed();Determines if the credential has been destroyed.
void destroy() throws DestroyFailedException;Destroys and clears the information associated with this credential. Subsequent calls to certain methods on this credential will result in an
IllegalStateExceptionbeing thrown. This method implementation performs an
AuthPermission("destroyCredential")security check to ensure the caller has permission to destroy the credential.
Subject, the following steps are performed:
LoginContext.
LoginContextconsults a configuration to load all of the LoginModules configured for that application.
LoginModuleattempts to authenticate the
Subject. Upon success, LoginModules associate relevant Principals and credentials with the
Subject.
LoginContextreturns the authentication status to the application.
Subjectfrom the
LoginContext.
LoginContextclass provides the basic methods used to authenticate Subjects, and provides a way to develop an application independent of the underlying authentication technology. The
LoginContextconsults a configuration
Configurationto determine the authentication services, or LoginModules, configured for a particular application. Therefore, different LoginModules can be plugged in under an application without requiring any modifications to the application itself.
LoginContextoffers four constructors to choose from:
public LoginContext(String name) throws LoginException; public LoginContext(String name, Subject subject) throws LoginException; public LoginContext(String name, CallbackHandler callbackHandler) throws LoginException public LoginContext(String name, Subject subject, CallbackHandler callbackHandler) throws LoginExceptionAll of the constructors share a common parameter: name. This argument is used by the
LoginContextto index the login Configuration. Constructors that do not take a
Subjectas an input parameter instantiate a new
Subject. Null inputs are disallowed for all constructors. Callers require an
AuthPermission("createLoginContext")to instantiate a
LoginContext.
Actual authentication occurs with a call to the following method:
public void login() throws LoginException;When login is invoked, all of the configured LoginModules' respective login methods are invoked to perform the authentication. If the authentication succeeded, the authenticated
Subject(which may now hold Principals, public credentials, and private credentials) can be retrieved by using the following method:
public Subject getSubject();To logout a
Subjectand remove its authenticated Principals and credentials, the following method is provided:
public void logout() throws LoginException;
The following snippet of code in an application will authenticate a Subject called "bob" after accessing a configuration file with a configuration entry named "moduleFoo":
Subject bob = new Subject(); LoginContext lc = new LoginContext("moduleFoo", bob); try { lc.login(); System.out.println("authentication successful"); } catch (LoginException le) { System.out.println("authentication unsuccessful"+le.printStackTrace()); }This snippet of code in an application will authenticate a "nameless" Subject and then use the getSubject method to retrieve it:
LoginContext lc = new LoginContext("moduleFoo"); try { lc.login(); System.out.println("authentication successful"); } catch (LoginException le) { System.out.println("authentication unsuccessful"+le.printStackTrace()); } Subject subject = lc.getSubject();If the authentication failed, then getSubject returns null. Also, there isn't an
AuthPermission("getSubject")required to do this as is the case for
Subject.getSubject
The LoginModule interface gives developers the ability to implement different kinds of authentication technologies that can be plugged under an application. For example, one type of
LoginModulemay perform a username/password-based form of authentication.
The LoginModule Developer's Guide is a detailed document that gives developers step-by-step instructions for implementing LoginModules.
To instantiate a
LoginModule, a
LoginContextexpects each
LoginModuleto provide a public constructor that takes no arguments. Then, to initialize a
LoginModulewith the relevant information, a
LoginContextcalls the LoginModule's
initializemethod. The provided subject is guaranteed to be non-null.
void initialize(Subject subject, CallbackHandler callbackHandler, Map sharedState, Map options);This following method begins the authentication process:
boolean login() throws LoginException;An example method implementation may prompt the user for a username and password, and then verify the information against the data stored in a naming service such as NIS or LDAP. Alternative implementations might interface smart cards and biometric devices, or may simply extract user information from the underlying operating system. This is considered phase 1 of the JAAS authentication process.
The following method completes and finalizes the authentication process:
boolean commit() throws LoginException;If phase 1 of the authentication process was successful, then this method continues with phase 2: associating Principals, public credentials, and private credentials with the Subject. If phase 1 failed, then the commit method removes any previously stored authentication state, such as usernames and passwords.
The following method halts the authentication process if phase 1 was unsuccessful:
boolean abort() throws LoginException;Typical implementations of this method clean up previously stored authentication state, such as usernames or passwords. The following method logs out a Subject:
boolean logout() throws LoginException;This method removes the Principals and credentials originally associated with the
Subjectduring the
commitoperation. Credentials are destroyed upon removal.
In some cases a LoginModule must communicate with the user to obtain authentication information. LoginModules use a CallbackHandler for this purpose. Applications implement the CallbackHandler interface and pass it to the LoginContext, which forwards it directly to the underlying LoginModules. LoginModules use the CallbackHandler both to gather input from users (such as a password or smart card pin number) or to supply information to users (such as status information). By allowing the application to specify the CallbackHandler, underlying LoginModules can remain independent of the different ways applications interact with users. For example, the implementation of a CallbackHandler for a GUI application might display a Window to solicit input from a user. On the other hand, the implementation of a CallbackHandler for a non-GUI tool might prompt the user for input directly from the command line.
CallbackHandleris an interface with one method to implement:
void handle(Callback[] callbacks) throws java.io.IOException, UnsupportedCallbackException;
Consult the various Callback APIs for more information on their use.
Subject, fine-grained access controls can be placed upon that
Subjectby invoking the Subject.doAs or Subject.doAsPrivileged methods. The permissions granted to that
Subjectare configured in a JAAS
Policy.
Policysubclass must implement the following methods:
public abstract java.security.PermissionCollection getPermissions (Subject subject, java.security.CodeSource cs); public abstract void refresh();The
getPermissionsmethod returns the permissions granted to the specified
Subjectand
CodeSource. The
refreshmethod updates the runtime
Policywith any modifications made since the last time it was loaded from its permanent store (a file or database, for example). The
refreshmethod requires an
AuthPermission("refreshPolicy").
The following method retrieves the current runtime
Policyobject, and is protected with a security check that requires the caller to have an
AuthPermission("getPolicy").
public static Policy getPolicy();The following example code demonstrates how a
Policyobject can be queried for the set of permissions granted to the specified
Subjectand
CodeSource:
policy = Policy.getPolicy(); PermissionCollection perms = policy.getPermissions(subject, codeSource);To set a new
Policyobject for the Java runtime, the
Policy.setPolicymethod may be used. This method requires the caller to have an
AuthPermission("setPolicy").
public static void setPolicy(Policy policy);
Policy File Sample Entries:
These examples are relevant only for the default PolicyFile implementation.
Each entry in the
Policyis represented as a grant entry. Each grant entry specifies a codebase/code-signers/Principals triplet, as well as the Permissions granted to that triplet. Specifically, the permissions will be granted to any code downloaded from the specified codebase and signed by the specified code signers, so long as the
Subjectrunning that code has all of the specified Principals in its
Principalset. Refer to the Subject.doAs examples to see how a
Subjectbecomes associated with running code.
grant CodeBase ["URL"], Signedby ["signers"], Principal [Principal_Class] "Principal_Name", Principal ... { permission Permission_Class ["Target_Name"] [, "Permission_Actions"] [, signedBy "SignerName"]; }; // example grant entry grant CodeBase "http://griffin.ibm.com", Signedby "davis", Principal com.ibm.security.auth.NTUserPrincipal "kent" { permission java.io.FilePermission "c:/kent/files/*", "read, write"; };If no Principal information is specified in the JAAS
Policygrant entry, a parsing exception will be thrown. However, grant entries that already exist in the regular Java 2 codesource-based policy file (and therefore have no Principal information) are still valid. In those cases, the Principal information is implied to be '*' (the grant entries applies to all Principals).
The CodeBase and Signedby components of the grant entry are optional in the JAAS
Policy. If they are not present, then any codebase will match, and any signer (including unsigned code) will match.
In the example above, the grant entry specifies that code downloaded from "http://griffin.ibm.com", signed by "davis", and running as the NT user "kent", has one
Permission. This
Permissionpermits the processing code to read and write files in the directory "c:\kent\files".
Multiple Principals may be listed within one grant entry. The current
Subjectrunning the code must have all of the specified Principals in its
Principalset to be granted the entry's Permissions.
grant Principal com.ibm.security.auth.NTUserPrincipal "kent", Principal com.ibm.security.auth.NTSidGroupPrincipal "S-1-1-0" { permission java.io.FilePermission "c:/user/kent/", "read, write"; permission java.net.SocketPermission "griffin.ibm.com", "connect"; };This entry grants any code running as both the NT user "kent" with the NT group identification number "S-1-1-0", permission to read and write files in "c:\user\kent", as well as permission to make socket connections to "griffin.ibm.com".
Permissionclass), an
AuthPermissionhas two public constructors:
public AuthPermission(String name); public AuthPermission(String name, String actions);The first constructor creates a new AuthPermission with the specified name. The second constructor also creates a new AuthPermission object with the specified name, but has an additional actions argument which is currently unused and are null. This constructor exists solely for the
Policyobject to instantiate new Permission objects. For most code, the first constructor is appropriate.
The AuthPermission object is used to guard access to the Policy, Subject, LoginContext, and Configuration objects. Refer to the AuthPermission Javadoc for the list of valid names that are supported.
public PrivateCredentialPermission(String name, String actions);Refer to the PrivateCredentialPermission Javadoc for more detailed information on this class.
Because there exists default values for JAAS providers and policy files, users need not statically (in the java.security file) nor dynamically (command line -D option) list their values in order to implement JAAS. Also, the default configuration and policy file providers may be replaced by a user-developed provider. Therefore this section is an attempt to explain the JAAS default providers and policy files as well as the properties that enable alternative providers.
Read the Default Policy File API and Default Configuration File API for more information than is summarized here.
Authentication Provider
The authentication provider, or configuration class, is statically set with
login.configuration.provider=[class]in the java.security file. This provider creates the
Configurationobject.
For example:
login.configuration.provider=com.foo.ConfigIf the Security property
login.configuration.provideris not found in java.security, then JAAS will set it to the default value:
com.ibm.security.auth.login.ConfigFile.
If a security manager is set before the
Configurationis created, then an
AuthPermission("getLoginConfiguration")will be required to be granted.
There isn't a way to dynamically set the configuration provider on the command line.
Authentication Configuration File
The authentication configuration files may be statically set in java.security with
login.config.url.n=[URL], where n is a consecutively number integer starting with 1. The format is identical to the format for Java security policy files (policy.url.n=[URL]).
If the Security property
policy.allowSystemPropertyis set to "true" in java.security, then users can dynamically set policy files on the command line utilizing the -D option with this property:
java.security.auth.login.config. The value may be a path or URL. For example (on NT):
... -Djava.security.auth.login.config=c:\config_policy\login.config ... or ... -Djava.security.auth.login.config=file:c:/config_policy/login.config ...Note: using double equal signs (==) on the command line allows a user to override all other policy files found.
If no configuration files can be found statically or dynamically, JAAS will try to load the configuration file from this default location:
${user.home}\.java.login.configwhere ${user.home} is a system dependent location.
The authorization provider, or JAAS Policy class, is statically set with
auth.policy.provider=[class]in the java.security file. This provider creates the JAAS Subject-based
Policyobject.
For example:
auth.policy.provider=com.foo.PolicyIf the Security property
auth.policy.provideris not found in java.security, then JAAS will set it to the default value:
com.ibm.security.auth.PolicyFile.
If a security manager is set before the
Configurationis created, then an
AuthPermission("getPolicy")will be required to be granted.
There isn't a way to dynamically set the authorization provider on the command line.
Authorization Policy File
The authorization policy files may be statically set in java.security with
auth.policy.url.n=[URL], where n is a consecutively number integer starting with 1. The format is identical to the format for Java security policy files (policy.url.n=[URL]).
If the Security property
policy.allowSystemPropertyis set to "true" in java.security, then users can dynamically set policy files on the command line utilizing the -D option with this property:
java.security.auth.policy. The value may be a path or URL. For example (on NT):
... -Djava.security.auth.policy=c:\auth_policy\java.auth.policy ... or ... -Djava.security.auth.policy=file:c:/auth_policy/java.auth.policy ...Note: using double equal signs (==) on the command line allows a user to override all other policy files found.
There is not a default location to load an authorization policy from.
Put on your dark sunglasses and favorite fedora hat, then grab an alto sax ... it's time to get JAAS-y! Yes, another "Hello World!" program. In this section, a program will be made available to test your JAAS installation.
Installation It is assumed that JAAS has been installed. For example, the JAAS JAR files have been copied to your Development Kit's extensions directory.
Retrieve Files Download theHelloWorld.tar to your test directory. Expand it using "jar xvf HelloWorld.tar".
Verify the contents of your test directory.
source files:Compile Source Files The three source files, HWLoginModule.java, HWPrincipal.java and HelloWorld.java, are already compiled and therefore do not need to be compiled.
If any of the source files are modified, then change to the test directory that they were saved to and enter:
javac -d .\classes *.javaThe classpath needs the classes directory (.\classes) added to it in order to compile the classes.
Note:
HWLoginModuleand
HWPrincipalare in the
com.ibm.securitypackage and will be created in the appropriate directory during compilation (>test_dir<\classes\com\ibm\security).
Examine Policy Files The configuration file, jaas.config, contains one entry:
helloWorld { com.ibm.security.HWLoginModule required debug=true; };Only one
LoginModuleis supplied with the test case. When processing the HelloWorld application, experiment by changing the
LoginModuleControlFlag(required, requisite, sufficient, optional) and deleting the debug flag. If more LoginModules are available for testing, then feel free to alter this configuration and experiment with multiple LoginModules.
HWLoginModulewill be discussed shortly.
The Java 2 policy file, java2.policy, contains one permission block:
grant { permission javax.security.auth.AuthPermission "createLoginContext"; permission javax.security.auth.AuthPermission "modifyPrincipals"; permission javax.security.auth.AuthPermission "doAsPrivileged"; };The three permissions are required because the HelloWorld application (1) creates a LoginContext object, (2) modifies the Principals of the the authenticated
Subjectand (3) calls the doAsPrivileged method of the
Subjectclass.
The JAAS policy file, jaas.policy, also contains one permission block:
grant Principal com.ibm.security.HWPrincipal "bob" { permission java.util.PropertyPermission "java.home", "read"; permission java.util.PropertyPermission "user.home", "read"; permission java.io.FilePermission "foo.txt", "read"; };The three permissions are initially granted to an
HWPrincipalnamed bob. The actual Principal added to the authenticated
Subjectis the username used during the login process (more later). Here's the action code from HelloWorld with the three system calls (the reason for the required permissions) in bold:
Subject.doAsPrivileged(lc.getSubject(), new PrivilegedAction() { public Object run() { System.out.println("\nYour java.home property: " +System.getProperty("java.home")); System.out.println("\nYour user.home property: " +System.getProperty("user.home")); File f = new File("foo.txt"); System.out.print("\nfoo.txt does "); if (!f.exists()) System.out.print("not "); System.out.println("exist in your current directory"); System.out.println("\nOh, by the way ..."); try { Thread.currentThread().sleep(2000); } catch (Exception e) { // ignore } System.out.println("\n\nHello World!\n"); return null; } }, null);When running the HelloWorld program, use various usernames and alter jaas.policy accordingly. There is no need to alter java2.policy. Also, create a file called foo.txt in the test directory to test the last system call.
Examine Source Files The LoginModule,
HWLoginModule, authenticates any user who enters the correct password (case sensitive): Go JAAS.
The HelloWorld application permits users three attempts to do so. When Go JAAS is correctly entered, an
HWPrincipalwith a name equal the the username is added to the authenticated
Subject.
The Principal class,
HWPrincipal, represents a Principal based on the username entered. It is this name that is important when granting permissions to authenticated Subjects.
The main application,
HelloWorld, first creates a
LoginContextbased on a configuration entry with the name helloWorld. The configuration file has already been discussed. Callbacks are used to retrieve user input. Look at the
MyCallbackHandlerclass located in the HelloWorld.java file to see this process.
LoginContext lc = null; try { lc = new LoginContext("helloWorld", new MyCallbackHandler()); } catch (LoginException le) { le.printStackTrace(); System.exit(-1); }The user enters a username/password (up to three times) and if Go JAAS is entered as the password, then the Subject is authenticated (
HWLoginModuleadds a
HWPrincipalto the Subject).
As mentioned previously, work is then performed as the authenticated Subject.
Run HelloWorld Test
To run the HelloWorld program, first change to the test directory. The configuration and policy files will need to be loaded. See Implementation for the correct properties to set either in java.security or on the command line. The latter method will be discussed here.
The following command has been broken up into several lines for clarity. Enter as one continuous command.
java -Djava.security.manager= -Djava.security.auth.login.config=.\jaas.config -Djava.security.policy=.\java2.policy -Djava.security.auth.policy=.\jaas.policy HelloWorldNote: the use of ".\filename" for the policy files is necessary because each user's test directory canonical path will vary. If desired, substitute "." with the path to the test directory. For example, if the test directory is "c:\test\hello", then the first file is changed to:
-Djava.security.auth.login.config=c:\test\hello\jaas.configIf the policy files are not found, a
SecurityExceptionwill be thrown. Otherwise, information concerning your java.home and user.home properties will be displayed. Also, the existence of a file called foo.txt in your test directory will be checked. Finally, the ubiquitous "Hello World" message is displayed.
Having Fun With HelloWorld
Rerun HelloWorld as many times as you like. It has already been suggested to vary the username/passwords entered, change the configuration file entries, change the policy file permissions, and to even add (stack) additional LoginModules to the helloWorld configuration entry. You could add codebase fields to the policy files too.
Finally, try running the program without a SecurityManager to see how it works if you run into problems.
Below is a copy of the
java.securityfile that appears in every Java 2 installation. This file appears in the
lib/security(
lib\securityon Windows®) directory of the Java 2 runtime. Thus, if the Java 2 runtime is installed in a directory called
jdk1.3, the file is
jdk1.3/lib/security/java.security(Unix)
jdk1.3\lib\security\java.security(Windows)
java.security:
login.configuration.provider
login.policy.url.n
auth.policy.provider
auth.policy.url.n
The new JAAS properties are located at the end of this file:
# # This is the "master security properties file". # # In this file, various security properties are set for use by # java.security classes. This is where users can statically register # Cryptography Package Providers ("providers" for short). The term # "provider" refers to a package or set of packages that supply a # concrete implementation of a subset of the cryptography aspects of # the Java Security API. A provider may, for example, implement one or # more digital signature algorithms or message digest algorithms. # # Each provider must implement a subclass of the Provider class. # To register a provider in this master security properties file, # specify the Provider subclass name and priority in the format # # security.provider.n=className # # This declares a provider, and specifies its preference # order n. The preference order is the order in which providers are # searched for requested algorithms (when no specific provider is # requested). The order is 1-based; 1 is the most preferred, followed # by 2, and so on. # # className must specify the subclass of the Provider class whose # constructor sets the values of various properties that are required # for the Java Security API to look up the algorithms or other # facilities implemented by the provider. # # There must be at least one provider specification in java.security. # There is a default provider that comes standard with the JDK. It # is called the "SUN" provider, and its Provider subclass # named Sun appears in the sun.security.provider package. Thus, the # "SUN" provider is registered via the following: # # security.provider.1=sun.security.provider.Sun # # (The number 1 is used for the default provider.) # # Note: Statically registered Provider subclasses are instantiated # when the system is initialized. Providers can be dynamically # registered instead by calls to either the addProvider or # insertProviderAt method in the Security class. # # List of providers and their preference orders (see above): # security.provider.1=sun.security.provider.Sun # # Class to instantiate as the system Policy. This is the name of the class # that will be used as the Policy object. # policy.provider=sun.security.provider.PolicyFile # The default is to have a single system-wide policy file, # and a policy file in the user's home directory. policy.url.1=file:${java.home}/lib/security/java.policy policy.url.2=file:${user.home}/.java.policy # whether or not we expand properties in the policy file # if this is set to false, properties (${...}) will not be expanded in policy # files. policy.expandProperties=true # whether or not we allow an extra policy to be passed on the command line # with -Djava.security.policy=somefile. Comment out this line to disable # this feature. policy.allowSystemProperty=true # whether or not we look into the IdentityScope for trusted Identities # when encountering a 1.1 signed JAR file. If the identity is found # and is trusted, we grant it AllPermission. policy.ignoreIdentityScope=false # # Default keystore type. # keystore.type=jks # # Class to instantiate as the system scope: # system.scope=sun.security.provider.IdentityDatabase ############################################################################## # # Java Authentication and Authorization Service (JAAS) # properties and policy files: # # Class to instantiate as the system Configuration for authentication. # This is the name of the class that will be used as the Authentication # Configuration object. # login.configuration.provider=com.ibm.security.auth.login.ConfigFile # The default is to have a system-wide login configuration file found in # the user's home directory. For multiple files, the format is similar to # that of CodeSource-base policy files above, that is policy.url.n login.config.url.1=file:${user.home}/.java.login.config # Class to instantiate as the system Principal-based Authorization Policy. # This is the name of the class that will be used as the Authorization # Policy object. # auth.policy.provider=com.ibm.security.auth.PolicyFile # The default is to have a system-wide Principal-based policy file found in # the user's home directory. For multiple files, the format is similar to # that of CodeSource-base policy files above, that is policy.url.n and # auth.policy.url.n auth.policy.url.1=file:${user.home}/.java.auth.policy
LoginContextapplication names which have the following form:
Application { LoginModule Flag ModuleOptions; > more LoginModule entries < LoginModule Flag ModuleOptions; };Login configuration files are located using the
login.config.url.nsecurity property found in the
java.securityfile. For more information about this property and the location of the
java.securityfile, see Appendix A.
The Flag value controls the overall behavior as authentication proceeds down the stack. The following represents a description of the valid values for Flag and their respective semantics:
LoginModuleis required to succeed. If it succeeds or fails, authentication still continues to proceed down the
LoginModulelist.
LoginModuleis required to succeed. If it succeeds, authentication continues down the
LoginModulelist. If it fails, control immediately returns to the application (authentication does not proceed down the
LoginModulelist).
LoginModuleis not required to succeed. If it does succeed, control immediately returns to the application (authentication does not proceed down the
LoginModulelist). If it fails, authentication continues down the
LoginModulelist.
LoginModuleis not required to succeed. If it succeeds or fails, authentication still continues to proceed down the
LoginModulelist.
The overall authentication succeeds only if all Required and Requisite LoginModules succeed. If a Sufficient
LoginModuleis configured and succeeds, then only the Required and Requisite LoginModules prior to that Sufficient
LoginModuleneed to have succeeded for the overall authentication to succeed. If no Required or Requisite LoginModules are configured for an application, then at least one Sufficient or Optional
LoginModulemust succeed.
Sample Configuration File:
/* Sample Configuration File */ Login1 { com.ibm.security.auth.module.SampleLoginModule required debug=true; }; Login2 { com.ibm.security.auth.module.SampleLoginModule required; com.ibm.security.auth.module.NTLoginModule sufficient; ibm.loginModules.SmartCard requisite debug=true; ibm.loginModules.Kerberos optional debug=true; };Note: the Flags are not case sensitive. REQUISITE = requisite = Requisite.
Login1 only has one LoginModule which is an instance of the class
com.ibm.security.auth.module.SampleLoginModule. Therefore, a
LoginContextassociated with Login1 will have a successful authentication if and only if its lone module successfully authenticates. The Required flag is trivial in this example; flag values have a relevant effect on authentication when two or more modules are present.
Login2 is easier to explain with a table.
Login2 Authentication Status | |||||||||
---|---|---|---|---|---|---|---|---|---|
Sample Login Module | required | pass | pass | pass | pass | fail | fail | fail | fail |
NT Login Module | sufficient | pass | fail | fail | fail | pass | fail | fail | fail |
Smart Card | requisite | * | pass | pass | fail | * | pass | pass | fail |
Kerberos | optional | * | pass | fail | * | * | pass | fail | * |
Overall Authentication | pass | pass | pass | fail | fail | fail | fail | fail |
In case there weren't enough examples of Principal-based JAAS Policy grant blocks above, here are some more.
// SAMPLE JAAS POLICY FILE: java.auth.policy // The following permissions are granted to Principal 'Pooh' and all codesource: grant Principal com.ibm.security.Principal "Pooh" { permission javax.security.auth.AuthPermission "setPolicy"; permission java.util.PropertyPermission "java.home", "read"; permission java.util.PropertyPermission "user.home", "read"; permission java.io.FilePermission "c:/foo/jaas.txt", "read"; }; // The following permissions are granted to Principal 'Pooh' AND 'Eyeore' // and CodeSource signedBy "DrSecure": grant signedBy "DrSecure" Principal com.ibm.security.Principal "Pooh", Principal com.ibm.security.Principal "Eyeore" { permission javax.security.auth.AuthPermission "modifyPublicCredentials"; permission javax.security.auth.AuthPermission "modifyPrivateCredentials"; permission java.net.SocketPermission "us.ibm.com", "connect,accept,resolve"; permission java.net.SocketPermission "griffin.ibm.com", "accept"; }; // The following permissions are granted to Principal 'Pooh' AND 'Eyeore' AND // 'Piglet' and CodeSource from the c:\jaas directory signed by "kent" and "bruce": grant codeBase "file:c:/jaas/*", signedBy "kent, bruce", Principal com.ibm.security.Principal "Pooh", Principal com.ibm.security.Principal "Eyeore", Principal com.ibm.security.Principal "Piglet" { permission javax.security.auth.AuthPermission "getSubject"; permission java.security.SecurityPermission "printIdentity"; permission java.net.SocketPermission "guapo.ibm.com", "accept"; };