public final class DefaultController extends Base implements AccessController
Note: The DefaultController requires only a read access to the keystore file, and does not check the integrity of the keystore. The modifications to the keystore at a file system level as well as by the keystore tool (which requires a keystore password) must be controlled by external means (OS user management, ACL, etc.)
Base.LoggingWriter, Base.StackFrame
Modifier and Type | Field and Description |
---|---|
static String |
KEYSTORE_TYPE
KeyStore type used by this implementation.
|
static String |
PROPERTY_CONFIG
The name of the system property that can be used to override the
location of the DefaultController configuration file.
|
static String |
SIGNATURE_ALGORITHM
Digital signature algorithm used by this implementation.
|
static Signature |
SIGNATURE_ENGINE
The Signature object used by this implementation.
|
Constructor and Description |
---|
DefaultController(File fileKeyStore,
File filePermits)
Construct DefaultController for the specified key store file
and permissions description (XML) file.
|
DefaultController(File fileKeyStore,
File filePermits,
boolean fAudit)
Construct DefaultController for the specified key store file,
permissions description (XML) file and the audit flag.
|
DefaultController(File fileKeyStore,
File filePermits,
boolean fAudit,
String sPwd)
Construct DefaultController for the specified key store file,
permissions description (XML) file, the audit flag, and key store password.
|
Modifier and Type | Method and Description |
---|---|
void |
checkPermission(ClusterPermission permission,
Subject subject)
Determine whether the cluster access request indicated by the
specified permission should be allowed or denied for a given
Subject (requestor).
|
protected Object |
decrypt(SignedObject so,
PublicKey keyPublic)
Decrypt the specified SignedObject using the specified public key.
|
Object |
decrypt(SignedObject so,
Subject subjEncryptor,
Subject subjDecryptor)
Decrypt the specified SignedObject using the public credentials for a
given encryptor Subject in a context represented by the decryptor
Subject which is usually associated with the current thread.
|
SignedObject |
encrypt(Object o,
Subject subjEncryptor)
Encrypt the specified object using the private credentials for the
given Subject (encryptor), which is usually associated with the
current thread.
|
protected SignedObject |
encrypt(Serializable o,
PrivateKey keyPrivate)
Encrypt the specified object using the specified private key.
|
protected boolean |
equalsMostly(Subject subject1,
Subject subject2)
Check whether the specified Subject objects have the same set of
principals and public credentials.
|
protected Set |
extractCertificates(Set setPubCreds)
Extract a set of Certificate objects from the set of public credentials.
|
protected Set |
extractPublicKeys(Set setPubCreds)
Extract a set of PublicKeys from the set of public credentials.
|
protected Set |
findPublicKeys(Subject subject)
Find a set of public keys for the specified Subject.
|
protected Permissions |
getClusterPermissions(Principal principal)
Obtain the permissions for the specified principal.
|
XmlElement |
getPermissionsConfig()
Obtain the permission configuration descriptor.
|
protected void |
logPermissionRequest(ClusterPermission permission,
Subject subject,
boolean fAllowed)
Log the authorization request.
|
static void |
main(String[] asArg)
Standalone permission check utility.
|
azzert, azzert, azzert, azzertFailed, breakLines, breakLines, capitalize, checkNotEmpty, checkNotNull, checkRange, computeSafeWaitTime, decimalValue, dup, dup, ensureBigDecimal, ensureClassLoader, ensureRuntimeException, ensureRuntimeException, equals, equalsDeep, err, err, err, err, err, escape, formatDateTime, getCallerStackFrame, getCommonMonitor, getCommonMonitor, getCommonMonitor, getContextClassLoader, getContextClassLoader, getDeepMessage, getErr, getLastSafeTimeMillis, getLog, getMaxDecDigits, getMaxHexDigits, getOriginalException, getOut, getProcessRandom, getRandom, getRandomBinary, getRandomBinary, getRandomString, getSafeTimeMillis, getStackFrame, getStackFrames, getStackTrace, getStackTrace, getThreadFactory, getTimeZone, getUpTimeMillis, hashCode, hexValue, indentString, indentString, isDecimal, isHex, isLogEcho, isOctal, log, log, log, log, log, makeInteger, makeLong, makeThread, mod, mod, octalValue, out, out, out, out, out, pad, parseBandwidth, parseBandwidth, parseDelimitedString, parseHex, parseHex, parseMemorySize, parseMemorySize, parsePercentage, parseTime, parseTime, parseTimeNanos, parseTimeNanos, printStackTrace, randomize, randomize, randomize, randomize, read, read, read, read, read, read, read, replace, setErr, setLog, setLogEcho, setOut, sleep, toBandwidthString, toBandwidthString, toCharEscape, toCrc, toCrc, toCrc, toCrc, toCrc, toDecString, toDelimitedString, toDelimitedString, toDelimitedString, toDelimitedString, toHex, toHex, toHexDump, toHexEscape, toHexEscape, toHexEscape, toHexEscape, toHexString, toMemorySizeString, toMemorySizeString, toQuotedCharEscape, toQuotedStringEscape, toSqlString, toString, toString, toStringEscape, toUnicodeEscape, trace, trace, trace, trace, trace, trace, trace, trace, trace, truncateString, truncateString, wait
public static final String PROPERTY_CONFIG
The value of this property must be the name of a resource that contains an XML document with the structure defined in the /com/tangosol/net/security/DefaultController.xml configuration descriptor.
public static final String KEYSTORE_TYPE
public static final String SIGNATURE_ALGORITHM
public static final Signature SIGNATURE_ENGINE
public DefaultController(File fileKeyStore, File filePermits) throws IOException, AccessControlException
fileKeyStore
- the key storefilePermits
- the permissions fileIOException
- if an I/O error occursAccessControlException
- if an access control error occurspublic DefaultController(File fileKeyStore, File filePermits, boolean fAudit) throws IOException, AccessControlException
fileKeyStore
- the key storefilePermits
- the permissions filefAudit
- the audit flag; if true, log all the access requestsIOException
- if an I/O error occursAccessControlException
- if an access control error occurspublic DefaultController(File fileKeyStore, File filePermits, boolean fAudit, String sPwd) throws IOException, AccessControlException
fileKeyStore
- the key storefilePermits
- the permissions filefAudit
- the audit flag; if true, log all the access requestssPwd
- the key store passwordIOException
- if an I/O error occursAccessControlException
- if an access control error occurspublic void checkPermission(ClusterPermission permission, Subject subject)
This method quietly returns if the access request is permitted, or throws a suitable AccessControlException if the specified authentication is invalid or insufficient.
checkPermission
in interface AccessController
permission
- the permission object that represents access
to a clustered resourcesubject
- the Subject object representing the requestorAccessControlException
- if the specified permission
is not permitted, based on the current security policypublic SignedObject encrypt(Object o, Subject subjEncryptor) throws IOException, GeneralSecurityException
encrypt
in interface AccessController
o
- the Object to encryptsubjEncryptor
- the Subject object whose credentials are being
used to do the encryptionIOException
- if an error occurs during serializationGeneralSecurityException
- if the signing failspublic Object decrypt(SignedObject so, Subject subjEncryptor, Subject subjDecryptor) throws ClassNotFoundException, IOException, GeneralSecurityException
decrypt
in interface AccessController
so
- the SignedObject to decryptsubjEncryptor
- the Subject object whose credentials were used
to do the encryptionsubjDecryptor
- the Subject object whose credentials might be
used to do the decryption (optional)ClassNotFoundException
- if a necessary class cannot be found
during deserializationIOException
- if an error occurs during deserializationGeneralSecurityException
- if the verification failspublic XmlElement getPermissionsConfig()
protected Permissions getClusterPermissions(Principal principal)
principal
- the Principal objectprotected SignedObject encrypt(Serializable o, PrivateKey keyPrivate) throws IOException, GeneralSecurityException
o
- the Serializable object to encryptkeyPrivate
- the PrivateKey object to use for encryptionIOException
- if an I/O error occursGeneralSecurityException
- if a security error occursprotected Object decrypt(SignedObject so, PublicKey keyPublic) throws ClassNotFoundException, IOException, GeneralSecurityException
so
- the SignedObject to decryptkeyPublic
- the PublicKey object to use for decryptionClassNotFoundException
- if the class of a de-serialized object could not be foundIOException
- if an I/O error occursGeneralSecurityException
- if a security error occursprotected boolean equalsMostly(Subject subject1, Subject subject2)
subject1
- a subjectsubject2
- the subject to be compared with subject1protected Set extractPublicKeys(Set setPubCreds)
setPubCreds
- set of public credentialsprotected Set extractCertificates(Set setPubCreds)
setPubCreds
- set of public credentialsprotected Set findPublicKeys(Subject subject) throws GeneralSecurityException
Note: We need to prevent a security hole when a caller would construct and send the responder a Subject object with a Principal object that have a high security clearance, but provide a valid certificate representing a low security clearance Principal. To deal with this after we find the caller's certificate in the key store, the principal match must be verified.
subject
- the Subject objectGeneralSecurityException
- if a keystore exception occursprotected void logPermissionRequest(ClusterPermission permission, Subject subject, boolean fAllowed)
permission
- the permission checkedsubject
- the SubjectfAllowed
- the boolean indicated whether it is allowedpublic static void main(String[] asArg) throws Exception
java com.tangosol.net.security DefaultController [-<option>]* <target> <action> where options include: -keystore:<keystore path> the path to the keystore -module:<name> the login module name -permits:<permits path> the path to permissions file -requestor:<name!password> the requestor's name/password pair -responder:<name!password> the responder's name/password pair
asArg
- the command line argumentsException
- if there is an error