Java tutorial
/* * eID Identity Provider Project. * Copyright (C) 2010 FedICT. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License version * 3.0 as published by the Free Software Foundation. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, see * http://www.gnu.org/licenses/. */ package be.fedict.eid.idp.model.applet; import java.security.cert.X509Certificate; import java.util.List; import javax.ejb.EJB; import javax.ejb.Local; import javax.ejb.Stateless; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.jboss.ejb3.annotation.LocalBinding; import be.fedict.eid.applet.service.spi.AuthenticationService; import be.fedict.eid.applet.service.spi.CertificateSecurityException; import be.fedict.eid.applet.service.spi.ExpiredCertificateSecurityException; import be.fedict.eid.applet.service.spi.RevokedCertificateSecurityException; import be.fedict.eid.applet.service.spi.TrustCertificateSecurityException; import be.fedict.eid.idp.entity.RPEntity; import be.fedict.eid.idp.model.ConfigProperty; import be.fedict.eid.idp.model.Configuration; import be.fedict.eid.idp.model.Constants; import be.fedict.trust.client.XKMS2Client; import be.fedict.trust.client.exception.ValidationFailedException; import be.fedict.trust.xkms2.XKMSConstants; /** * eID Applet Service Authentication Service implementation. * * @author Frank Cornelis */ @Stateless @Local(AuthenticationService.class) @LocalBinding(jndiBinding = Constants.IDP_JNDI_CONTEXT + "AuthenticationServiceBean") public class AuthenticationServiceBean implements AuthenticationService { private static final Log LOG = LogFactory.getLog(AuthenticationServiceBean.class); @EJB private Configuration configuration; public void validateCertificateChain(List<X509Certificate> certificateChain) throws SecurityException { LOG.debug("validate certificate: " + certificateChain.get(0).getSubjectX500Principal()); String xkmsUrl = this.configuration.getValue(ConfigProperty.XKMS_URL, String.class); if (null == xkmsUrl || xkmsUrl.trim().isEmpty()) { LOG.warn("no XKMS URL configured!"); return; } RPEntity rp = AppletUtil.getSessionAttribute(Constants.RP_SESSION_ATTRIBUTE); String xkmsTrustDomain = null; if (null != rp) { xkmsTrustDomain = rp.getAuthnTrustDomain(); } if (null == xkmsTrustDomain || xkmsTrustDomain.trim().isEmpty()) { xkmsTrustDomain = this.configuration.getValue(ConfigProperty.XKMS_AUTH_TRUST_DOMAIN, String.class); } if (null != xkmsTrustDomain) { if (xkmsTrustDomain.trim().isEmpty()) { xkmsTrustDomain = null; } } LOG.debug("Trust domain=" + xkmsTrustDomain); XKMS2Client xkms2Client = new XKMS2Client(xkmsUrl); Boolean useHttpProxy = this.configuration.getValue(ConfigProperty.HTTP_PROXY_ENABLED, Boolean.class); if (null != useHttpProxy && useHttpProxy) { String httpProxyHost = this.configuration.getValue(ConfigProperty.HTTP_PROXY_HOST, String.class); int httpProxyPort = this.configuration.getValue(ConfigProperty.HTTP_PROXY_PORT, Integer.class); LOG.debug("use proxy: " + httpProxyHost + ":" + httpProxyPort); xkms2Client.setProxy(httpProxyHost, httpProxyPort); } else { // disable previously set proxy xkms2Client.setProxy(null, 0); } try { LOG.debug("validating certificate chain"); if (null != xkmsTrustDomain) { xkms2Client.validate(xkmsTrustDomain, certificateChain); } else { xkms2Client.validate(certificateChain); } } catch (ValidationFailedException e) { LOG.warn("invalid certificate: " + e.getMessage()); for (String reason : e.getReasons()) { if (reason.equals(XKMSConstants.KEY_BINDING_REASON_VALIDITY_INTERVAL_URI)) { throw new ExpiredCertificateSecurityException(); } else if (reason.equals(XKMSConstants.KEY_BINDING_REASON_REVOCATION_STATUS_URI)) { throw new RevokedCertificateSecurityException(); } else if (reason.equals(XKMSConstants.KEY_BINDING_REASON_ISSUER_TRUST_URI)) { throw new TrustCertificateSecurityException(); } else { throw new CertificateSecurityException(); } } throw new SecurityException("invalid certificate"); } catch (Exception e) { LOG.warn("eID Trust Service error: " + e.getMessage(), e); throw new SecurityException("eID Trust Service error"); } } public void setHttpSessionObject(Object sessionObject) { } }