use of com.sun.identity.authentication.spi.AuthLoginException in project OpenAM by OpenRock.
the class DataStore method process.
public int process(Callback[] callbacks, int state) throws AuthLoginException {
currentState = state;
int retVal = 0;
Callback[] idCallbacks = new Callback[2];
try {
if (currentState == ISAuthConstants.LOGIN_START) {
if (callbacks != null && callbacks.length == 0) {
userName = (String) sharedState.get(getUserKey());
userPassword = (String) sharedState.get(getPwdKey());
if (userName == null || userPassword == null) {
return ISAuthConstants.LOGIN_START;
}
NameCallback nameCallback = new NameCallback("dummy");
nameCallback.setName(userName);
idCallbacks[0] = nameCallback;
PasswordCallback passwordCallback = new PasswordCallback("dummy", false);
passwordCallback.setPassword(userPassword.toCharArray());
idCallbacks[1] = passwordCallback;
} else {
idCallbacks = callbacks;
//callbacks is not null
userName = ((NameCallback) callbacks[0]).getName();
char[] password = ((PasswordCallback) callbacks[1]).getPassword();
userPassword = password == null ? null : String.valueOf(password);
}
if (userName == null) {
debug.message("DataStore.process: Username is null/empty");
throw new UserNamePasswordValidationException("amAuth", "InvalidUP", null);
}
if (userPassword == null || userPassword.length() == 0) {
debug.message("DataStore.process: Password is null/empty");
throw new InvalidPasswordException("amAuth", "invalidPasswd", null);
}
//store username password both in success and failure case
storeUsernamePasswd(userName, userPassword);
/*
Fix for OPENAM-1872. Reject usernames with illegal characters (e.g. * or ! or ) or ( or & ), just
like the LDAP LoginModule does. List of invalid characters comes from a new configuration entry (though
the list of illegal characters does not seem to be processed in validateUserName). I want the invocation
to be just like the LDAP LoginModule, and to handle the case in which the username format validator
cannot be successfully loaded in validateUserName.
*/
validateUserName(userName, CollectionHelper.getMapAttr(currentConfig, INVALID_CHARS));
AMIdentityRepository idrepo = getAMIdentityRepository(getRequestOrg());
boolean success = idrepo.authenticate(idCallbacks);
if (success) {
retVal = ISAuthConstants.LOGIN_SUCCEED;
validatedUserID = userName;
} else {
throw new AuthLoginException(amAuthDataStore, "authFailed", null);
}
} else {
setFailureID(userName);
throw new AuthLoginException(amAuthDataStore, "authFailed", null);
}
} catch (IdRepoException ex) {
debug.message("idRepo Exception");
setFailureID(userName);
throw new AuthLoginException(amAuthDataStore, "authFailed", null, ex);
}
return retVal;
}
use of com.sun.identity.authentication.spi.AuthLoginException in project OpenAM by OpenRock.
the class Adaptive method init.
@Override
public void init(Subject subject, Map sharedState, Map options) {
postAuthNMap = new HashMap<String, String>();
String authLevel = CollectionHelper.getMapAttr(options, AUTHLEVEL);
if (authLevel != null) {
try {
setAuthLevel(Integer.parseInt(authLevel));
} catch (Exception e) {
debug.error("{}.init : Unable to set auth level {}", ADAPTIVE, authLevel, e);
}
}
Locale locale = getLoginLocale();
initParams(options);
try {
userName = (String) sharedState.get(getUserKey());
} catch (Exception e) {
debug.error("{}.init : Unable to set userName", ADAPTIVE, e);
}
try {
userSearchAttributes = getUserAliasList();
} catch (final AuthLoginException ale) {
debug.warning("{}.init: unable to retrieve search attributes", ADAPTIVE, ale);
}
if (debug.messageEnabled()) {
debug.message("{}.init : resbundle locale={}, user search attributes={}", ADAPTIVE, locale, userSearchAttributes);
}
}
use of com.sun.identity.authentication.spi.AuthLoginException in project OpenAM by OpenRock.
the class Anonymous method processAnonUser.
private boolean processAnonUser(String usernameParam) throws AuthLoginException {
if (usernameParam == null || usernameParam.length() == 0) {
debug.message("User Name entered is either NULL or Empty");
if (useSharedstate) {
return false;
}
throw new AuthLoginException(amAuthAnonymous, "UserError", null);
} else if (usernameParam.equalsIgnoreCase(defaultAnonUser)) {
debug.message("User Type: default Anon User");
if (isCaseSensitive && !usernameParam.equals(defaultAnonUser)) {
if (useSharedstate) {
return false;
}
setFailureID(usernameParam);
throw new AuthLoginException(amAuthAnonymous, "AnonValidateEx", null);
}
userTokenId = usernameParam;
} else if (validAnonUsernames != null && isValidAnonUserName()) {
debug.message("user is in anonymoususer's list");
debug.message("UserType: non default Anon User");
userTokenId = usernameParam;
} else {
if (useSharedstate) {
return false;
}
setFailureID(usernameParam);
throw new AuthLoginException(amAuthAnonymous, "AnonValidateEx", null);
}
return true;
}
use of com.sun.identity.authentication.spi.AuthLoginException in project OpenAM by OpenRock.
the class Anonymous method sendCallback.
private String sendCallback() throws AuthLoginException {
if (callbackHandler == null) {
throw new AuthLoginException(amAuthAnonymous, "NoCallbackHandler", null);
}
String username = null;
try {
Callback[] callbacks = new Callback[2];
String header = bundle.getString("moduleHeader");
PagePropertiesCallback ppc = new PagePropertiesCallback(null, header, null, 0, null, false, null);
callbacks[0] = ppc;
callbacks[1] = new NameCallback(bundle.getString("username"));
if (debug.messageEnabled()) {
debug.message("Callback 0 is.. :" + callbacks[0]);
debug.message("Callback 1 is.. :" + callbacks[1]);
}
callbackHandler.handle(callbacks);
username = ((NameCallback) callbacks[1]).getName();
return username;
} catch (IllegalArgumentException ill) {
debug.message("message type missing");
throw new AuthLoginException(amAuthAnonymous, "IllegalArgs", null);
} catch (java.io.IOException ioe) {
throw new AuthLoginException(ioe);
} catch (UnsupportedCallbackException uce) {
throw new AuthLoginException(amAuthAnonymous, "NoCallbackHandler", null);
}
}
use of com.sun.identity.authentication.spi.AuthLoginException in project OpenAM by OpenRock.
the class Cert method setLdapStoreParam.
private void setLdapStoreParam() throws AuthLoginException {
/*
* Setup the LDAP certificate directory service context for
* use in verification of the users certificates.
*/
try {
ldapParam = AMCertStore.setLdapStoreParam(amAuthCert_serverHost, amAuthCert_serverPort, amAuthCert_principleUser, amAuthCert_principlePasswd, amAuthCert_startSearchLoc, amAuthCert_uriParamsCRL, amAuthCert_useSSL.equalsIgnoreCase("true"));
ldapParam.setDoCRLCaching(doCRLCaching);
ldapParam.setDoCRLUpdate(doCRLUpdate);
} catch (Exception e) {
debug.error("validate.SSLSocketFactory", e);
setFailureID(userTokenId);
throw new AuthLoginException(amAuthCert, "sslSokFactoryFail", null);
}
return;
}
Aggregations