Search in sources :

Example 1 with AbstractAuthorizeAdapter

use of org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter in project MaxKey by dromara.

the class FormBasedAuthorizeEndpoint method authorize.

@Operation(summary = "FormBased认证地址接口", description = "参数应用ID", method = "GET")
@RequestMapping("/authz/formbased/{id}")
public ModelAndView authorize(HttpServletRequest request, @PathVariable("id") String id) {
    AppsFormBasedDetails formBasedDetails = formBasedDetailsService.getAppDetails(id, true);
    _logger.debug("formBasedDetails {}", formBasedDetails);
    Apps application = getApp(id);
    formBasedDetails.setAdapter(application.getAdapter());
    formBasedDetails.setIsAdapter(application.getIsAdapter());
    ModelAndView modelAndView = null;
    Accounts account = getAccounts(formBasedDetails);
    _logger.debug("Accounts {}", account);
    if (account == null) {
        return generateInitCredentialModelAndView(id, "/authz/formbased/" + id);
    } else {
        modelAndView = new ModelAndView();
        AbstractAuthorizeAdapter adapter;
        if (ConstsBoolean.isTrue(formBasedDetails.getIsAdapter())) {
            Object formBasedAdapter = Instance.newInstance(formBasedDetails.getAdapter());
            adapter = (AbstractAuthorizeAdapter) formBasedAdapter;
        } else {
            FormBasedDefaultAdapter formBasedDefaultAdapter = new FormBasedDefaultAdapter();
            adapter = (AbstractAuthorizeAdapter) formBasedDefaultAdapter;
        }
        adapter.setAuthentication((SigninPrincipal) WebContext.getAuthentication().getPrincipal());
        adapter.setUserInfo(WebContext.getUserInfo());
        adapter.setApp(formBasedDetails);
        adapter.setAccount(account);
        modelAndView = adapter.authorize(modelAndView);
    }
    _logger.debug("FormBased View Name {}", modelAndView.getViewName());
    return modelAndView;
}
Also used : AbstractAuthorizeAdapter(org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter) FormBasedDefaultAdapter(org.maxkey.authz.formbased.endpoint.adapter.FormBasedDefaultAdapter) AppsFormBasedDetails(org.maxkey.entity.apps.AppsFormBasedDetails) ModelAndView(org.springframework.web.servlet.ModelAndView) Apps(org.maxkey.entity.apps.Apps) Accounts(org.maxkey.entity.Accounts) Operation(io.swagger.v3.oas.annotations.Operation) RequestMapping(org.springframework.web.bind.annotation.RequestMapping)

Example 2 with AbstractAuthorizeAdapter

use of org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter in project MaxKey by dromara.

the class JwtAuthorizeEndpoint method authorize.

@Operation(summary = "JWT应用ID认证接口", description = "应用ID", method = "GET")
@RequestMapping("/authz/jwt/{id}")
public ModelAndView authorize(HttpServletRequest request, HttpServletResponse response, @PathVariable("id") String id) {
    ModelAndView modelAndView = new ModelAndView();
    Apps application = getApp(id);
    AppsJwtDetails jwtDetails = jwtDetailsService.getAppDetails(id, true);
    _logger.debug("" + jwtDetails);
    jwtDetails.setAdapter(application.getAdapter());
    jwtDetails.setIsAdapter(application.getIsAdapter());
    AbstractAuthorizeAdapter adapter;
    if (ConstsBoolean.isTrue(jwtDetails.getIsAdapter())) {
        Object jwtAdapter = Instance.newInstance(jwtDetails.getAdapter());
        try {
            BeanUtils.setProperty(jwtAdapter, "jwtDetails", jwtDetails);
        } catch (IllegalAccessException | InvocationTargetException e) {
            _logger.error("setProperty error . ", e);
        }
        adapter = (AbstractAuthorizeAdapter) jwtAdapter;
    } else {
        JwtAdapter jwtAdapter = new JwtAdapter(jwtDetails);
        adapter = (AbstractAuthorizeAdapter) jwtAdapter;
    }
    adapter.setAuthentication((SigninPrincipal) WebContext.getAuthentication().getPrincipal());
    adapter.setUserInfo(WebContext.getUserInfo());
    adapter.generateInfo();
    // sign
    adapter.sign(null, jwtDetails.getSignatureKey(), jwtDetails.getSignature());
    // encrypt
    adapter.encrypt(null, jwtDetails.getAlgorithmKey(), jwtDetails.getAlgorithm());
    if (jwtDetails.getTokenType().equalsIgnoreCase("POST")) {
        return adapter.authorize(modelAndView);
    } else {
        _logger.debug("Cookie Name : {}", jwtDetails.getJwtName());
        Cookie cookie = new Cookie(jwtDetails.getJwtName(), adapter.serialize());
        Integer maxAge = jwtDetails.getExpires();
        _logger.debug("Cookie Max Age : {} seconds.", maxAge);
        cookie.setMaxAge(maxAge);
        cookie.setPath("/");
        // 
        // cookie.setDomain("."+applicationConfig.getBaseDomainName());
        // tomcat 8.5
        cookie.setDomain(applicationConfig.getBaseDomainName());
        _logger.debug("Sub Domain Name : .{}", applicationConfig.getBaseDomainName());
        response.addCookie(cookie);
        if (jwtDetails.getRedirectUri().indexOf(applicationConfig.getBaseDomainName()) > -1) {
            return WebContext.redirect(jwtDetails.getRedirectUri());
        } else {
            _logger.error(jwtDetails.getRedirectUri() + " not in domain " + applicationConfig.getBaseDomainName());
            return null;
        }
    }
}
Also used : AbstractAuthorizeAdapter(org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter) Cookie(javax.servlet.http.Cookie) AppsJwtDetails(org.maxkey.entity.apps.AppsJwtDetails) ModelAndView(org.springframework.web.servlet.ModelAndView) Apps(org.maxkey.entity.apps.Apps) InvocationTargetException(java.lang.reflect.InvocationTargetException) JwtAdapter(org.maxkey.authz.jwt.endpoint.adapter.JwtAdapter) Operation(io.swagger.v3.oas.annotations.Operation) RequestMapping(org.springframework.web.bind.annotation.RequestMapping)

Example 3 with AbstractAuthorizeAdapter

use of org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter in project MaxKey by dromara.

the class ExtendApiAuthorizeEndpoint method authorize.

@Operation(summary = "ExtendApi认证地址接口", description = "参数应用ID", method = "GET")
@RequestMapping("/authz/api/{id}")
public ModelAndView authorize(HttpServletRequest request, @PathVariable("id") String id) {
    ModelAndView modelAndView = new ModelAndView("authorize/redirect_sso_submit");
    Apps apps = getApp(id);
    _logger.debug("" + apps);
    if (ConstsBoolean.isTrue(apps.getIsAdapter())) {
        AbstractAuthorizeAdapter adapter = (AbstractAuthorizeAdapter) Instance.newInstance(apps.getAdapter());
        Accounts account = getAccounts(apps);
        if (apps.getCredential() == Apps.CREDENTIALS.USER_DEFINED && account == null) {
            return generateInitCredentialModelAndView(id, "/authorize/api/" + id);
        }
        adapter.setAuthentication((SigninPrincipal) WebContext.getAuthentication().getPrincipal());
        adapter.setUserInfo(WebContext.getUserInfo());
        adapter.setApp(apps);
        adapter.setAccount(account);
        return adapter.authorize(modelAndView);
    } else {
        modelAndView.addObject("redirect_uri", apps.getLoginUrl());
        return modelAndView;
    }
}
Also used : AbstractAuthorizeAdapter(org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter) ModelAndView(org.springframework.web.servlet.ModelAndView) Apps(org.maxkey.entity.apps.Apps) Accounts(org.maxkey.entity.Accounts) Operation(io.swagger.v3.oas.annotations.Operation) RequestMapping(org.springframework.web.bind.annotation.RequestMapping)

Example 4 with AbstractAuthorizeAdapter

use of org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter in project MaxKey by dromara.

the class Cas20AuthorizeEndpoint method serviceValidate.

/**
 * @param request
 * @param response
 * @param ticket
 * @param service
 * @param pgtUrl
 * @param renew
 * @param format
 * @return
 *2.5. /serviceValidate [CAS 2.0]
 */serviceValidate checks the validity of a service ticket and returns an XML-fragment response. /serviceValidate MUST also generate and issue proxy-granting tickets when requested. /serviceValidate MUST NOT return a successful authentication if it receives a proxy ticket. It is RECOMMENDED that if /serviceValidate receives a proxy ticket, the error message in the XML response SHOULD explain that validation failed because a proxy ticket was passed to /serviceValidate.
 *
 *2.5.1. parameters
 *The following HTTP request parameters MAY be specified to /serviceValidate. They are case sensitive and MUST all be handled by /serviceValidate.
 *
 *service [REQUIRED] - the identifier of the service for which the ticket was issued, as discussed in Section 2.2.1. As a HTTP request parameter, the service value MUST be URL-encoded as described in Section 2.2 of RFC 1738 [4].
 *
 *Note: It is STRONGLY RECOMMENDED that all service urls be filtered via the service management tool, such that only authorized and known client applications would be able to use the CAS server. Leaving the service management tool open to allow lenient access to all applications will potentially increase the risk of service attacks and other security vulnerabilities. Furthermore, it is RECOMMENDED that only secure protocols such as https be allowed for client applications for further strengthen the authenticating client.
 *
 *ticket [REQUIRED] - the service ticket issued by /login. Service tickets are described in Section 3.1.
 *
 *pgtUrl [OPTIONAL] - the URL of the proxy callback. Discussed in Section 2.5.4. As a HTTP request parameter, the ��pgtUrl�� value MUST be URL-encoded as described in Section 2.2 of RFC 1738 [4].
 *
 *renew [OPTIONAL] - if this parameter is set, ticket validation will only succeed if the service ticket was issued from the presentation of the user��s primary credentials. It will fail if the ticket was issued from a single sign-on session.
 *
 *format [OPTIONAL] - if this parameter is set, ticket validation response MUST be produced based on the parameter value. Supported values are XML and JSON. If this parameter is not set, the default XML format will be used. If the parameter value is not supported by the CAS server, an error code MUST be returned as is described in section 2.5.3.
 *
 *2.5.2. response
 * /serviceValidate will return an XML-formatted CAS serviceResponse as described in the XML schema in Appendix A. Below are example responses:
 *
 *	On ticket validation success:
 *		<cas:serviceResponse xmlns:cas="http://www.yale.edu/tp/cas">
 *		 <cas:authenticationSuccess>
 *		  <cas:user>username</cas:user>
 *		  <cas:proxyGrantingTicket>PGTIOU-84678-8a9d...</cas:proxyGrantingTicket>
 *		 </cas:authenticationSuccess>
 *		</cas:serviceResponse>
 *
 *		{
 *		  "serviceResponse" : {
 *		    "authenticationSuccess" : {
 *		      "user" : "username",
 *		      "proxyGrantingTicket" : "PGTIOU-84678-8a9d..."
 *		    }
 *		  }
 *		}
 *	On ticket validation failure:
 *		<cas:serviceResponse xmlns:cas="http://www.yale.edu/tp/cas">
 *		 <cas:authenticationFailure code="INVALID_TICKET">
 *		    Ticket ST-1856339-aA5Yuvrxzpv8Tau1cYQ7 not recognized
 *		  </cas:authenticationFailure>
 *		</cas:serviceResponse>
 *
 *		{
 *		  "serviceResponse" : {
 *		    "authenticationFailure" : {
 *		      "code" : "INVALID_TICKET",
 *		      "description" : "Ticket ST-1856339-aA5Yuvrxzpv8Tau1cYQ7 not recognized"
 *		    }
 *		  }
 *		}
 *
 *	Example response with custom attributes
 *		<cas:serviceResponse xmlns:cas="http://www.yale.edu/tp/cas">
 *		    <cas:authenticationSuccess>
 *		      <cas:user>username</cas:user>
 *		      <cas:attributes>
 *		        <cas:firstname>John</cas:firstname>
 *		        <cas:lastname>Doe</cas:lastname>
 *		        <cas:title>Mr.</cas:title>
 *		        <cas:email>jdoe@example.org</cas:email>
 *		        <cas:affiliation>staff</cas:affiliation>
 *		        <cas:affiliation>faculty</cas:affiliation>
 *		      </cas:attributes>
 *		      <cas:proxyGrantingTicket>PGTIOU-84678-8a9d...</cas:proxyGrantingTicket>
 *		    </cas:authenticationSuccess>
 *		  </cas:serviceResponse>
 *
 *		 {
 *		  "serviceResponse" : {
 *		    "authenticationSuccess" : {
 *		      "user" : "username",
 *		      "proxyGrantingTicket" : "PGTIOU-84678-8a9d...",
 *		      "proxies" : [ "https://proxy1/pgtUrl", "https://proxy2/pgtUrl" ],
 *		      "attributes" : {
 *		        "firstName" : "John",
 *		        "affiliation" : [ "staff", "faculty" ],
 *		        "title" : "Mr.",
 *		        "email" : "jdoe@example.orgmailto:jdoe@example.org",
 *		        "lastname" : "Doe"
 *		      }
 *		    }
 *		  }
 *		}
 *2.5.3. error codes
 *The following values MAY be used as the ��code�� attribute of authentication failure responses. The following is the minimum set of error codes that all CAS servers MUST implement. Implementations MAY include others.
 *
 *INVALID_REQUEST - not all of the required request parameters were present
 *
 *INVALID_TICKET_SPEC - failure to meet the requirements of validation specification
 *
 *UNAUTHORIZED_SERVICE_PROXY - the service is not authorized to perform proxy authentication
 *
 *INVALID_PROXY_CALLBACK - The proxy callback specified is invalid. The credentials specified for proxy authentication do not meet the security requirements
 *
 *INVALID_TICKET - the ticket provided was not valid, or the ticket did not come from an initial login and renew was set on validation. The body of the \<cas:authenticationFailure\> block of the XML response SHOULD describe the exact details.
 *
 *INVALID_SERVICE - the ticket provided was valid, but the service specified did not match the service associated with the ticket. CAS MUST invalidate the ticket and disallow future validation of that same ticket.
 *
 *INTERNAL_ERROR - an internal error occurred during ticket validation
 *
 *For all error codes, it is RECOMMENDED that CAS provide a more detailed message as the body of the \<cas:authenticationFailure\> block of the XML response.
 */
@Operation(summary = "CAS 2.0 ticket验证接口", description = "通过ticket获取当前登录用户信息", method = "POST")
@RequestMapping(value = CasConstants.ENDPOINT.ENDPOINT_SERVICE_VALIDATE, produces = MediaType.APPLICATION_XML_VALUE)
@ResponseBody
public String serviceValidate(HttpServletRequest request, HttpServletResponse response, @RequestParam(value = CasConstants.PARAMETER.TICKET) String ticket, @RequestParam(value = CasConstants.PARAMETER.SERVICE) String service, @RequestParam(value = CasConstants.PARAMETER.PROXY_CALLBACK_URL, required = false) String pgtUrl, @RequestParam(value = CasConstants.PARAMETER.RENEW, required = false) String renew, @RequestParam(value = CasConstants.PARAMETER.FORMAT, required = false, defaultValue = HttpResponseConstants.FORMAT_TYPE.XML) String format) {
    _logger.debug("serviceValidate " + " ticket " + ticket + " , service " + service + " , pgtUrl " + pgtUrl + " , renew " + renew + " , format " + format);
    Ticket storedTicket = null;
    if (ticket.startsWith(CasConstants.PREFIX.SERVICE_TICKET_PREFIX)) {
        try {
            storedTicket = ticketServices.consumeTicket(ticket);
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
    ServiceResponseBuilder serviceResponseBuilder = new ServiceResponseBuilder();
    if (storedTicket != null) {
        SigninPrincipal authentication = ((SigninPrincipal) storedTicket.getAuthentication().getPrincipal());
        if (StringUtils.isNotBlank(pgtUrl)) {
            ProxyGrantingTicketIOUImpl proxyGrantingTicketIOUImpl = new ProxyGrantingTicketIOUImpl();
            String proxyGrantingTicketIOU = casProxyGrantingTicketServices.createTicket(proxyGrantingTicketIOUImpl);
            ProxyGrantingTicketImpl proxyGrantingTicketImpl = new ProxyGrantingTicketImpl(storedTicket.getAuthentication(), storedTicket.getCasDetails());
            String proxyGrantingTicket = casProxyGrantingTicketServices.createTicket(proxyGrantingTicketImpl);
            serviceResponseBuilder.success().setTicket(proxyGrantingTicketIOU);
            serviceResponseBuilder.success().setProxy(pgtUrl);
            httpRequestAdapter.post(pgtUrl + "?pgtId=" + proxyGrantingTicket + "&pgtIou=" + proxyGrantingTicketIOU, null);
        }
        if (ConstsBoolean.isTrue(storedTicket.getCasDetails().getIsAdapter())) {
            Object samlAdapter = Instance.newInstance(storedTicket.getCasDetails().getAdapter());
            try {
                BeanUtils.setProperty(samlAdapter, "serviceResponseBuilder", serviceResponseBuilder);
            } catch (IllegalAccessException | InvocationTargetException e) {
                _logger.error("setProperty error . ", e);
            }
            UserInfo userInfo = (UserInfo) userInfoService.findByUsername(authentication.getUsername());
            AbstractAuthorizeAdapter adapter = (AbstractAuthorizeAdapter) samlAdapter;
            adapter.setAuthentication(authentication);
            adapter.setUserInfo(userInfo);
            adapter.setApp(storedTicket.getCasDetails());
            adapter.generateInfo();
        }
    } else {
        serviceResponseBuilder.failure().setCode(CasConstants.ERROR_CODE.INVALID_TICKET).setDescription("Ticket " + ticket + " not recognized");
    }
    return serviceResponseBuilder.serviceResponseBuilder();
}
Also used : AbstractAuthorizeAdapter(org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter) Ticket(org.maxkey.authz.cas.endpoint.ticket.Ticket) ProxyGrantingTicketIOUImpl(org.maxkey.authz.cas.endpoint.ticket.ProxyGrantingTicketIOUImpl) UserInfo(org.maxkey.entity.UserInfo) ServiceResponseBuilder(org.maxkey.authz.cas.endpoint.response.ServiceResponseBuilder) ProxyServiceResponseBuilder(org.maxkey.authz.cas.endpoint.response.ProxyServiceResponseBuilder) InvocationTargetException(java.lang.reflect.InvocationTargetException) InvocationTargetException(java.lang.reflect.InvocationTargetException) SigninPrincipal(org.maxkey.authn.SigninPrincipal) ProxyGrantingTicketImpl(org.maxkey.authz.cas.endpoint.ticket.ProxyGrantingTicketImpl) Operation(io.swagger.v3.oas.annotations.Operation) RequestMapping(org.springframework.web.bind.annotation.RequestMapping) ResponseBody(org.springframework.web.bind.annotation.ResponseBody)

Example 5 with AbstractAuthorizeAdapter

use of org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter in project MaxKey by dromara.

the class Cas20AuthorizeEndpoint method proxy.

/**
 * @param request
 * @param response
 * @param ticket
 * @param service
 * @param pgtUrl
 * @param renew
 * @return
 *2.6. /proxyValidate [CAS 2.0]
 */proxyValidate MUST perform the same validation tasks as /serviceValidate and additionally validate proxy tickets. /proxyValidate MUST be capable of validating both service tickets and proxy tickets. See Section 2.5.4 for details.
 *
 *2.6.1. parameters
 */proxyValidate has the same parameter requirements as /serviceValidate. See Section 2.5.1.
 *
 *2.6.2. response
 */proxyValidate will return an XML-formatted CAS serviceResponse as described in the XML schema in Appendix A. Below are example responses:
 *
 *Response on ticket validation success:
 *  <cas:serviceResponse xmlns:cas="http://www.yale.edu/tp/cas">
 *    <cas:authenticationSuccess>
 *      <cas:user>username</cas:user>
 *      <cas:proxyGrantingTicket>PGTIOU-84678-8a9d...</cas:proxyGrantingTicket>
 *      <cas:proxies>
 *        <cas:proxy>https://proxy2/pgtUrl</cas:proxy>
 *        <cas:proxy>https://proxy1/pgtUrl</cas:proxy>
 *      </cas:proxies>
 *    </cas:authenticationSuccess>
 *  </cas:serviceResponse>
 *
 *{
 *  "serviceResponse" : {
 *    "authenticationSuccess" : {
 *      "user" : "username",
 *      "proxyGrantingTicket" : "PGTIOU-84678-8a9d...",
 *      "proxies" : [ "https://proxy1/pgtUrl", "https://proxy2/pgtUrl" ]
 *    }
 *  }
 *}
 *
 *Note: when authentication has proceeded through multiple proxies, the order in which the proxies were traversed MUST be reflected in the <cas:proxies> block. The most recently-visited proxy MUST be the first proxy listed, and all the other proxies MUST be shifted down as new proxies are added. In the above example, the service identified by <https://proxy1/pgtUrl> was visited first, and that service proxied authentication to the service identified by <https://proxy2/pgtUrl>.
 *
 *Response on ticket validation failure:
 *
 *  <cas:serviceResponse xmlns:cas='http://www.yale.edu/tp/cas'>
 *      <cas:authenticationFailure code="INVALID_TICKET">
 *         ticket PT-1856376-1HMgO86Z2ZKeByc5XdYD not recognized
 *      </cas:authenticationFailure>
 *  </cas:serviceResponse>
 *
 *{
 *  "serviceResponse" : {
 *    "authenticationFailure" : {
 *      "code" : "INVALID_TICKET",
 *      "description" : "Ticket PT-1856339-aA5Yuvrxzpv8Tau1cYQ7 not recognized"
 *    }
 *  }
 *}
 */
@Operation(summary = "CAS 2.0 ticket代理验证接口", description = "通过ticket获取当前登录用户信息", method = "POST")
@RequestMapping(value = CasConstants.ENDPOINT.ENDPOINT_PROXY_VALIDATE, produces = MediaType.APPLICATION_XML_VALUE)
@ResponseBody
public String proxy(HttpServletRequest request, HttpServletResponse response, @RequestParam(value = CasConstants.PARAMETER.TICKET) String ticket, @RequestParam(value = CasConstants.PARAMETER.SERVICE) String service, @RequestParam(value = CasConstants.PARAMETER.PROXY_CALLBACK_URL, required = false) String pgtUrl, @RequestParam(value = CasConstants.PARAMETER.RENEW, required = false) String renew, @RequestParam(value = CasConstants.PARAMETER.FORMAT, required = false, defaultValue = HttpResponseConstants.FORMAT_TYPE.XML) String format) {
    _logger.debug("proxyValidate " + " ticket " + ticket + " , service " + service + " , pgtUrl " + pgtUrl + " , renew " + renew + " , format " + format);
    Ticket storedTicket = null;
    if (ticket.startsWith(CasConstants.PREFIX.PROXY_TICKET_PREFIX)) {
        try {
            storedTicket = ticketServices.consumeTicket(ticket);
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
    ServiceResponseBuilder serviceResponseBuilder = new ServiceResponseBuilder();
    if (storedTicket != null) {
        SigninPrincipal authentication = ((SigninPrincipal) storedTicket.getAuthentication().getPrincipal());
        if (ConstsBoolean.isTrue(storedTicket.getCasDetails().getIsAdapter())) {
            Object samlAdapter = Instance.newInstance(storedTicket.getCasDetails().getAdapter());
            try {
                BeanUtils.setProperty(samlAdapter, "serviceResponseBuilder", serviceResponseBuilder);
            } catch (IllegalAccessException | InvocationTargetException e) {
                _logger.error("setProperty error . ", e);
            }
            UserInfo userInfo = (UserInfo) userInfoService.findByUsername(authentication.getUsername());
            AbstractAuthorizeAdapter adapter = (AbstractAuthorizeAdapter) samlAdapter;
            adapter.setAuthentication(authentication);
            adapter.setUserInfo(userInfo);
            adapter.setApp(storedTicket.getCasDetails());
            adapter.generateInfo();
        }
    } else {
        serviceResponseBuilder.failure().setCode(CasConstants.ERROR_CODE.INVALID_TICKET).setDescription("Ticket " + ticket + " not recognized");
    }
    return serviceResponseBuilder.serviceResponseBuilder();
}
Also used : AbstractAuthorizeAdapter(org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter) Ticket(org.maxkey.authz.cas.endpoint.ticket.Ticket) SigninPrincipal(org.maxkey.authn.SigninPrincipal) UserInfo(org.maxkey.entity.UserInfo) ServiceResponseBuilder(org.maxkey.authz.cas.endpoint.response.ServiceResponseBuilder) ProxyServiceResponseBuilder(org.maxkey.authz.cas.endpoint.response.ProxyServiceResponseBuilder) InvocationTargetException(java.lang.reflect.InvocationTargetException) InvocationTargetException(java.lang.reflect.InvocationTargetException) Operation(io.swagger.v3.oas.annotations.Operation) RequestMapping(org.springframework.web.bind.annotation.RequestMapping) ResponseBody(org.springframework.web.bind.annotation.ResponseBody)

Aggregations

Operation (io.swagger.v3.oas.annotations.Operation)8 AbstractAuthorizeAdapter (org.maxkey.authz.endpoint.adapter.AbstractAuthorizeAdapter)8 RequestMapping (org.springframework.web.bind.annotation.RequestMapping)8 InvocationTargetException (java.lang.reflect.InvocationTargetException)5 Apps (org.maxkey.entity.apps.Apps)5 UserInfo (org.maxkey.entity.UserInfo)4 ModelAndView (org.springframework.web.servlet.ModelAndView)4 SigninPrincipal (org.maxkey.authn.SigninPrincipal)3 ProxyServiceResponseBuilder (org.maxkey.authz.cas.endpoint.response.ProxyServiceResponseBuilder)3 ServiceResponseBuilder (org.maxkey.authz.cas.endpoint.response.ServiceResponseBuilder)3 Ticket (org.maxkey.authz.cas.endpoint.ticket.Ticket)3 Cookie (javax.servlet.http.Cookie)2 ProxyGrantingTicketIOUImpl (org.maxkey.authz.cas.endpoint.ticket.ProxyGrantingTicketIOUImpl)2 ProxyGrantingTicketImpl (org.maxkey.authz.cas.endpoint.ticket.ProxyGrantingTicketImpl)2 Accounts (org.maxkey.entity.Accounts)2 ResponseBody (org.springframework.web.bind.annotation.ResponseBody)2 HashMap (java.util.HashMap)1 FormBasedDefaultAdapter (org.maxkey.authz.formbased.endpoint.adapter.FormBasedDefaultAdapter)1 JwtAdapter (org.maxkey.authz.jwt.endpoint.adapter.JwtAdapter)1 OAuth2Exception (org.maxkey.authz.oauth2.common.exceptions.OAuth2Exception)1