1 /*
2 * Copyright 2006 University Corporation for Advanced Internet Development, Inc.
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 package edu.internet2.middleware.shibboleth.idp.authn;
18
19 import java.util.List;
20
21 import javax.servlet.http.HttpServletRequest;
22 import javax.servlet.http.HttpServletResponse;
23
24 /**
25 * Authentication handlers authenticate a user in an implementation specific manner. Some examples of this might be by
26 * collecting a user name and password and validating it against an LDAP directory, validating a client certificate, or
27 * validating one-time password.
28 *
29 * When a login handler is invoked the user's {@link edu.internet2.middleware.shibboleth.idp.session.Session} is bound
30 * to the {@link javax.servlet.http.HttpSession} under the attribute with the name
31 * {@link edu.internet2.middleware.shibboleth.idp.session.Session#HTTP_SESSION_BINDING_ATTRIBUTE}.
32 *
33 * After a successful authentication has been completed the handler <strong>MUST</strong> either:
34 * <ul>
35 * <li>Bind a {@link javax.security.auth.Subject} to the attribute identified by {@link #SUBJECT_KEY} if one was
36 * created during the authentication process. The principals, public, and private credentials from this subject will be
37 * merged with those in the {@link javax.security.auth.Subject} within the
38 * {@link edu.internet2.middleware.shibboleth.idp.session.Session}.</li>
39 * <li>Bind a {@link java.security.Principal} for the user to the request attribute identified by
40 * {@link #PRINCIPAL_KEY}. Such a {@link java.security.Principal} <strong>MUST</strong> implement
41 * {@link java.io.Serializable}. This principal will be added to the {@link javax.security.auth.Subject} within the
42 * {@link edu.internet2.middleware.shibboleth.idp.session.Session}.</li>
43 * <li>Bind a principal name string to the request attribute identified by {@link #PRINCIPAL_NAME_KEY}. In this case
44 * the {@link AuthenticationEngine} will create a {@link java.security.Principal} object of type
45 * {@link edu.internet2.middleware.shibboleth.idp.authn.UsernamePrincipal} and add that to the
46 * {@link javax.security.auth.Subject} within the {@link edu.internet2.middleware.shibboleth.idp.session.Session}.</li>
47 * </ul>
48 *
49 * The handler <strong>MAY</strong> also:
50 * <ul>
51 * <li>Bind a URI string, representing the authentication method actually used, to a request attribute identified by
52 * {@link #AUTHENTICATION_METHOD_KEY}. This may be used if a handler is capable of performing multiple types of
53 * authentication.</li>
54 * <li>bind an error message, if an error occurred during authentication to the request attribute identified by
55 * {@link LoginHandler#AUTHENTICATION_ERROR_KEY}.</li>
56 * </ul>
57 *
58 * Finally, the handler must return control to the authentication engine by invoking
59 * {@link AuthenticationEngine#returnToAuthenticationEngine(HttpServletRequest, HttpServletResponse)}. After which the
60 * authentication handler must immediately return.
61 *
62 * Handlers <strong>MUST NOT</strong> change or add any data to the user's {@link javax.servlet.http.HttpSession} that
63 * persists past the process of authenticating the user, that is no additional session data may be added and no existing
64 * session data may be changed when the handler returns control to the authentication engine.
65 */
66 public interface LoginHandler {
67
68 /** Request attribute to which user's principal should be bound. */
69 public static final String PRINCIPAL_KEY = "principal";
70
71 /** Request attribute to which user's principal name should be bound. */
72 public static final String PRINCIPAL_NAME_KEY = "principal_name";
73
74 /** Request attribute to which user's subject should be bound. */
75 public static final String SUBJECT_KEY = "subject";
76
77 /** Request attribute to which an authentication method URI may be bound. */
78 public static final String AUTHENTICATION_METHOD_KEY = "authnMethod";
79
80 /** Request attribute to which an error message may be bound. */
81 public static final String AUTHENTICATION_ERROR_KEY = "authnError";
82
83 /**
84 * Gets the list of authentication methods this handler supports.
85 *
86 * @return authentication methods this handler supports
87 */
88 public List<String> getSupportedAuthenticationMethods();
89
90 /**
91 * Gets the length of time, in milliseconds, after which a user authenticated by this handler should be
92 * re-authenticated.
93 *
94 * @return length of time, in milliseconds, after which a user should be re-authenticated
95 */
96 public long getAuthenticationDuration();
97
98 /**
99 * Gets whether this handler supports passive authentication.
100 *
101 * @return whether this handler supports passive authentication
102 */
103 public boolean supportsPassive();
104
105 /**
106 * Returns if this handler supports the ability to force a user to (re-)authenticate.
107 *
108 * @return if this handler can force a user to (re-)authenticate.
109 */
110 public boolean supportsForceAuthentication();
111
112 /**
113 * Authenticate the user making the request.
114 *
115 * @param httpRequest user request
116 * @param httpResponse response to user
117 */
118 public void login(HttpServletRequest httpRequest, HttpServletResponse httpResponse);
119 }