使用PBESecurityDomain在mutual / client-cert auth中忽略Jboss应用程序策略

时间:2011-01-14 16:54:08

标签: ssl jboss client-certificates login-config.xml securitydomain

通过以下内容,相互客户端证书,SSL(TLS)握手适用于休息端点(yay!) - 通过测试和调试验证:javax.net logging& Wireshark的。但...

第一次观察:HTTPServletRequest和JAX-RS带注释的SecurityContext具有null主信息

第二次观察:篡改包含application-policy元素的login-config.xml无效

简而言之,TLS可以工作,但是将证书DN传输到请求线程中的HTTPServletRequest对象并不会阻止应用程序获取调用者的ID。有没有人有任何建议?

在JBoss 6上:

部署/ jbossweb.sar / server.xml中:

<Connector protocol="HTTP/1.1" debug="10"
       SSLEnabled="true"
       ...
       secure="true"
       clientAuth="true"
       sslProtocol = "TLS"
       securityDomain="java:/jaas/mydomain"
       SSLImplementation="org.jboss.net.ssl.JBossImplementation" />

部署/ jbossweb.sar / META-INF / JBoss的-beans.xml文件:

<depends>jboss.security:service=PBESecurityDomain</depends>

部署/安全service.xml中:

<?xml version="1.0" encoding="UTF-8"?>
<server>
  <mbean code="org.jboss.security.plugins.JaasSecurityDomain"
    name="jboss.security:service=PBESecurityDomain">
    <constructor>           <arg type="java.lang.String" value="mydomain"/>
    </constructor>
    <attribute name="KeyStoreURL">${jboss.server.home.dir}/mykeystore.jks</attribute>
    <attribute name="KeyStorePass">{CLASS}org.jboss.security.plugins.FilePassword:${jboss.server.home.dir}/mykeystorepass.pbe</attribute>
    <attribute name="TrustStoreURL">${jboss.server.home.dir}/mytruststore.jks</attribute>
    <attribute name="TrustStorePass">password</attribute>
    <attribute name="Salt">abunchofrandomchars</attribute>
    <attribute name="IterationCount">13</attribute>
    <depends>jboss.security:service=JaasSecurityManager</depends>
  </mbean>
</server>

部署/安全/安全的JBoss-beans.xml文件:

<bean name="XMLLoginConfig" class="org.jboss.security.auth.login.XMLLoginConfig">
   <property name="configResource">login-config.xml</property>
</bean>
<bean name="SecurityConfig" class="org.jboss.security.plugins.SecurityConfig">
   <property name="mbeanServer"><inject bean="JMXKernel" property="mbeanServer"/></property>
   <property name="defaultLoginConfig"><inject bean="XMLLoginConfig"/></property>
</bean>

CONF /登录-config.xml中:

  <application-policy name="mydomain">
    <authentication>
       <login-module code="org.jboss.security.auth.spi.BaseCertLoginModule"
          flag = "required">
          <module-option name="password-stacking">useFirstPass</module-option>
          <module-option name="securityDomain">java:/jaas/mydomain</module-option>
          <module-option name="verifier">org.jboss.security.auth.certs.AnyCertVerifier</module-option>
          <module-option name="principalClass">org.jboss.security.auth.certs.SubjectDNMapping</module-option>
       </login-module>
       <login-module code="org.jboss.security.auth.spi.UserRolesLoginModu"
          flag = "required">
          <module-option name="password-stacking">useFirstPass</module-option>
          <module-option name="usersProperties">users.properties</module-option>
          <module-option name="rolesProperties">roles.properties</module-option>
       </login-module>
    </authentication>
 </application-policy>

战/ WEB-INF / JBoss的-web.xml中:

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE jboss-web PUBLIC
    "-//JBoss//DTD Web Application 2.4//EN"
    "http://www.jboss.org/j2ee/dtd/jboss-web_4_0.dtd">
<jboss-web>
    <security-domain>java:/jaas/mydomain</security-domain>
    <context-root>/myapp</context-root>
</jboss-web>

1 个答案:

答案 0 :(得分:0)

将特殊ClientLoginModule添加到login-context.xml以修复空主体问题。

<login-module code="org.jboss.security.ClientLoginModule" flag="required"></login-module>