1 | |
|
2 | |
|
3 | |
|
4 | |
|
5 | |
|
6 | |
|
7 | |
|
8 | |
|
9 | |
|
10 | |
|
11 | |
|
12 | |
|
13 | |
|
14 | |
|
15 | |
|
16 | |
package org.kuali.student.security.util; |
17 | |
|
18 | |
import java.io.IOException; |
19 | |
import java.net.URL; |
20 | |
import java.security.KeyStore; |
21 | |
import java.security.KeyStoreException; |
22 | |
import java.security.NoSuchAlgorithmException; |
23 | |
import java.security.PrivateKey; |
24 | |
import java.security.PublicKey; |
25 | |
import java.security.UnrecoverableKeyException; |
26 | |
import java.security.cert.CertificateException; |
27 | |
import java.security.cert.X509Certificate; |
28 | |
import java.util.Arrays; |
29 | |
import java.util.Date; |
30 | |
import java.util.Map; |
31 | |
|
32 | |
import javax.xml.parsers.DocumentBuilder; |
33 | |
import javax.xml.parsers.DocumentBuilderFactory; |
34 | |
import javax.xml.parsers.ParserConfigurationException; |
35 | |
import javax.xml.transform.TransformerException; |
36 | |
|
37 | |
import org.apache.xml.security.exceptions.XMLSecurityException; |
38 | |
import org.apache.xml.security.keys.KeyInfo; |
39 | |
import org.apache.xml.security.signature.XMLSignature; |
40 | |
import org.apache.xml.security.signature.XMLSignatureException; |
41 | |
import org.apache.xml.security.transforms.Transforms; |
42 | |
import org.apache.xml.security.utils.Constants; |
43 | |
import org.apache.xpath.XPathAPI; |
44 | |
import org.opensaml.SAMLAssertion; |
45 | |
import org.opensaml.SAMLAttribute; |
46 | |
import org.opensaml.SAMLAttributeStatement; |
47 | |
import org.opensaml.SAMLAuthenticationStatement; |
48 | |
import org.opensaml.SAMLException; |
49 | |
import org.opensaml.SAMLNameIdentifier; |
50 | |
import org.opensaml.SAMLSubject; |
51 | |
import org.w3c.dom.DOMException; |
52 | |
import org.w3c.dom.Document; |
53 | |
import org.w3c.dom.Element; |
54 | |
import org.w3c.dom.Node; |
55 | |
import org.w3c.dom.NodeList; |
56 | |
|
57 | |
|
58 | |
|
59 | |
|
60 | |
|
61 | |
|
62 | |
|
63 | 0 | public class SamlUtils { |
64 | |
|
65 | |
static { |
66 | 0 | org.apache.xml.security.Init.init(); |
67 | |
} |
68 | |
|
69 | |
|
70 | |
private static String keystoreType; |
71 | |
private static String keystoreFile; |
72 | |
private static String keystorePass; |
73 | |
private static String privateKeyAlias; |
74 | |
private static String privateKeyPass; |
75 | |
private static String certificateAlias; |
76 | |
|
77 | 0 | private static ThreadLocal<Map<String,String>> samlPropertiesHolder = new ThreadLocal<Map<String,String>>(); |
78 | |
|
79 | |
public static SAMLAssertion createAssertion() throws SAMLException, CloneNotSupportedException{ |
80 | |
|
81 | 0 | String user = getSamlProperties().get("user"); |
82 | 0 | String pgt = getSamlProperties().get("proxyGrantingTicket"); |
83 | 0 | String proxies = getSamlProperties().get("proxies"); |
84 | 0 | String issuer = getSamlProperties().get("samlIssuerForUser"); |
85 | 0 | String nameQualifier = getSamlProperties().get("samlIssuerForUser"); |
86 | |
|
87 | 0 | SAMLAssertion assertion = new SAMLAssertion(); |
88 | 0 | assertion.setIssuer(issuer); |
89 | |
|
90 | |
|
91 | 0 | SAMLNameIdentifier nameId = new SAMLNameIdentifier(user, nameQualifier, ""); |
92 | 0 | String[] confirmationMethods = {SAMLSubject.CONF_SENDER_VOUCHES}; |
93 | 0 | SAMLSubject subject = new SAMLSubject(); |
94 | 0 | subject.setNameIdentifier(nameId); |
95 | 0 | subject.setConfirmationMethods(Arrays.asList(confirmationMethods)); |
96 | |
|
97 | |
|
98 | 0 | SAMLAuthenticationStatement authStmt = new SAMLAuthenticationStatement(); |
99 | 0 | authStmt.setAuthInstant(new Date()); |
100 | 0 | authStmt.setAuthMethod(SAMLAuthenticationStatement.AuthenticationMethod_Password); |
101 | 0 | authStmt.setSubject(subject); |
102 | |
|
103 | |
|
104 | 0 | SAMLAttributeStatement attrStatement = new SAMLAttributeStatement(); |
105 | 0 | SAMLAttribute attr1 = new SAMLAttribute(); |
106 | 0 | attr1.setName("proxyGrantingTicket"); |
107 | 0 | attr1.setNamespace("http://student.kuali.org/wsdl/security/saml"); |
108 | |
|
109 | 0 | SAMLAttribute attr2 = new SAMLAttribute(); |
110 | 0 | attr2.setName("proxies"); |
111 | 0 | attr2.setNamespace("http://student.kuali.org/wsdl/security/saml"); |
112 | |
|
113 | 0 | attr1.addValue(pgt); |
114 | 0 | attr2.addValue(proxies); |
115 | |
|
116 | 0 | attrStatement.addAttribute(attr1); |
117 | 0 | attrStatement.addAttribute(attr2); |
118 | |
|
119 | 0 | SAMLSubject subjectInAttr = (SAMLSubject)subject.clone(); |
120 | 0 | attrStatement.setSubject(subjectInAttr); |
121 | |
|
122 | |
|
123 | 0 | assertion.addStatement(authStmt); |
124 | 0 | assertion.addStatement(attrStatement); |
125 | |
|
126 | 0 | return assertion; |
127 | |
} |
128 | |
|
129 | |
public static void setSamlProperties(Map<String, String> samlProperties){ |
130 | |
|
131 | 0 | SamlUtils.samlPropertiesHolder.set(samlProperties); |
132 | 0 | } |
133 | |
|
134 | |
public static Map<String, String> getSamlProperties() { |
135 | |
|
136 | 0 | return SamlUtils.samlPropertiesHolder.get(); |
137 | |
} |
138 | |
|
139 | |
public static Document signAssertion(SAMLAssertion assertion) throws XMLSecurityException, KeyStoreException, |
140 | |
NoSuchAlgorithmException, CertificateException, IOException, UnrecoverableKeyException, |
141 | |
ParserConfigurationException, DOMException, SAMLException { |
142 | 0 | Constants.setSignatureSpecNSprefix("ds"); |
143 | |
|
144 | 0 | ClassLoader classLoader = SamlUtils.class.getClassLoader(); |
145 | 0 | URL url = classLoader.getResource(keystoreFile); |
146 | |
|
147 | |
|
148 | 0 | KeyStore ks = KeyStore.getInstance(keystoreType); |
149 | 0 | ks.load(url.openStream(), keystorePass.toCharArray()); |
150 | |
|
151 | |
|
152 | 0 | PrivateKey privateKey = (PrivateKey) ks.getKey(privateKeyAlias, privateKeyPass.toCharArray()); |
153 | |
|
154 | 0 | DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance(); |
155 | |
|
156 | |
|
157 | 0 | dbf.setNamespaceAware(true); |
158 | |
|
159 | 0 | DocumentBuilder db = dbf.newDocumentBuilder(); |
160 | 0 | Document doc = db.newDocument(); |
161 | |
|
162 | 0 | Element root = doc.createElementNS("http://student.kuali.org", "ks:KSSecureToken"); |
163 | 0 | root.setAttributeNS(Constants.NamespaceSpecNS, "xmlns:ks", "http://student.kuali.org"); |
164 | |
|
165 | 0 | doc.appendChild(root); |
166 | |
|
167 | 0 | root.appendChild(assertion.toDOM(doc)); |
168 | |
|
169 | 0 | XMLSignature sig = new XMLSignature(doc, null, XMLSignature.ALGO_ID_SIGNATURE_RSA); |
170 | |
|
171 | |
|
172 | |
|
173 | |
|
174 | |
|
175 | |
|
176 | |
|
177 | |
|
178 | |
|
179 | 0 | root.appendChild(sig.getElement()); |
180 | |
|
181 | |
|
182 | 0 | Transforms transforms = new Transforms(doc); |
183 | |
|
184 | |
|
185 | |
|
186 | 0 | transforms.addTransform(Transforms.TRANSFORM_ENVELOPED_SIGNATURE); |
187 | |
|
188 | |
|
189 | |
|
190 | 0 | transforms.addTransform(Transforms.TRANSFORM_C14N_WITH_COMMENTS); |
191 | |
|
192 | 0 | sig.addDocument("", transforms, Constants.ALGO_ID_DIGEST_SHA1); |
193 | |
|
194 | |
|
195 | |
|
196 | 0 | X509Certificate cert = (X509Certificate) ks.getCertificate(certificateAlias); |
197 | |
|
198 | 0 | sig.addKeyInfo(cert); |
199 | 0 | sig.addKeyInfo(cert.getPublicKey()); |
200 | |
|
201 | 0 | sig.sign(privateKey); |
202 | |
|
203 | 0 | return doc; |
204 | |
} |
205 | |
|
206 | |
public static SAMLAssertion unsignAssertion(Document doc) throws TransformerException, XMLSecurityException, SAMLException { |
207 | 0 | boolean validSig = false; |
208 | 0 | Element nscontext = doc.createElementNS(null, "namespaceContext"); |
209 | 0 | nscontext.setAttributeNS(Constants.NamespaceSpecNS, "xmlns:ds", Constants.SignatureSpecNS); |
210 | |
|
211 | 0 | Element sigElement = (Element) XPathAPI.selectSingleNode(doc, "//ds:Signature[1]", nscontext); |
212 | |
|
213 | 0 | XMLSignature signature = new XMLSignature(sigElement, null); |
214 | |
|
215 | 0 | KeyInfo ki = signature.getKeyInfo(); |
216 | |
|
217 | 0 | if (ki != null) { |
218 | 0 | X509Certificate cert = ki.getX509Certificate(); |
219 | |
|
220 | 0 | if (cert != null) { |
221 | 0 | validSig = signature.checkSignatureValue(cert); |
222 | |
|
223 | |
} else { |
224 | 0 | PublicKey pk = ki.getPublicKey(); |
225 | |
|
226 | 0 | if (pk != null) { |
227 | 0 | validSig = signature.checkSignatureValue(pk); |
228 | |
|
229 | |
} else { |
230 | 0 | throw new XMLSignatureException("Could not find a certificate or a public key in the message, can't check the signature"); |
231 | |
} |
232 | |
} |
233 | 0 | } else { |
234 | 0 | throw new XMLSignatureException("Could not find a KeyInfo element in message"); |
235 | |
} |
236 | |
|
237 | |
|
238 | 0 | if(validSig){ |
239 | 0 | NodeList nodeList = doc.getDocumentElement().getChildNodes(); |
240 | 0 | Node childNode = null; |
241 | |
|
242 | 0 | for(int i=0; i < nodeList.getLength(); i++){ |
243 | 0 | childNode = nodeList.item(i); |
244 | 0 | if((childNode.getNodeName().equals("Assertion")) && (childNode.getNodeType() == Node.ELEMENT_NODE)){ |
245 | 0 | SAMLAssertion assertion = new SAMLAssertion((Element)childNode); |
246 | 0 | return assertion; |
247 | |
} |
248 | |
} |
249 | |
} |
250 | |
|
251 | 0 | throw new XMLSignatureException("The message signature was invalid"); |
252 | |
} |
253 | |
|
254 | |
|
255 | |
|
256 | |
|
257 | |
public String getKeystoreType() { |
258 | 0 | return keystoreType; |
259 | |
} |
260 | |
|
261 | |
|
262 | |
|
263 | |
|
264 | |
public void setKeystoreType(String keystoreType) { |
265 | 0 | SamlUtils.keystoreType = keystoreType; |
266 | 0 | } |
267 | |
|
268 | |
|
269 | |
|
270 | |
|
271 | |
public String getKeystoreFile() { |
272 | 0 | return keystoreFile; |
273 | |
} |
274 | |
|
275 | |
|
276 | |
|
277 | |
|
278 | |
public void setKeystoreFile(String keystoreFile) { |
279 | 0 | SamlUtils.keystoreFile = keystoreFile; |
280 | 0 | } |
281 | |
|
282 | |
|
283 | |
|
284 | |
|
285 | |
public String getKeystorePass() { |
286 | 0 | return keystorePass; |
287 | |
} |
288 | |
|
289 | |
|
290 | |
|
291 | |
|
292 | |
public void setKeystorePass(String keystorePass) { |
293 | 0 | SamlUtils.keystorePass = keystorePass; |
294 | 0 | } |
295 | |
|
296 | |
|
297 | |
|
298 | |
|
299 | |
public String getPrivateKeyAlias() { |
300 | 0 | return privateKeyAlias; |
301 | |
} |
302 | |
|
303 | |
|
304 | |
|
305 | |
|
306 | |
public void setPrivateKeyAlias(String privateKeyAlias) { |
307 | 0 | SamlUtils.privateKeyAlias = privateKeyAlias; |
308 | 0 | } |
309 | |
|
310 | |
|
311 | |
|
312 | |
|
313 | |
public String getPrivateKeyPass() { |
314 | 0 | return privateKeyPass; |
315 | |
} |
316 | |
|
317 | |
|
318 | |
|
319 | |
|
320 | |
public void setPrivateKeyPass(String privateKeyPass) { |
321 | 0 | SamlUtils.privateKeyPass = privateKeyPass; |
322 | 0 | } |
323 | |
|
324 | |
|
325 | |
|
326 | |
|
327 | |
public String getCertificateAlias() { |
328 | 0 | return certificateAlias; |
329 | |
} |
330 | |
|
331 | |
|
332 | |
|
333 | |
|
334 | |
public void setCertificateAlias(String certificateAlias) { |
335 | 0 | SamlUtils.certificateAlias = certificateAlias; |
336 | 0 | } |
337 | |
} |