...
A particular advantage of the V4 alternative approach is that the native Kerberos feature is more secure than the Java-supplied JAAS alternative, so deployments combining the JAAS Kerberos module with other back-ends should seriously consider migrating away from that approach.
General Configuration
Localtabgroup |
localtab-live Expand |
---|
|
Configuring JAAS as a back-end in the simplest fashion relies on beans defined via an import in authn/password-authn-config.xml: Import in authn/password-authn-config.xml Code Block |
---|
| <import resource="jaas-authn-config.xml" /> |
A few beans are defined in this file to globally configure this back-end by setting some JAAS-related options. With V4, these beans are chiefly used for backward compatibility, and as default settings that can be overridden on specific instances of beans inheriting from shibboleth.JAASValidator defined in authn/password-authn-config.xml in the shibboleth.authn.Password.Validators bean. In the simple case of JAAS used alone: Defining use of JAAS in password-authn-config.xml Code Block |
---|
| <util:list id="shibboleth.authn.Password.Validators">
<!-- Default bean uses the settings defined in jaas-authn-config.xml -->
<ref bean="shibboleth.JAASValidator" />
</util:list> |
Localtab live |
---|
| active | true
---|
Expand |
---|
|
Configuring JAAS as a back-end relies on beans internally that are configured using authn/authn.properties. Generally the defaults are sufficient to rely on a single JAAS configuration named "ShibUserPassAuth". Older releases included an authn/jaas-authn-config.xml file; this remains supported but is no longer required or provided. Adding additional beans may be needed in very advanced cases where a higher degree of control is required, and you are welcome to place them within authn/password-authn-config.xml. In the simple case of JAAS used alone: Defining use of JAAS in password-authn-config.xml Code Block |
---|
| <util:list id="shibboleth.authn.Password.Validators">
<!-- Default bean uses the settings defined in authn/authn.properties -->
<ref bean="shibboleth.JAASValidator" />
</util:list> |
If desired, it's possible to directly configure the various settings within the validator bean instead of or in addition to relying on the defaults. Refer to the JAASCredentialValidator javadoc for a complete summary. |
...
If the information the function would return is static, a bean named shibboleth.authn.JAAS.LoginConfigurations can be defined.
Localtabgroup |
localtab-live Expand |
---|
|
When using either a static or dynamic approach involving custom Principals, the overall login flow generally should advertise all of the possible Principal types in its supportedPrincipals bean property (in general-authn.xml) and the automatic injection of all those Principals is turned off by defining a bean like so: Code Block |
---|
<util:constant id="shibboleth.authn.Password.addDefaultPrincipals" static-field="java.lang.Boolean.FALSE" /> |
Localtab live |
---|
| active | true
---|
Expand |
---|
|
When using either a static or dynamic approach involving custom Principals, the overall login flow generally should advertise all of the possible Principal types in its idp.authn.Password.supportedPrincipals property and the automatic injection of all those Principals is turned off via the idp.authn.Password.addDefaultPrincipals property. |
Reference
Localtabgroup |
localtab-live Expand |
---|
|
The beans defined in authn/jaas-authn-config.xml follow. These are defaults that can be overridden per-validator in whole or in part. / Type | Default | Description |
---|
JAASConfig String | %{idp.home}/conf/authn/jaas.config | Defines a Spring Resource containing the JAAS config. Normally this just points to a file in the filesystem | shibboleth.authn.JAAS.JAASConfigURI java.net.URI | JAASConfig.URI | Defines the URI object containing the JAAS configuration | shibboleth.authn.JAAS.LoginConfigNames Collection<String> | ["ShibUserPassAuth"] | Simple list of JAAS application configuration names to use | shibboleth.authn.JAAS.LoginConfigurations Collection<Pair<String,Collection<Principal>>> | | Static list of JAAS application configuration names along with mappings to custom Principal objects | shibboleth.authn.JAAS.LoginConfigStrategy Function<Collection<Pair<String,Subject>>> | | For advanced use, you can inject a function to supply at runtime the information that the previous bean would supply statically |
localtab-live |
Expand |
---|
|
The following are placeholders that may be defined in authn/password-authn-config.xml for advanced control over JAAS configuration use. These are alternatives to the typical cases addressed by simple properties. Bean ID | Type | Description |
---|
shibboleth.authn.JAAS.LoginConfigurations
| Collection<Pair<String,Collection<Principal>>> | Static list of JAAS application configuration names along with mappings to custom Principal objects | shibboleth.authn.JAAS.LoginConfigStrategy
| Function<Collection<Pair<String,Subject>>> | For advanced use, you can inject a function to supply at runtime the information that the previous bean would supply statically |
Localtab live |
---|
| active | true
---|
Expand |
---|
|
The following properties are usable in authn/authn.properties to control simple JAAS use: Name | Default | Description |
---|
idp.authn.JAAS.loginConfigNames | ShibUserPassAuth | Comma-delimited set of JAAS application configuration names to use | idp.authn.JAAS.loginConfig | %{idp.home}/conf/authn/jaas.config | Location of JAAS configuration file |
|