public interface SaslServer
Performs SASL authentication as a server.
A server such an LDAP server gets an instance of this class in order to perform authentication defined by a specific SASL mechanism. Invoking methods on the SaslServer
instance generates challenges according to the SASL mechanism implemented by the SaslServer
. As the authentication proceeds, the instance encapsulates the state of a SASL server's authentication exchange.
Here's an example of how an LDAP server might use a SaslServer
. It first gets an instance of a SaslServer
for the SASL mechanism requested by the client:
SaslServer ss = Sasl.createSaslServer(mechanism, "ldap", myFQDN, props, callbackHandler);It can then proceed to use the server for authentication. For example, suppose the LDAP server received an LDAP BIND request containing the name of the SASL mechanism and an (optional) initial response. It then might use the server as follows:
while (!ss.isComplete()) { try { byte[] challenge = ss.evaluateResponse(response); if (ss.isComplete()) { status = ldap.sendBindResponse(mechanism, challenge, SUCCESS); } else { status = ldap.sendBindResponse(mechanism, challenge, SASL_BIND_IN_PROGRESS); response = ldap.readBindRequest(); } } catch (SaslException e) { status = ldap.sendErrorResponse(e); break; } } if (ss.isComplete() && status == SUCCESS) { String qop = (String) sc.getNegotiatedProperty(Sasl.QOP); if (qop != null && (qop.equalsIgnoreCase("auth-int") || qop.equalsIgnoreCase("auth-conf"))) { // Use SaslServer.wrap() and SaslServer.unwrap() for future // communication with client ldap.in = new SecureInputStream(ss, ldap.in); ldap.out = new SecureOutputStream(ss, ldap.out); } }
Sasl
, SaslServerFactory
String getMechanismName()
Returns the IANA-registered mechanism name of this SASL server. (e.g. "CRAM-MD5", "GSSAPI").
byte[] evaluateResponse(byte[] response) throws SaslException
Evaluates the response data and generates a challenge. If a response is received from the client during the authentication process, this method is called to prepare an appropriate next challenge to submit to the client. The challenge is null if the authentication has succeeded and no more challenge data is to be sent to the client. It is non-null if the authentication must be continued by sending a challenge to the client, or if the authentication has succeeded but challenge data needs to be processed by the client. isComplete()
should be called after each call to evaluateResponse()
,to determine if any further response is needed from the client.
response
- The non-null (but possibly empty) response sent by the client.SaslException
- If an error occurred while processing the response or generating a challenge.boolean isComplete()
Determines whether the authentication exchange has completed. This method is typically called after each invocation of evaluateResponse()
to determine whether the authentication has completed successfully or should be continued.
String getAuthorizationID()
Reports the authorization ID in effect for the client of this session. This method can only be called if isComplete() returns true.
IllegalStateException
- if this authentication session has not completedbyte[] unwrap(byte[] incoming, int offset, int len) throws SaslException
Unwraps a byte array received from the client. This method can be called only after the authentication exchange has completed (i.e., when isComplete()
returns true) and only if the authentication exchange has negotiated integrity and/or privacy as the quality of protection; otherwise, an IllegalStateException
is thrown.
incoming
is the contents of the SASL buffer as defined in RFC 2222 without the leading four octet field that represents the length. offset
and len
specify the portion of incoming
to use.
incoming
- A non-null byte array containing the encoded bytes from the client.offset
- The starting position at incoming
of the bytes to use.len
- The number of bytes from incoming
to use.SaslException
- if incoming
cannot be successfully unwrapped.IllegalStateException
- if the authentication exchange has not completed, or if the negotiated quality of protection has neither integrity nor privacybyte[] wrap(byte[] outgoing, int offset, int len) throws SaslException
Wraps a byte array to be sent to the client. This method can be called only after the authentication exchange has completed (i.e., when isComplete()
returns true) and only if the authentication exchange has negotiated integrity and/or privacy as the quality of protection; otherwise, a SaslException
is thrown.
The result of this method will make up the contents of the SASL buffer as defined in RFC 2222 without the leading four octet field that represents the length. offset
and len
specify the portion of outgoing
to use.
outgoing
- A non-null byte array containing the bytes to encode.offset
- The starting position at outgoing
of the bytes to use.len
- The number of bytes from outgoing
to use.SaslException
- if outgoing
cannot be successfully wrapped.IllegalStateException
- if the authentication exchange has not completed, or if the negotiated quality of protection has neither integrity nor privacy.Object getNegotiatedProperty(String propName)
Retrieves the negotiated property. This method can be called only after the authentication exchange has completed (i.e., when isComplete()
returns true); otherwise, an IllegalStateException
is thrown.
propName
- the propertyIllegalStateException
- if this authentication exchange has not completedvoid dispose() throws SaslException
Disposes of any system resources or security-sensitive information the SaslServer might be using. Invoking this method invalidates the SaslServer instance. This method is idempotent.
SaslException
- If a problem was encountered while disposing the resources.
© 1993–2017, Oracle and/or its affiliates. All rights reserved.
Documentation extracted from Debian's OpenJDK Development Kit package.
Licensed under the GNU General Public License, version 2, with the Classpath Exception.
Various third party code in OpenJDK is licensed under different licenses (see Debian package).
Java and OpenJDK are trademarks or registered trademarks of Oracle and/or its affiliates.