javax.security.sasl
public interface SaslServer
Performs SASL authentication as a server.
A server such as an LDAP server gets an instance of this class in order to
perform authentication defined by a specific SASL mechanism. Invoking methods
on the SaslServer instance generates challenges corresponding to
the SASL mechanism implemented by the SaslServer instance. As
the authentication proceeds, the instance encapsulates the state of a SASL
server's authentication exchange.
Here's an example of how an LDAP server might use a SaslServer
instance. It first gets an instance of a SaslServer for the SASL
mechanism requested by the client:
SaslServer ss =
Sasl.createSaslServer(mechanism, "ldap", myFQDN, props, callbackHandler);
It can then proceed to use the server for authentication. For example, suppose the LDAP server received an LDAP BIND request containing the name of the SASL mechanism and an (optional) initial response. It then might use the server as follows:
while (!ss.isComplete()) {
try {
byte[] challenge = ss.evaluateResponse(response);
if (ss.isComplete()) {
status = ldap.sendBindResponse(mechanism, challenge, SUCCESS);
} else {
status = ldap.sendBindResponse(mechanism, challenge, SASL_BIND_IN_PROGRESS);
response = ldap.readBindRequest();
}
} catch (SaslException x) {
status = ldap.sendErrorResponse(x);
break;
}
}
if (ss.isComplete() && (status == SUCCESS)) {
String qop = (String) sc.getNegotiatedProperty(Sasl.QOP);
if (qop != null
&& (qop.equalsIgnoreCase("auth-int")
|| qop.equalsIgnoreCase("auth-conf"))) {
// Use SaslServer.wrap() and SaslServer.unwrap() for future
// communication with client
ldap.in = new SecureInputStream(ss, ldap.in);
ldap.out = new SecureOutputStream(ss, ldap.out);
}
}
Since: 1.5
See Also: Sasl
| Method Summary | |
|---|---|
| void | dispose()
Disposes of any system resources or security-sensitive information the
SaslServer might be using. |
| byte[] | evaluateResponse(byte[] response)
Evaluates the response data and generates a challenge. |
| String | getAuthorizationID()
Reports the authorization ID in effect for the client of this session This
method can only be called if {@link #isComplete()} returns true.
|
| String | getMechanismName()
Returns the IANA-registered mechanism name of this SASL server (e.g.
|
| Object | getNegotiatedProperty(String propName)
Retrieves the negotiated property. |
| boolean | isComplete()
Determines if the authentication exchange has completed. |
| byte[] | unwrap(byte[] incoming, int offset, int len) Unwraps a byte array received from the client. |
| byte[] | wrap(byte[] outgoing, int offset, int len) Wraps a byte array to be sent to the client. |
SaslServer might be using. Invoking this method invalidates
the SaslServer instance. This method is idempotent.
Throws: SaslException if a problem was encountered while disposing of the resources.
null if the authentication has succeeded and
no more challenge data is to be sent to the client. It is non-null if the
authentication must be continued by sending a challenge to the client, or
if the authentication has succeeded but challenge data needs to be
processed by the client. {@link #isComplete()} should be called after each
call to evaluateResponse(),to determine if any further
response is needed from the client.
Parameters: response the non-null (but possibly empty) response sent by the client.
Returns: the possibly null challenge to send to the client.
It is null if the authentication has succeeded and there is
no more challenge data to be sent to the client.
Throws: SaslException if an error occurred while processing the response or generating a challenge.
true.
Returns: the authorization ID of the client.
Throws: IllegalStateException if this authentication session has not completed.
Returns: a non-null string representing the IANA-registered mechanism name.
true); otherwise, an
{@link IllegalStateException} is thrown.
Returns: the value of the negotiated property. If null, the
property was not negotiated or is not applicable to this mechanism.
Throws: IllegalStateException if this authentication exchange has not completed.
Returns: true if the authentication exchange has completed;
false otherwise.
Unwraps a byte array received from the client. This method can be called
only after the authentication exchange has completed (i.e., when
{@link #isComplete()} returns true) and only if the
authentication exchange has negotiated integrity and/or privacy as the
quality of protection; otherwise, an {@link IllegalStateException} is
thrown.
incoming is the contents of the SASL buffer as defined in
RFC 2222 without the leading four octet field that represents the length.
offset and len specify the portion of incoming
to use.
Parameters: incoming a non-null byte array containing the encoded bytes from
the client. offset the starting position at incoming of the bytes
to use. len the number of bytes from incoming to use.
Returns: a non-null byte array containing the decoded bytes.
Throws: SaslException if incoming cannot be successfully
unwrapped. IllegalStateException if the authentication exchange has not
completed, or if the negotiated quality of protection has neither
integrity nor privacy.
Wraps a byte array to be sent to the client. This method can be called
only after the authentication exchange has completed (i.e., when
{@link #isComplete()} returns true) and only if the
authentication exchange has negotiated integrity and/or privacy as the
quality of protection; otherwise, an {@link IllegalStateException} is
thrown.
The result of this method will make up the contents of the SASL buffer
as defined in RFC 2222 without the leading four octet field that
represents the length. offset and len specify
the portion of outgoing to use.
Parameters: outgoing a non-null byte array containing the bytes to encode. offset the starting position at outgoing of the bytes
to use. len the number of bytes from outgoing to use.
Returns: a non-null byte array containing the encoded bytes.
Throws: SaslException if outgoing cannot be successfully
wrapped. IllegalStateException if the authentication exchange has not
completed, or if the negotiated quality of protection has neither
integrity nor privacy.