I think it could still work at least partly.
In a project we had a similar requirement. The service call was
authenticated using a SAML token from an STS server.
So we did the following. In a first step we mapped from the identity
provided by the saml token to a username. Then we used a modified
LdapLoginModule to do the JAAS login.
As the authentication already happened inside WS-Security we made the
LdapLoginModule skip the password check and just establish the JAAS
login context and add the roles of the user.
So the effect was that we had a JAAS login that could be used for
authorization. So the authorization part was the same as with a username
/ password based authentication.
I think our approach could event be improved. With a special LoginModule
we could do the mapping from token identity to username inside the login
module and perhaps even do the token validation.
Then we could also add the SAML token to the JAAS Subject.
This would then allow to use the JAAS login for a chained service call
to another service. We could retrieve the SAML token there and use it to
get an onBehalfOf token from STS. So we would be able to do chained
service calls with full single sign on.
Another single sign on case would be to start with a local JAAS login
with kerberos. The jaas context from this login could then be used on
outgoing calls to authenticate against the STS using Spnego auth and
retrieve a SAML token.
Both cases together would then support a complete single sign on from
kerberos on the client (e.g. Windows Auth) to directly called service
endpoints (SAML Token) as well as chained calls from there (onBehalfOf
SAML token).
What do you think?
Christian
On 10.07.2014 11:55, Oliver Wulff wrote:
Hi Christian
I do support the ideas. I think it's important to include claims based
authorization concept as well as supported by Fediz, but primarely for Web SSO.
JAAS is a good concept to seperate the transport (HTTP) and the access to the
identity store. But JAAS doesn't work for SSO approaches as supporting HTTP
Basic Authorization Header is not sufficient for SAML based protocols (SAML-P,
WS-Federation).
WDYT?
Thanks
Oli
------
Oliver Wulff
Blog: http://owulff.blogspot.com
Solution Architect
http://coders.talend.com
Talend Application Integration Division http://www.talend.com
--
Christian Schneider
http://www.liquid-reality.de
Open Source Architect
http://www.talend.com