[ https://issues.apache.org/jira/browse/CXF-5118?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14084878#comment-14084878 ]
Sergey Beryozkin commented on CXF-5118: --------------------------------------- Christian, let me clarify few things given that I wrote the interceptor originally and was guilty of introducing UsernameToken afterwards. First of all, a populated AuthorizationPolicy does not have to be equal to "Basic Auth", why ? Second I added UsernameToken at a time when WSS4J had no its own JAAS interceptor for WSS4JInInterceptor to work with JAASLoginInterceptor. It's a plain duplication, I should've reused AuthorizationPolicy, I was wrong. So IMHO, that order you listed in not something is supposed to be taken into the consideration in scope of this discussion. I'm sorry, I did not understand your proposal. I thought we were 1mm away from completing this pretty basic issue yesterday but now I'm not sure we are close to anything at all. I'm getting close to just doing a commit myself :-) but lets keep discussing it I guess. Given what I've clarified, what do you think is missing in https://issues.apache.org/jira/browse/CXF-5118?focusedCommentId=14084103&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-14084103 ? > Create CXF interceptor which will use HTTPS client certificates to create > JAAS SecurityContext > ----------------------------------------------------------------------------------------------- > > Key: CXF-5118 > URL: https://issues.apache.org/jira/browse/CXF-5118 > Project: CXF > Issue Type: New Feature > Components: Core > Reporter: Sergey Beryozkin > Assignee: Christian Schneider > > Use case: > The user authenticates against the webservice using an X509 client > certificate. In case of successful authentication the JAAS security context > should be populated with a Subject that stores the user name and the roles of > the user. This is necessary to support Authorization at a later stage. > Design ideas > The SSL transport will be configured to only accept certain client > certificates. So we can assume that the interceptor does not have to do a > real authentication. Instead it has to map from the subjectDN of the > certificate to the user name and then lookup the roles of that user. Both > then has to be stored in the subject's principles. > The mapping could be done inside a JAASLoginModule or before. Inside will > give the user more flexibility. > The next step to retrieve the roles should be done in one of the standard > JAASLoginModules as the source of the roles can be quite diverse. So for > example the LdapLoginModule allows to retrieve the roles from Ldap. At the > moment these modules require the password of the user though which is not > available when doing a cert based auth. > So I see two variants to retrieve the roles: > 1. Change the loginmodules like the LDAP one to be configureable to use a > fixed ldap user for the ldap connect and not require the user password. So > the module would have two modes: a) normal authentication and group gathering > b) use a fixed user to just retrieve roles for a given user > 2. Store the user password somewhere (e.g. in the mapping file). In this case > the existing LDAPLoginModule could be used but the user password would be > openly in a text file > 3. Create new LoginModules with the desired behaviour (fixed user and only > lookup of roles) -- This message was sent by Atlassian JIRA (v6.2#6252)