1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234
|
<?php
// PHP BasicAuthenticator Class Version 1.3 (24th March 2001)
//
// Copyright David Wilkinson 2001. All Rights reserved.
//
// This software may be used, modified and distributed freely
// providing this copyright notice remains intact at the head
// of the file.
//
// This software is freeware. The author accepts no liability for
// any loss or damages whatsoever incurred directly or indirectly
// from the use of this script. The author of this software makes
// no claims as to its fitness for any purpose whatsoever. If you
// wish to use this software you should first satisfy yourself that
// it meets your requirements.
//
// URL: http://www.cascade.org.uk/software/php/auth/
// Email: davidw@cascade.org.uk
// Modified 7/6/2001 RE
// Added so that authentication module returns groups that user belongs
// to once authenticated
// workaround for funky behaviour of nested includes with older
// versions of php
require_once(dirname(__FILE__)."/config.php");
if (defined("AUTH_CAS") && AUTH_CAS==TRUE)
include_once('CAS/CAS.php');
class BasicAuthenticator {
var $realm = "<private>";
var $message;
var $authenticated = -1;
var $users;
// not normally required, only for SQL authentication
var $grps = FALSE;
function BasicAuthenticator($realm, $message = "Access Denied") {
$this->realm = $realm;
$this->message = $message;
}
function authenticate() {
if ((isset($_COOKIE["ipplanNoAuth"]) and $_COOKIE["ipplanNoAuth"]=="yes") or
$this->isAuthenticated() == 0) {
// delete logout cookie
setcookie("ipplanNoAuth", "", time() - 3600, "/");
Header("WWW-Authenticate: Basic realm=\"$this->realm\"");
// adapt to broken servers - anything bigger than 1.0 uses
// new method
if ($_SERVER["SERVER_PROTOCOL"]=="HTTP/1.0") {
Header("HTTP/1.0 401 Unauthorized"); // http 1.0 method
}
else {
Header("Status: 401 Unauthorized"); // http 1.1 method
}
echo $this->message;
exit();
}
else {
Header("HTTP/1.0 200 OK");
return $this->grps;
}
}
function addUser($user, $passwd) {
$this->users["$user"] = $passwd;
}
function isAuthenticated() {
// dummy server vars into new va called MY_SERVER_VARS
// needed as vars might get updated if running on ISS
$MY_SERVER_VARS = $_SERVER;
if ($this->authenticated < 0) {
// Check for encoded not plain text response
// to fix php on Windows with ISAPI module
// Contributed by Brian Epley
if ( (!(isset($MY_SERVER_VARS["PHP_AUTH_USER"]))) &&
(!(isset($MY_SERVER_VARS["PHP_AUTH_PW"]))) &&
(isset($MY_SERVER_VARS['HTTP_AUTHORIZATION'])) )
{
list($MY_SERVER_VARS["PHP_AUTH_USER"],
$MY_SERVER_VARS["PHP_AUTH_PW"]) =
explode(':',
base64_decode(substr($MY_SERVER_VARS['HTTP_AUTHORIZATION'], 6)));
}
// always use PHP_AUTH_USER for basic authentication
if(isset($MY_SERVER_VARS["PHP_AUTH_USER"])) {
$this->authenticated = $this->validate($MY_SERVER_VARS["PHP_AUTH_USER"], $MY_SERVER_VARS["PHP_AUTH_PW"]);
}
else {
$this->authenticated = 0;
}
}
return $this->authenticated;
}
function validate($user, $passwd)
{
if (strlen(trim($user)) > 0 && strlen(trim($passwd)) > 0) {
// Both $user and $password are non-zero length
if (isset($this->users["$user"]) && $this->users["$user"] == $passwd) {
return 1;
}
}
return 0;
}
}
class SQLAuthenticator extends BasicAuthenticator {
// use different method here if using external authetication to take
// into account that AUTH_VAR may be different
function isAuthenticated() {
// dummy server vars into new va called MY_SERVER_VARS
// needed as vars might get updated if running on ISS
$MY_SERVER_VARS = $_SERVER;
// if you have auth issues, uncomment below var_dump line and look at screen output AFTER
// you have authenticated. look for variables like REMOTE_USER, PHP_AUTH_USER or
// some variable that contains the user-id that authenticated. This is the setting
// that needs to be added in the config.php file for AUTH_VAR
//var_dump($_SERVER);
if ($this->authenticated < 0) {
// Check for encoded not plain text response
// to fix php on Windows with ISAPI module
// Contributed by Brian Epley
if ( (!(isset($MY_SERVER_VARS["PHP_AUTH_USER"]))) &&
(!(isset($MY_SERVER_VARS["PHP_AUTH_PW"]))) &&
(isset($MY_SERVER_VARS['HTTP_AUTHORIZATION'])) )
{
list($MY_SERVER_VARS["PHP_AUTH_USER"],
$MY_SERVER_VARS["PHP_AUTH_PW"]) =
explode(':',
base64_decode(substr($MY_SERVER_VARS['HTTP_AUTHORIZATION'], 6)));
}
// Added lines for CAS Authentication and bypass HTTP's REMOTE_USER var
// (define AUTH_CAS_SERVER AUTH_CAS_PORT in config.php)
if(defined("AUTH_CAS") && AUTH_CAS==TRUE && !(AUTH_INTERNAL)) {
phpCAS::client(CAS_VERSION_1_0, AUTH_CAS_SERVER, AUTH_CAS_PORT,"");
phpCAS::forceAuthentication();
$user=phpCAS::getUser();
$this->authenticated = $this->validate($user, "");
}
elseif(isset($MY_SERVER_VARS[AUTH_VAR])) {
// PHP_AUTH_PW could be undefined if AUTH_INTERNAL = FALSE
// this is OK as it is taken care of in the validate()
// method
$this->authenticated = $this->validate($MY_SERVER_VARS[AUTH_VAR], $MY_SERVER_VARS["PHP_AUTH_PW"]);
}
else {
$this->authenticated = 0;
}
}
return $this->authenticated;
}
function validate($user, $passwd) {
$ds = &ADONewConnection(DBF_TYPE); # create a connection
if (DBF_PERSISTENT) {
$ds->PConnect(DBF_HOST, DBF_USER, DBF_PASSWORD, DBF_NAME) or
die("Could not connect to database");
}
else {
$ds->Connect(DBF_HOST, DBF_USER, DBF_PASSWORD, DBF_NAME) or
die("Could not connect to database");
}
$ds->SetFetchMode(ADODB_FETCH_ASSOC);
// only check password for internal authentication
if (AUTH_INTERNAL) {
$passwd=crypt($passwd, 'xq');
$result=$ds->Execute("SELECT usergrp.grp AS grp
FROM users, usergrp
WHERE users.userid=".$ds->qstr($user)." AND
users.password=".$ds->qstr($passwd)." AND
users.userid=usergrp.userid");
}
else {
$result=$ds->Execute("SELECT usergrp.grp AS grp
FROM users, usergrp
WHERE users.userid=".$ds->qstr($user)." AND
users.userid=usergrp.userid");
}
// found a user, updates grps
// result should always be lowercase from database
$i=0;
if ($result) {
while ($row = $result->FetchRow()) {
$grp[$i++]=$row["grp"];
}
if (empty($grp)) {
$ret=0;
}
else {
$this->grps=$grp;
$ret=1;
}
$result->Close();
$ds->Close();
}
// error
else {
$ret=0;
}
return $ret;
}
}
?>
|