1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162
|
/*
* Copyright 2001-2007 Internet2
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/**
* SecurityPolicy.cpp
*
* Overall policy used to verify the security of an incoming message.
*/
#include "internal.h"
#include "exceptions.h"
#include "binding/SecurityPolicyRule.h"
#include "saml2/core/Assertions.h"
using namespace opensaml::saml2md;
using namespace opensaml::saml2;
using namespace opensaml;
using namespace xmltooling;
using namespace std;
namespace opensaml {
SAML_DLLLOCAL PluginManager<SecurityPolicyRule,string,const DOMElement*>::Factory ClientCertAuthRuleFactory;
SAML_DLLLOCAL PluginManager<SecurityPolicyRule,string,const DOMElement*>::Factory MessageFlowRuleFactory;
SAML_DLLLOCAL PluginManager<SecurityPolicyRule,string,const DOMElement*>::Factory NullSecurityRuleFactory;
SAML_DLLLOCAL PluginManager<SecurityPolicyRule,string,const DOMElement*>::Factory SimpleSigningRuleFactory;
SAML_DLLLOCAL PluginManager<SecurityPolicyRule,string,const DOMElement*>::Factory XMLSigningRuleFactory;
};
void SAML_API opensaml::registerSecurityPolicyRules()
{
SAMLConfig& conf=SAMLConfig::getConfig();
conf.SecurityPolicyRuleManager.registerFactory(CLIENTCERTAUTH_POLICY_RULE, ClientCertAuthRuleFactory);
conf.SecurityPolicyRuleManager.registerFactory(MESSAGEFLOW_POLICY_RULE, MessageFlowRuleFactory);
conf.SecurityPolicyRuleManager.registerFactory(NULLSECURITY_POLICY_RULE, NullSecurityRuleFactory);
conf.SecurityPolicyRuleManager.registerFactory(SIMPLESIGNING_POLICY_RULE, SimpleSigningRuleFactory);
conf.SecurityPolicyRuleManager.registerFactory(XMLSIGNING_POLICY_RULE, XMLSigningRuleFactory);
}
SecurityPolicy::IssuerMatchingPolicy SecurityPolicy::m_defaultMatching;
SecurityPolicy::~SecurityPolicy()
{
reset(false);
}
void SecurityPolicy::reset(bool messageOnly)
{
XMLString::release(&m_messageID);
m_messageID=NULL;
m_issueInstant=0;
if (!messageOnly) {
delete m_issuer;
m_issuer=NULL;
m_issuerRole=NULL;
m_authenticated=false;
}
}
void SecurityPolicy::evaluate(const XMLObject& message, const GenericRequest* request)
{
for (vector<const SecurityPolicyRule*>::const_iterator i=m_rules.begin(); i!=m_rules.end(); ++i)
(*i)->evaluate(message,request,*this);
}
void SecurityPolicy::setIssuer(const Issuer* issuer)
{
if (!getIssuerMatchingPolicy().issuerMatches(m_issuer, issuer))
throw SecurityPolicyException("An Issuer was supplied that conflicts with previous results.");
if (!m_issuer) {
if (m_entityOnly && issuer->getFormat() && !XMLString::equals(issuer->getFormat(), NameIDType::ENTITY))
throw SecurityPolicyException("A non-entity Issuer was supplied, violating policy.");
m_issuerRole = NULL;
m_issuer=issuer->cloneIssuer();
}
}
void SecurityPolicy::setIssuer(const XMLCh* issuer)
{
if (!getIssuerMatchingPolicy().issuerMatches(m_issuer, issuer))
throw SecurityPolicyException("An Issuer was supplied that conflicts with previous results.");
if (!m_issuer && issuer && *issuer) {
m_issuerRole = NULL;
m_issuer = IssuerBuilder::buildIssuer();
m_issuer->setName(issuer);
}
}
void SecurityPolicy::setIssuerMetadata(const RoleDescriptor* issuerRole)
{
if (issuerRole && m_issuerRole && issuerRole!=m_issuerRole)
throw SecurityPolicyException("A rule supplied a RoleDescriptor that conflicts with previous results.");
m_issuerRole=issuerRole;
}
bool SecurityPolicy::IssuerMatchingPolicy::issuerMatches(const Issuer* issuer1, const Issuer* issuer2) const
{
// NULL matches anything for the purposes of this interface.
if (!issuer1 || !issuer2)
return true;
const XMLCh* op1=issuer1->getName();
const XMLCh* op2=issuer2->getName();
if (!op1 || !op2 || !XMLString::equals(op1,op2))
return false;
op1=issuer1->getFormat();
op2=issuer2->getFormat();
if (!XMLString::equals(op1 ? op1 : NameIDType::ENTITY, op2 ? op2 : NameIDType::ENTITY))
return false;
op1=issuer1->getNameQualifier();
op2=issuer2->getNameQualifier();
if (!XMLString::equals(op1 ? op1 : &chNull, op2 ? op2 : &chNull))
return false;
op1=issuer1->getSPNameQualifier();
op2=issuer2->getSPNameQualifier();
if (!XMLString::equals(op1 ? op1 : &chNull, op2 ? op2 : &chNull))
return false;
return true;
}
bool SecurityPolicy::IssuerMatchingPolicy::issuerMatches(const Issuer* issuer1, const XMLCh* issuer2) const
{
// NULL matches anything for the purposes of this interface.
if (!issuer1 || !issuer2 || !*issuer2)
return true;
const XMLCh* op1=issuer1->getName();
if (!op1 || !XMLString::equals(op1,issuer2))
return false;
op1=issuer1->getFormat();
if (op1 && *op1 && !XMLString::equals(op1, NameIDType::ENTITY))
return false;
op1=issuer1->getNameQualifier();
if (op1 && *op1)
return false;
op1=issuer1->getSPNameQualifier();
if (op1 && *op1)
return false;
return true;
}
|