/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at
* docs/licenses/cddl.txt
* or http://www.opensource.org/licenses/cddl1.php.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at
* docs/licenses/cddl.txt. If applicable,
* add the following below this CDDL HEADER, with the fields enclosed
* by brackets "[]" replaced with your own identifying information:
* Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*
*
* Copyright 2016 UnboundID Corp.
*/
package com.unboundid.directory.sdk.examples;
import com.fasterxml.jackson.databind.JsonNode;
import com.fasterxml.jackson.databind.node.ArrayNode;
import com.fasterxml.jackson.databind.node.ObjectNode;
import com.unboundid.directory.sdk.broker.api.IdentityAuthenticator;
import com.unboundid.directory.sdk.broker.config.IdentityAuthenticatorConfig;
import com.unboundid.directory.sdk.broker.types.AuthenticationRequest;
import com.unboundid.directory.sdk.broker.types.AuthenticationResult;
import com.unboundid.directory.sdk.broker.types.BrokerContext;
import com.unboundid.directory.sdk.broker.types.ScimResourcePrincipal;
import com.unboundid.directory.sdk.broker.types.StatusRequest;
import com.unboundid.directory.sdk.broker.types.StatusResult;
import com.unboundid.ldap.sdk.LDAPException;
import com.unboundid.scim2.common.GenericScimResource;
import com.unboundid.scim2.common.exceptions.ScimException;
import com.unboundid.scim2.common.utils.JsonUtils;
import com.unboundid.util.args.ArgumentException;
import com.unboundid.util.args.ArgumentParser;
import com.unboundid.util.args.StringArgument;
import java.io.IOException;
import java.util.HashMap;
import java.util.Map;
/**
* This example provides an example implementation of an Identity Authenticator
* which provides additional assurance of an already authenticated user.
* In the first step, the authenticator returns the set of security questions
* in the user resource. In the second step, the authenticator checks that the
* correct answer has been provided for the question the user selected to
* answer.
*/
public class ExampleIdentityAuthenticator extends IdentityAuthenticator
{
// The name of the argument that will be used to specify the path to a
// user resource attribute containing the set of security questions.
private static final String ARG_NAME_QUESTION_ATTRIBUTE_PATH =
"question-attribute-path";
// Handle to the ServerContext object.
private BrokerContext serverContext;
// The path of the user resource attribute containing the set of security
// questions.
private String attrPath;
/**
* {@inheritDoc}
*/
@Override
public String getExtensionName()
{
return "Example Identity Authenticator";
}
/**
* {@inheritDoc}
*/
@Override
public String[] getExtensionDescription()
{
return new String[]
{
"This example provides an example implementation of an Identity " +
"Authenticator which provides additional assurance of an already " +
"authenticated user. In the first step, the authenticator " +
"returns the set of security questions in the user resource. In " +
"the second step, the authenticator checks that the correct " +
"answer has been provided for the question the user selected " +
"to answer."
};
}
/**
* {@inheritDoc}
*/
@Override
public void defineConfigArguments(final ArgumentParser parser)
throws ArgumentException
{
final String description =
"The path to a multi-valued complex user resource attribute " +
"containing the set of security questions. An example value " +
"is { \"question\": \"What is your favorite color?\", " +
"\"answer\": \"Yellow\" }";
final StringArgument attrPathArg =
new StringArgument(null, ARG_NAME_QUESTION_ATTRIBUTE_PATH,
true, 1, "{attr-path}", description);
parser.addArgument(attrPathArg);
}
/**
* Initializes this authenticator. Any initialization should be performed
* here. This method should generally store the {@link BrokerContext} in
* a class member so that it can be used elsewhere in the implementation.
*
* @param serverContext A handle to the server context for the server in
* which this extension is running. Extensions should
* typically store this in a class member.
* @param config The general configuration for this object.
* @param parser The argument parser which has been initialized from
* the configuration for this authenticator.
* @throws LDAPException If a problem occurs while initializing this
* authenticator.
*/
@Override
public void initializeAuthenticator(final BrokerContext serverContext,
final IdentityAuthenticatorConfig config,
final ArgumentParser parser)
throws LDAPException
{
this.serverContext = serverContext;
final StringArgument attrPathArg =
(StringArgument) parser.getNamedArgument(
ARG_NAME_QUESTION_ATTRIBUTE_PATH);
attrPath = attrPathArg.getValue();
}
/**
* This hook is called when the Identity Authenticator is disabled or the
* server shuts down. Any clean-up of this Identity Authenticator should
* be performed here.
* <p>
* The default implementation is empty.
*/
@Override
public void finalizeAuthenticator()
{
// No implementation is needed in this example.
}
/**
* {@inheritDoc}
*/
@Override
public StatusResult getStatus(final StatusRequest request)
{
if (request.getPrincipal() == null)
{
return StatusResult.notReady().build();
}
final Map<String, String> questionsAndAnswers;
try
{
questionsAndAnswers = getQuestionsAndAnswers(request.getPrincipal());
}
catch (ScimException e)
{
return StatusResult.notReady("serverError", e.getMessage()).build();
}
if (questionsAndAnswers.isEmpty())
{
return StatusResult.notReady().build();
}
final ObjectNode responseParams =
JsonUtils.getJsonNodeFactory().objectNode();
// Return the current state for this authentication flow.
ArrayNode questions = responseParams.putArray("questions");
for(String question : questionsAndAnswers.keySet())
{
questions.add(question);
}
return StatusResult.ready()
.setResponseParams(responseParams.toString())
.build();
}
/**
* {@inheritDoc}
*/
@Override
public AuthenticationResult authenticate(
final AuthenticationRequest request)
{
// This is the second step where we check the answer provided.
if (request.getPrincipal() == null)
{
return AuthenticationResult.failure("serverError",
"The example authenticator requires an " +
"authenticated principal").build();
}
final ObjectNode requestParams =
toObjectNode(request.getRequestParameters());
final String selectedQuestion = requestParams.path("question").textValue();
final String providedAnswer = requestParams.path("answer").textValue();
if(selectedQuestion == null || providedAnswer == null)
{
return AuthenticationResult.failure("badRequest",
"A selected question and the answer must be specified").build();
}
final Map<String, String> questionsAndAnswers;
try
{
questionsAndAnswers = getQuestionsAndAnswers(request.getPrincipal());
}
catch (ScimException e)
{
return AuthenticationResult.failure("serverError",
e.getMessage()).build();
}
// Find the answer to the selected question.
String expectedAnswer = null;
for(Map.Entry<String, String> questionAndAnswer :
questionsAndAnswers.entrySet())
{
if(questionAndAnswer.getKey().equals(selectedQuestion))
{
expectedAnswer = questionAndAnswer.getValue();
break;
}
}
final ObjectNode responseParams =
JsonUtils.getJsonNodeFactory().objectNode();
ArrayNode questions = responseParams.putArray("questions");
for(String question : questionsAndAnswers.keySet())
{
questions.add(question);
}
if(expectedAnswer == null)
{
return AuthenticationResult.failure("badRequest",
"The selected question is invalid").
setResponseParams(responseParams.toString()).build();
}
if (expectedAnswer.equalsIgnoreCase(providedAnswer.trim()))
{
// Correct answer.
return AuthenticationResult.success(request.getPrincipal())
.setResponseParams(responseParams.toString())
.build();
}
else
{
// Incorrect answer.
return AuthenticationResult.failure("incorrectAnswer", null)
.setResponseParams(responseParams.toString())
.build();
}
}
/**
* Retrieve the question and answers from the provided user.
*
* @param principal The user whose questions and answers to retrieve.
* @return The questions and answers.
* @throws ScimException If an error occurs during retrieval.
*/
private Map<String, String> getQuestionsAndAnswers(
final ScimResourcePrincipal principal)
throws ScimException
{
final JsonNode node;
// This is the first step where we choose a question from those available
// in the principal's SCIM resource.
final GenericScimResource scimResource =
serverContext.getInternalScimInterface().retrieve(
principal.getResourceEndpoint(),
principal.getResourceId(),
GenericScimResource.class);
node = scimResource.getValue(attrPath);
final Map<String, String> questionsAndAnswers =
new HashMap<String, String>();
if (node.isArray())
{
final ArrayNode arrayNode = (ArrayNode) node;
for (JsonNode n : arrayNode)
{
if (n.isObject())
{
ObjectNode objectNode = (ObjectNode)n;
final String question = objectNode.path("question").asText();
final String answer = objectNode.path("answer").asText();
if (!question.isEmpty() && !answer.isEmpty())
{
questionsAndAnswers.put(question, answer);
}
}
}
}
return questionsAndAnswers;
}
/**
* Parse a JSON object in string form into an ObjectNode.
*
* @param jsonString The string containing a JSON object.
* @return The parsed ObjectNode.
*/
private ObjectNode toObjectNode(final String jsonString)
{
if (jsonString == null)
{
return null;
}
try
{
return (ObjectNode)JsonUtils.getObjectReader().readTree(jsonString);
}
catch (IOException e)
{
return null;
}
}
}