Author: dklco
Date: Mon Apr 29 14:22:34 2013
New Revision: 1477098

URL: http://svn.apache.org/r1477098
Log:
Migrated /site/openid-authenticationhandler.html

Modified:
    
sling/site/trunk/content/documentation/the-sling-engine/authentication/authentication-authenticationhandler/openid-authenticationhandler.mdtext
    sling/site/trunk/content/site/.htaccess

Modified: 
sling/site/trunk/content/documentation/the-sling-engine/authentication/authentication-authenticationhandler/openid-authenticationhandler.mdtext
URL: 
http://svn.apache.org/viewvc/sling/site/trunk/content/documentation/the-sling-engine/authentication/authentication-authenticationhandler/openid-authenticationhandler.mdtext?rev=1477098&r1=1477097&r2=1477098&view=diff
==============================================================================
--- 
sling/site/trunk/content/documentation/the-sling-engine/authentication/authentication-authenticationhandler/openid-authenticationhandler.mdtext
 (original)
+++ 
sling/site/trunk/content/documentation/the-sling-engine/authentication/authentication-authenticationhandler/openid-authenticationhandler.mdtext
 Mon Apr 29 14:22:34 2013
@@ -28,7 +28,7 @@ In this case the OpenID authenticator ca
 |--|--|
 | `resource` | The location to which the user initially requested access and 
that caused the `requestCredentials` method to be called. This may not be set 
(or be set to an empty string). |
 | `j_reason` | The reason why an earlier attempt at authentication with the 
OpenID authentication handler failed. This request parameter is only set if the 
same named request attribute has been set by the `extractCredentials` or the 
`authenticationFailed` method. The value of the parameter is the name of one of 
the `OpenIDFailure` constants. |
-| `j*openid*identity` | The OpenID identity which could not successfully be 
associated with an existing JCR user. This request parameter is only set if the 
`authenticationFailed` method has been called due to inability to associate an 
existing and validated OpenID identity with an existing JCR user. |
+| `j_openid_identity` | The OpenID identity which could not successfully be 
associated with an existing JCR user. This request parameter is only set if the 
`authenticationFailed` method has been called due to inability to associate an 
existing and validated OpenID identity with an existing JCR user. |
 
 The OpenID Authentication handlers supports the following request parameters 
submitted by the HTML form:
 
@@ -47,7 +47,7 @@ The OpenID AuthenticationHandler is conf
 |--|--|--|
 | `path` | -- | Repository path for which this authentication handler should 
be used by Sling. If this is empty, the authentication handler will be 
disabled. |
 | `openid.login.form` | `/system/sling/openid/login` | This should provide a 
way to capture the user's OpenID identifier.  This is not the OpenID Provider's 
login page, however, it does not have to be a local URL. If it is a local Sling 
URL, it must be accessible by the anonymous user. The user is HTTP Redirect'ed 
to this URL.  This page should POST back the user's OpenID identifier (as named 
by the "OpenID identifier form field" property) to the originally requested URL 
set in the "resource" request parameter. |
-| `openid.login.identifier` | `openid*identifier` | The name of the form 
parameter that provides the user's OpenID identifier. By convention this is 
`openid*identifier`. Only change this if you have a very good reason to do so. |
+| `openid.login.identifier` | `openid_identifier` | The name of the form 
parameter that provides the user's OpenID identifier. By convention this is 
`openid_identifier`. Only change this if you have a very good reason to do so. |
 | `openid.external.url.prefix` | -- | The prefix of URLs generated for the 
`ReturnTo` and `TrustRoot` properties of the OpenID request to the OpenID 
provider. Thus this URL prefix should bring back the authenticated user to this 
Sling instance. Configuring this property is usually necessary when running 
Sling behind a proxy (like Apache) since proxy mapping is not performed on the 
OpenID ReturnTo and TrustRoot URLs as they are sent to the OpenID Provider as 
form parameters.  If this property is empty, the URLs are generated using the 
hostname found in the original request.|
 | `openid.use.cookie` | `true` |  Whether to use a regular Cookie or an HTTP 
Session to cache the OpenID authentication details. By default a regular cookie 
is used to prevent use of HTTP Sessions. |
 | `openid.cookie.domain` | -- | Domain of cookie used to persist 
authentication. This defaults to the host name of the Sling server but may be 
set to a different value to share the cookie amongst a server farm or if the 
server is running behind a proxy. Only used if 'Use Cookie' is checked. |
@@ -87,7 +87,7 @@ If the parameter is not set or is set to
 |--|--|
 | `resource` | The location to which the user initially requested access and 
that caused the `requestCredentials` method to be called. |
 | `j_reason` | The reason why an earlier attempt at authentication with the 
OpenID authentication handler failed. This request parameter is only set if the 
same named request attribute has been set by the `extractCredentials` or the 
`authenticationFailed` method. The value of the parameter is the name of one of 
the `OpenIDFailure` constants. |
-| `j*openid*identity` | The OpenID identity which could not successfully be 
associated with an existing JCR user. This request parameter is only set if the 
`authenticationFailed` method has been called due to inability to associate an 
existing and validated OpenID identity with an existing JCR user. |
+| `j_openid_identity` | The OpenID identity which could not successfully be 
associated with an existing JCR user. This request parameter is only set if the 
`authenticationFailed` method has been called due to inability to associate an 
existing and validated OpenID identity with an existing JCR user. |
 
 
 
@@ -102,7 +102,7 @@ Invalidates the OpenID identity currentl
 
 This method is called, if the Credentials provided by the Authentication 
Handler could not be validated by the Jackrabbit authentication infrastructure. 
One cause may be that the integration with Jackrabbit has not been completed 
(see *Integration with Jackrabbit* below). Another, more probably cause, is 
that the validated OpenID identifier cannot be associated with an existing JCR 
user.
 
-The OpenID Authentication Handler implementation of the `authenticationFailed` 
method sets the `j*reason` request attribute to `OpenIDFailure.REPOSITORY` and 
sets the `j*openid_identity` request attribute to the OpenID identity of the 
authenticated user.
+The OpenID Authentication Handler implementation of the `authenticationFailed` 
method sets the `j_reason` request attribute to `OpenIDFailure.REPOSITORY` and 
sets the `j_openid_identity` request attribute to the OpenID identity of the 
authenticated user.
 
 A login form provider may wish to act upon this situation and provide a login 
form to the user to allow to his OpenID identity with an existing JCR user.
 
@@ -117,7 +117,7 @@ The OpenID Authentication Handler implem
 
 The OpenID authentication handler can be integrated in two ways into the 
Jackrabbit authentication mechanism which is based on JAAS `LoginModule`. One 
integration is by means of a `LoginModulePlugin` which plugs into the 
extensible `LoginModule` architecture supported by the Sling Jackrabbit 
Embedded Repository bundle.
 
-The other integration option is the `trusted*credentials*attribute` mechanism 
supported by the Jackrabbit `DefaultLoginModule`. By setting the 
`trusted*credentials*attribute` parameter of the Jackrabbit 
`DefaultLoginModule` and the `openid.user.attr` configuration property of the 
OpenID Authentication Handler to the same value, the existence of an attribute 
of that name in the `SimpleCredentials` instance provided to the 
`Repository.login` method signals pre-authenticated credentials, which need not 
be further checked by the `DefaultLoginModule`.
+The other integration option is the `trusted_credentials_attribute` mechanism 
supported by the Jackrabbit `DefaultLoginModule`. By setting the 
`trusted_credentials_attribute` parameter of the Jackrabbit 
`DefaultLoginModule` and the `openid.user.attr` configuration property of the 
OpenID Authentication Handler to the same value, the existence of an attribute 
of that name in the `SimpleCredentials` instance provided to the 
`Repository.login` method signals pre-authenticated credentials, which need not 
be further checked by the `DefaultLoginModule`.
 
 
 ### Security Considerations
@@ -126,6 +126,6 @@ OpenIDAuthentication has some limitation
 
 1. User name and password are transmitted in plain text in the initial form 
submission.
 1. The Cookie used to provide the authentication state or the HTTP Session ID 
may be stolen.
-1. When using the `trusted*credentials*attribute` mechanism, any intruder 
knowing the attribute name may log into the repository as any existing JCR 
user. The better option is to be based on the `LoginModulePlugin` mechanism.
+1. When using the `trusted_credentials_attribute` mechanism, any intruder 
knowing the attribute name may log into the repository as any existing JCR 
user. The better option is to be based on the `LoginModulePlugin` mechanism.
 
 To prevent eavesdroppers from sniffing the credentials or stealing the Cookie 
a secure transport layer should be used such as TLS/SSL, VPN or IPSec.

Modified: sling/site/trunk/content/site/.htaccess
URL: 
http://svn.apache.org/viewvc/sling/site/trunk/content/site/.htaccess?rev=1477098&r1=1477097&r2=1477098&view=diff
==============================================================================
--- sling/site/trunk/content/site/.htaccess (original)
+++ sling/site/trunk/content/site/.htaccess Mon Apr 29 14:22:34 2013
@@ -21,4 +21,5 @@ Redirect Permanent /site/adapters.html /
 Redirect Permanent /site/apache-sling-commons-thread-pool.html 
/documentation/bundles/apache-sling-commons-thread-pool.html
 Redirect Permanent /site/apache-sling-community-roles-and-processes.html 
/project-information/apache-sling-community-roles-and-processes.html
 Redirect Permanent /site/authentication-actors.html 
/documentation/the-sling-engine/authentication/authentication-actors.html
-Redirect Permanent /site/form-based-authenticationhandler.html 
/documentation/the-sling-engine/authentication/authentication-authenticationhandler/form-based-authenticationhandler.html
\ No newline at end of file
+Redirect Permanent /site/form-based-authenticationhandler.html 
/documentation/the-sling-engine/authentication/authentication-authenticationhandler/form-based-authenticationhandler.html
+Redirect Permanent /site/openid-authenticationhandler.html 
/documentation/the-sling-engine/authentication/authentication-authenticationhandler/openid-authenticationhandler.html
\ No newline at end of file


Reply via email to