package your.app;
import java.io.IOException;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.NameCallback;
import javax.security.auth.callback.PasswordCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.login.LoginContext;
import javax.security.auth.login.LoginException;
public class KerberosAuth {
public static void main(String[] args) {
String userName = "[EMAIL PROTECTED]";
char[] password = "mypassword".toCharArray();
System.setProperty("java.security.auth.login.config",
KerberosAuth.class.getResource("/kerberos.conf").toExternalForm());
System.setProperty("java.security.krb5.realm", "MYREALM.COM");
System.setProperty("java.security.krb5.kdc", "mykdc.MYREALM.COM");
try {
LoginContext lc = new LoginContext("primaryLoginContext", new
UserNamePasswordCallbackHandler(userName, password));
lc.login();
System.out.println("KerberosAuth.main: " + lc.getSubject());
}
catch (LoginException le) {
le.printStackTrace();
}
}
public static class UserNamePasswordCallbackHandler implements
CallbackHandler {
private String _userName; private char[] _password;public UserNamePasswordCallbackHandler(String userName, char[] password) {
_userName = userName;
_password = password;
}
public void handle(Callback[] callbacks) throws IOException,
UnsupportedCallbackException {
for (Callback callback : callbacks) {
if (callback instanceof NameCallback && _userName != null) {
((NameCallback) callback).setName(_userName);
}
else if (callback instanceof PasswordCallback && _password !=
null) {
((PasswordCallback) callback).setPassword(_password);
}
}
}
}
}
put kerberos.conf (in this example) inside your Sources folder with
the contents:
primaryLoginContext {
com.sun.security.auth.module.Krb5LoginModule required client=true
useTicketCache=false;
};"java.security.auth.login.config" can map to a File or a URL. Annoyingly it appears that it cannot map to the actual contents of the file -- it has to be loaded from a URL, which seems completely stupid to me (as does just about all of the JAAS/GSSAPI api's, which were clearly written by "cryptography engineers" and not "normal humans").
I have not tried this against Active Directory, yet, just Open Directory ... I'll be trying Active Directory soon and post with info. One thing that's actually pretty damn slick is that if you need this in a Java client application (i.e. non-web-app) you can set "useTicketCache=true" and it will actually use your Kerberos info from the OS ticket cache, which means it actually does proper single sign- on. You can also combine this (which is what we plan to do) with SPNEGO using mod_krb5 on Apache. So you can have mod_krb5 do SPNEGO auth (and just read the user info from the remote user header), and use this as a fall-back if the user is not using a SPNEGO-compatible browser.
ms
_______________________________________________ Do not post admin requests to the list. They will be ignored. Webobjects-dev mailing list ([email protected]) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/webobjects-dev/archive%40mail-archive.com This email sent to [EMAIL PROTECTED]
