[jboss-svn-commits] JBL Code SVN: r17952 - in labs/jbosslabs/labs-3.0-build: configuration/resources/to-copy/server/default/conf and 7 other directories.
jboss-svn-commits at lists.jboss.org
jboss-svn-commits at lists.jboss.org
Fri Jan 18 09:09:29 EST 2008
Author: szimano
Date: 2008-01-18 09:09:29 -0500 (Fri, 18 Jan 2008)
New Revision: 17952
Added:
labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml
labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml
labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml
labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml
labs/jbosslabs/labs-3.0-build/resources/
labs/jbosslabs/labs-3.0-build/resources/README.txt
labs/jbosslabs/labs-3.0-build/resources/auth/
labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/axis.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-beanutils.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-codec-1.2.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-collections-3.1.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-configuration-1.1.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-digester.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-discovery-0.2.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-httpclient-3.0-rc2.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-lang-2.0.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-logging.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-modeler.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/jaxrpc.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/saaj.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-aop-2.0.7.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-beans-2.0.7.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-context-2.0.7.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-core-2.0.7.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-jmx-2.0.7.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/wsdl4j-1.5.1.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-common-20030701.jar
labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-xupdate-20040205.jar
labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp
Modified:
labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml
labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java
labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml
labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp
Log:
build configured with JOSSO JBLAB-901
Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml 2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,108 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!--
+ ~ JOSSO: Java Open Single Sign-On
+ ~
+ ~ Copyright 2004-2007, Atricore, Inc.
+ ~
+ ~ This is free software; you can redistribute it and/or modify it
+ ~ under the terms of the GNU Lesser General Public License as
+ ~ published by the Free Software Foundation; either version 2.1 of
+ ~ the License, or (at your option) any later version.
+ ~
+ ~ This software is distributed in the hope that it will be useful,
+ ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ ~ Lesser General Public License for more details.
+ ~
+ ~ You should have received a copy of the GNU Lesser General Public
+ ~ License along with this software; if not, write to the Free
+ ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ -->
+
+<!--
+JOSSO Agent configuration file.
+-->
+<agent>
+
+ <!-- JOSSO Agent classes -->
+ <!--class>org.josso.tc50.agent.CatalinaSSOAgent</class-->
+ <!--<class>org.josso.tc55.agent.CatalinaSSOAgent</class> -->
+ <!--class>org.josso.tc60.agent.CatalinaSSOAgent</class-->
+ <!--class>org.josso.jb32.agent.JBossCatalinaSSOAgent</class-->
+ <!--class>org.josso.jb4.agent.JBossCatalinaSSOAgent</class-->
+ <class>org.josso.jb42.agent.JBossCatalinaSSOAgent</class>
+
+ <!-- Login/Logout URLs -->
+ <gatewayLoginUrl>http://localhost:8080/josso/signon/login.do</gatewayLoginUrl>
+ <gatewayLogoutUrl>http://localhost:8080/josso/signon/logout.do</gatewayLogoutUrl>
+ <!--gatewayLoginErrorUrl>http://localhost:8080/josso/signon/login.do</gatewayLoginErrorUrl-->
+
+ <!--
+ Usefull when working in N-Tier modes behind a reverse proxy or load balancer
+ Here you should place the reverse proxy or load balancer base URL.
+
+ Note : When using this options, the gatewayLoginURL and gatewayLogoutURL should also point to this host.
+
+ <singlePointOfAccess>http://reverse-proxy-host:8080</singlePointOfAccess>
+
+ <gatewayLoginUrl>http://reverse-proxy-host:8080/josso/signon/login.do</gatewayLoginUrl>
+ <gatewayLogoutUrl>http://reverse-proxy-host:8080/josso/signon/logout.do</gatewayLogoutUrl>
+ -->
+
+ <!-- Mininum interval between sso session access , in milliseconds -->
+ <sessionAccessMinInterval>1000</sessionAccessMinInterval>
+
+ <!-- JOSSO Agent service locator configuration -->
+ <service-locator>
+ <class>org.josso.gateway.WebserviceGatewayServiceLocator</class>
+ <endpoint>localhost:8080</endpoint>
+
+ <!-- Associate an identity to SOAP messages
+ <username>wsclient</username>
+ <password>wsclientpwd</password>
+ -->
+
+ <!-- Enabled SSL on the SOAP circuit.
+ <transportSecurity>confidential</transportSecurity>
+ -->
+ </service-locator>
+
+ <!--
+ JOSSO Parnter application definicions :
+
+ Configure all web applications that should be a josso partner application within this server.
+ For each partner application you have to define the propper web-context.
+ -->
+ <partner-apps>
+
+ <partner-app>
+ <context>/partnerapp</context>
+ <!-- This is an optional feature :
+ You can reference any web resource collection that should not be subject to SSO protection.
+ The SSO agent will not provide identity nor demand authentication to requests matching the
+ security constraint associated to this web resource collections.
+ In order to work, the security constraint must not contain auth-constraints declarations.
+ See sample web.xml file from josso partnerapp.
+ <security-constraint>
+ <ignore-web-resource-collection>public-resources</ignore-web-resource-collection>
+ </security-constraint>
+ -->
+ </partner-app>
+
+ <!-- Other partner apps. -->
+ <partner-app>
+ <context>/foo-view</context>
+ </partner-app>
+
+
+ <!-- Root context protection
+ <partner-app>
+ <context>/</context>
+ </partner-app>
+ -->
+
+ </partner-apps>
+
+</agent>
+
Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml 2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,29 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+
+<!--
+ ~ JOSSO: Java Open Single Sign-On
+ ~
+ ~ Copyright 2004-2007, Atricore, Inc.
+ ~
+ ~ This is free software; you can redistribute it and/or modify it
+ ~ under the terms of the GNU Lesser General Public License as
+ ~ published by the Free Software Foundation; either version 2.1 of
+ ~ the License, or (at your option) any later version.
+ ~
+ ~ This software is distributed in the hope that it will be useful,
+ ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ ~ Lesser General Public License for more details.
+ ~
+ ~ You should have received a copy of the GNU Lesser General Public
+ ~ License along with this software; if not, write to the Free
+ ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ -->
+
+<configuration>
+ <!-- Comment this if no Agent is configured for this server -->
+ <hierarchicalXml fileName="josso-agent-config.xml"/>
+ <!-- Comment this if no Gateway is configured for this server -->
+ <hierarchicalXml fileName="josso-gateway-config.xml"/>
+</configuration>
Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml 2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,532 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!--
+ ~ JOSSO: Java Open Single Sign-On
+ ~
+ ~ Copyright 2004-2007, Atricore, Inc.
+ ~
+ ~ This is free software; you can redistribute it and/or modify it
+ ~ under the terms of the GNU Lesser General Public License as
+ ~ published by the Free Software Foundation; either version 2.1 of
+ ~ the License, or (at your option) any later version.
+ ~
+ ~ This software is distributed in the hope that it will be useful,
+ ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ ~ Lesser General Public License for more details.
+ ~
+ ~ You should have received a copy of the GNU Lesser General Public
+ ~ License along with this software; if not, write to the Free
+ ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ -->
+
+<domain>
+ <name>JOSSO</name>
+ <type>web</type>
+
+ <!--sso-web-config-->
+
+ <!-- Optional : The URL where the user will be redirected after a successfull login only if josso_back_to request parameter
+ is not present when accessing the login url
+ <loginBackToURL>http://localhost:8080/partnerapp/protected/</loginBackToURL>
+ -->
+
+ <!-- Optional : The URL where the user will be redirected after a logout only if josso_back_to is not present
+ when accessing the logout url
+ <logoutBackToURL>http://localhost:8080/partnerapp/protected/</logoutBackToURL>
+ -->
+
+ <!-- Session token properties -->
+ <!--session-token-->
+
+ <!-- Optional : Use a secure session token, a secure channel like SSL must be available for this to work
+ <secure>false</secure>
+ -->
+
+
+ <!--/session-token-->
+
+ <!--/sso-web-config-->
+ <sso-web-config>
+ <customLoginUrl>http://192.168.1.11/login.html</customLoginUrl>
+ </sso-web-config>
+
+ <authenticator>
+ <class>org.josso.auth.AuthenticatorImpl</class>
+ <authentication-schemes>
+ <!-- Basic Authentication Scheme -->
+ <authentication-scheme>
+ <name>basic-authentication</name>
+ <class>org.josso.auth.scheme.UsernamePasswordAuthScheme</class>
+
+ <!--
+ The message digest algorithm to be used when hashing passwords.
+ This must be an algorithm supported by the java.security.MessageDigest class
+ on your platform.
+
+ In J2SE 1.4.2 you can check :
+ Java Cryptography Architecture API Specification & Reference - Apendix B : Algorithms
+ Values are : MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512,etc.
+
+ To provide LDAP support, also CRYPT is available.
+ -->
+ <hashAlgorithm>MD5</hashAlgorithm>
+
+ <!-- Supported values are HEX, BASE64. Mandatory if hashAlgorithm was specified -->
+ <hashEncoding>HEX</hashEncoding>
+
+ <!-- Some hash algorithms, like CRYPT, use this property. The default value is 2.
+ <saltLength>2</saltLength>
+ -->
+
+ <ignorePasswordCase>false</ignorePasswordCase>
+ <ignoreUserCase>false</ignoreUserCase>
+
+ <!-- ========================================================= -->
+ <!-- JDBC Credential Store -->
+ <!-- -->
+ <!-- Always scape comma chars [,] in queries because -->
+ <!-- jakarta commons-configuration uses them to define arrays. -->
+ <!-- ========================================================= -->
+ <!-- -->
+ <!-- credential-store>
+ <class>org.josso.gateway.identity.service.store.db.JDBCIdentityStore</class>
+
+ <credentialsQueryString>
+
+ SELECT login AS username , password AS password FROM josso_user WHERE login = ?
+
+ </credentialsQueryString>
+ <connectionName>dotorgdata</connectionName>
+ <connectionPassword>dotorgdata</connectionPassword>
+ <connectionURL>jdbc:mysql://localhost:3306/dotorgdata?useServerPrepStmts=false</connectionURL>
+ <driverName>org.gjt.mm.mysql.Driver</driverName>
+ </credential-store-->
+ <credential-store>
+ <class>org.josso.gateway.identity.service.store.db.DataSourceIdentityStore</class>
+
+ <credentialsQueryString>SELECT pn_uname AS username, pn_pass AS password FROM nuke_users WHERE pn_uname = ?</credentialsQueryString>
+ <dsJndiName>java:JBossDS</dsJndiName>
+ </credential-store>
+
+
+ <!-- =============================================================== -->
+ <!-- LDAP Credential Store -->
+ <!-- -->
+ <!-- Chcek javadoc for configuration details : -->
+ <!-- org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore -->
+ <!-- =============================================================== -->
+ <!--
+ <credential-store>
+ <class>org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore</class>
+ <initialContextFactory>com.sun.jndi.ldap.LdapCtxFactory</initialContextFactory>
+ <providerUrl>ldap://ldaphost</providerUrl>
+ <securityPrincipal>cn=Manager,dc=my-domain,dc=com</securityPrincipal>
+ <securityCredential>secret</securityCredential>
+ <securityAuthentication>simple</securityAuthentication>
+ <ldapSearchScope>SUBTREE</ldapSearchScope>
+ <usersCtxDN>ou=People,dc=my-domain,dc=com</usersCtxDN>
+ <principalUidAttributeID>uid</principalUidAttributeID>
+ <rolesCtxDN>ou=Roles,dc=my-domain,dc=com</rolesCtxDN>
+ <uidAttributeID>uniquemember</uidAttributeID>
+ <roleAttributeID>cn</roleAttributeID>
+ <credentialQueryString>uid=username,userPassword=password</credentialQueryString>
+ <userPropertiesQueryString>mail=mail,cn=description</userPropertiesQueryString>
+ </credential-store>
+ -->
+
+ <!-- ================================================= -->
+ <!-- Memory Credential Store -->
+ <!-- ================================================= -->
+ <credential-store>
+ <class>org.josso.gateway.identity.service.store.MemoryIdentityStore</class>
+ <credentialsFileName>josso-credentials.xml</credentialsFileName>
+ </credential-store>
+
+ <!-- ================================================= -->
+ <!-- Credential Store Key adapter -->
+ <!-- ================================================= -->
+ <credential-store-key-adapter>
+ <class>org.josso.gateway.identity.service.store.SimpleIdentityStoreKeyAdapter</class>
+ </credential-store-key-adapter>
+
+ </authentication-scheme>
+
+ <!-- Strong Authentication Scheme -->
+ <authentication-scheme>
+ <name>strong-authentication</name>
+ <class>org.josso.auth.scheme.X509CertificateAuthScheme</class>
+
+ <!-- ========================================================= -->
+ <!-- JDBC Credential Store -->
+ <!-- -->
+ <!-- Always scape comma chars [,] in queries because -->
+ <!-- jakarta commons-configuration uses them to define arrays. -->
+ <!-- ========================================================= -->
+ <!--
+ <credential-store>
+ <class>org.josso.gateway.identity.service.store.db.JDBCIdentityStore</class>
+
+ <credentialsQueryString>
+
+ SELECT login AS username , password AS password FROM josso_user WHERE login = ?
+
+ </credentialsQueryString>
+ <connectionName>josso</connectionName>
+ <connectionPassword>josso</connectionPassword>
+ <connectionURL>jdbc:oracle:thin:@localhost:1521:josso_db</connectionURL>
+ <driverName>oracle.jdbc.driver.OracleDriver</driverName>
+ </credential-store>
+ -->
+
+ <!-- =============================================================== -->
+ <!-- LDAP Credential Store -->
+ <!-- -->
+ <!-- Chcek javadoc for configuration details : -->
+ <!-- org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore -->
+ <!-- =============================================================== -->
+ <!--
+ <credential-store>
+ <class>org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore</class>
+ <initialContextFactory>com.sun.jndi.ldap.LdapCtxFactory</initialContextFactory>
+ <providerUrl>ldap://ldaphost</providerUrl>
+ <securityPrincipal>cn=Manager,dc=my-domain,dc=com</securityPrincipal>
+ <securityCredential>secret</securityCredential>
+ <securityAuthentication>simple</securityAuthentication>
+ <ldapSearchScope>SUBTREE</ldapSearchScope>
+ <usersCtxDN>ou=People,dc=my-domain,dc=com</usersCtxDN>
+ <principalUidAttributeID>uid</principalUidAttributeID>
+ <rolesCtxDN>ou=Roles,dc=my-domain,dc=com</rolesCtxDN>
+ <uidAttributeID>uniquemember</uidAttributeID>
+ <roleAttributeID>cn</roleAttributeID>
+ <credentialQueryString>uid=username,userCertificate;binary=userCertificate</credentialQueryString>
+ <userPropertiesQueryString>mail=mail,cn=description</userPropertiesQueryString>
+ </credential-store>
+ -->
+
+ <!-- ================================================= -->
+ <!-- Memory Credential Store -->
+ <!-- ================================================= -->
+ <credential-store>
+ <class>org.josso.gateway.identity.service.store.MemoryIdentityStore</class>
+ <credentialsFileName>josso-credentials.xml</credentialsFileName>
+ </credential-store>
+
+ <!-- ================================================= -->
+ <!-- Credential Store Key adapter -->
+ <!-- ================================================= -->
+ <credential-store-key-adapter>
+ <class>org.josso.gateway.identity.service.store.SimpleIdentityStoreKeyAdapter</class>
+ </credential-store-key-adapter>
+
+ </authentication-scheme>
+ </authentication-schemes>
+ </authenticator>
+
+ <sso-identity-manager>
+
+ <class>org.josso.gateway.identity.service.SSOIdentityManagerImpl</class>
+
+ <!-- ========================================================= -->
+ <!-- DataSource Identity Store -->
+ <!-- -->
+ <!-- Always scape comma chars [,] in queries because -->
+ <!-- jakarta commons-configuration uses them to define arrays. -->
+ <!-- ========================================================= -->
+ <!-- -->
+ <sso-identity-store>
+ <class>org.josso.gateway.identity.service.store.db.DataSourceIdentityStore</class>
+
+ <userQueryString>
+ SELECT pn_uname AS login FROM nuke_users WHERE pn_uname = ?
+ </userQueryString>
+
+ <userPropertiesQueryString>
+ SELECT pn_name AS name , pn_bio AS value FROM nuke_users WHERE pn_uname = ?
+ </userPropertiesQueryString>
+
+ <rolesQueryString>
+ SELECT "admin" AS 'josso_role.name' UNION SELECT "user" AS 'josso_role.name' UNION SELECT ? UNION SELECT "role1";
+ </rolesQueryString>
+
+ <dsJndiName>java:JBossDS</dsJndiName>
+ </sso-identity-store>
+
+ <!-- ========================================================= -->
+ <!-- JDBC Identity Store -->
+ <!-- -->
+ <!-- Always scape comma chars [,] in queries because -->
+ <!-- jakarta commons-configuration uses them to define arrays. -->
+ <!-- ========================================================= -->
+
+ <!--sso-identity-store>
+ <class>org.josso.gateway.identity.service.store.db.JDBCIdentityStore</class>
+
+ <userQueryString>
+ SELECT login FROM josso_user WHERE login = ?
+ </userQueryString>
+
+ You could use a UNION to select properties from different tables/columns :
+ SELECT 'user.lastName' AS name , lastName AS value FROM josso_user WHERE login = ?
+ UNION
+ SELECT 'user.name' AS name , name AS value FROM josso_user WHERE login = ?
+ UNION
+ SELECT name AS name , value AS value FROM josso_user_properties WHERE login = ?
+
+ <userPropertiesQueryString>
+ SELECT 'user.description' AS name , description AS value FROM josso_user WHERE login = ?
+ UNION
+ SELECT name AS name , value AS value FROM josso_user_property WHERE login = ?
+ </userPropertiesQueryString>
+ <rolesQueryString>
+ SELECT josso_role.name FROM josso_role , josso_user_role , josso_user WHERE josso_user.login = ? AND josso_user.login = josso_user_role.login AND josso_role.name = josso_user_role.name
+ </rolesQueryString>
+ <connectionName>josso</connectionName>
+ <connectionPassword>josso</connectionPassword>
+ <connectionURL>jdbc:oracle:thin:@localhost:1521:josso_db</connectionURL>
+ <driverName>oracle.jdbc.driver.OracleDriver</driverName>
+ </sso-identity-store-->
+
+ <!-- =============================================================== -->
+ <!-- LDAP Identity Store -->
+ <!-- -->
+ <!-- Chcek javadoc for configuration details : -->
+ <!-- org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore -->
+ <!-- ================================================= -->
+ <!--
+ <sso-identity-store>
+ <class>org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore</class>
+ <initialContextFactory>com.sun.jndi.ldap.LdapCtxFactory</initialContextFactory>
+ <providerUrl>ldap://ldaphost</providerUrl>
+ <securityPrincipal>cn=Manager,dc=my-domain,dc=com</securityPrincipal>
+ <securityCredential>secret</securityCredential>
+ <securityAuthentication>simple</securityAuthentication>
+ <ldapSearchScope>SUBTREE</ldapSearchScope>
+ <usersCtxDN>ou=People,dc=my-domain,dc=com</usersCtxDN>
+ <principalUidAttributeID>uid</principalUidAttributeID>
+ <rolesCtxDN>ou=Roles,dc=my-domain,dc=com</rolesCtxDN>
+ <uidAttributeID>uniquemember</uidAttributeID>
+ <roleAttributeID>cn</roleAttributeID>
+ <credentialQueryString>uid=username,userPassword=password</credentialQueryString>
+ <userPropertiesQueryString>mail=mail,cn=description</userPropertiesQueryString>
+ </sso-identity-store>
+ -->
+
+ <!-- ================================================= -->
+ <!-- Memory Identity Store -->
+ <!-- ================================================= -->
+ <sso-identity-store>
+ <class>org.josso.gateway.identity.service.store.MemoryIdentityStore</class>
+ <usersFileName>josso-users.xml</usersFileName>
+ </sso-identity-store>
+
+ <!-- ================================================= -->
+ <!-- Identity Store Key adapter -->
+ <!-- ================================================= -->
+ <sso-identity-store-key-adapter>
+ <class>org.josso.gateway.identity.service.store.SimpleIdentityStoreKeyAdapter</class>
+ </sso-identity-store-key-adapter>
+
+ </sso-identity-manager>
+
+ <sso-session-manager>
+
+ <class>org.josso.gateway.session.service.SSOSessionManagerImpl</class>
+
+ <!--
+ Set the maximum time interval, in minutes, between client requests before the SSO Service will invalidate
+ the session. A negative time indicates that the session should never time out.
+ -->
+ <maxInactiveInterval>30</maxInactiveInterval>
+
+ <!-- Max number of sessions per user, default 1
+ A negative value indicates that an unlimited number of sessions per user is allowed.
+ -->
+ <maxSessionsPerUser>-1</maxSessionsPerUser>
+ <!--
+ If true, when the max number of sessions per user is exceeded,
+ an already existing session will be invalidated to create a new one.
+ If false, when the max number of sessions per user is exceeded,
+ an exception is thrown and the new session is not created.
+ -->
+ <invalidateExceedingSessions>false</invalidateExceedingSessions>
+
+
+ <!--
+ Time interval, in milliseconds, between exired sessions cleanup.
+ -->
+ <sessionMonitorInterval>10000</sessionMonitorInterval>
+
+ <!-- =================================================================== -->
+ <!-- Serialized Session Store -->
+ <!-- -->
+ <!-- Session Store implementation which uses Java Serialization to -->
+ <!-- persist Single Sign-On user sessions. -->
+ <!-- It allows to reconstruct the session state after a system shutdown. -->
+ <!-- =================================================================== -->
+ <!-- -->
+ <sso-session-store>
+ <class>org.josso.gateway.session.service.store.SerializedSessionStore</class>
+ <!-- file where serialized sessions will be stored (optional) -->
+ <serializedFile>/tmp/josso_sessions.ser</serializedFile>
+ </sso-session-store>
+
+
+
+ <!-- =============================================================== -->
+ <!-- DataSource Session Store -->
+ <!-- -->
+ <!-- This store persists SSO sessions in a RDBMS, it's usefull for -->
+ <!-- example when multiple SSO servers must share session information-->
+ <!-- like in a cluster. -->
+ <!-- -->
+ <!-- NOTE :Remember to escape spetial chars like < with < , etc -->
+ <!-- -->
+ <!-- -->
+ <!-- Chcek javadoc for configuration details : -->
+ <!-- org.josso.gateway.session.service.store.db.DataSourceSessionStore -->
+ <!-- =============================================================== -->
+ <!--
+ <sso-session-store>
+
+ <class>org.josso.gateway.session.service.store.db.DataSourceSessionStore</class>
+
+ <dsJndiName>java:JBossDS</dsJndiName>
+
+ <sizeQuery>SELECT COUNT(*) FROM JOSSO_SESSION</sizeQuery>
+ <keysQuery>SELECT session_id FROM JOSSO_SESSION</keysQuery>
+ <loadAllQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION</loadAllQuery>
+ <loadQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE session_id = ?</loadQuery>
+ <loadByUserNameQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE username = ?</loadByUserNameQuery>
+
+ <loadByLastAccessTimeQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE last_access_time < ?</loadByLastAccessTimeQuery>
+ <loadByValidQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE valid = ?</loadByValidQuery>
+ <deleteDml>DELETE FROM JOSSO_SESSION WHERE session_id = ?</deleteDml>
+ <deleteAllDml>DELETE FROM JOSSO_SESSION</deleteAllDml>
+ <insertDml>INSERT INTO JOSSO_SESSION (session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid) VALUES (?, ?, ?, ?, ?, ?, ?) </insertDml>
+
+
+
+ </sso-session-store>-->
+
+
+ <!-- =============================================================== -->
+ <!-- Jdbc Session Store -->
+ <!-- -->
+ <!-- This store persists SSO sessions in a RDBMS, it's usefull for -->
+ <!-- example when multiple SSO servers must share session information-->
+ <!-- like in a cluster. -->
+ <!-- -->
+ <!-- NOTE :Remember to escape spetial chars like < with < , etc -->
+ <!-- -->
+ <!-- Chcek javadoc for configuration details : -->
+ <!-- org.josso.gateway.session.service.store.db.JdbcSessionStore -->
+ <!-- =============================================================== -->
+ <!--
+ <sso-session-store>
+
+ <class>org.josso.gateway.session.service.store.db.JdbcSessionStore</class>
+
+ <connectionName>josso</connectionName>
+ <connectionPassword>josso</connectionPassword>
+ <connectionURL>jdbc:oracle:thin:@localhost:1521:josso_db</connectionURL>
+ <driverName>oracle.jdbc.driver.OracleDriver</driverName>
+
+ <sizeQuery>SELECT COUNT(*) FROM JOSSO_SESSION</sizeQuery>
+ <keysQuery>SELECT session_id FROM JOSSO_SESSION</keysQuery>
+ <loadAllQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION</loadAllQuery>
+ <loadQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE session_id = ?</loadQuery>
+ <loadByUserNameQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE username = ?</loadByUserNameQuery>
+
+ <loadByLastAccessTimeQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE last_access_time < ?</loadByLastAccessTimeQuery>
+ <loadByValidQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE valid = ?</loadByValidQuery>
+ <deleteDml>DELETE FROM JOSSO_SESSION WHERE session_id = ?</deleteDml>
+ <deleteAllDml>DELETE FROM JOSSO_SESSION</deleteAllDml>
+ <insertDml>INSERT INTO JOSSO_SESSION (session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid) VALUES (?, ?, ?, ?, ?, ?, ?) </insertDml>
+
+ </sso-session-store>
+ -->
+
+
+ <!-- =============================================================== -->
+ <!-- Memory Session Store -->
+ <!-- =============================================================== -->
+ <!-- sso-session-store>
+ <class>org.josso.gateway.session.service.store.MemorySessionStore</class>
+ </sso-session-store -->
+
+ <sso-session-id-generator>
+
+ <class>org.josso.gateway.session.service.SessionIdGeneratorImpl</class>
+ <!--
+ The message digest algorithm to be used when generating session
+ identifiers. This must be an algorithm supported by the
+ java.security.MessageDigest class on your platform.
+
+ In J2SE 1.4.2 you can check :
+ Java Cryptography Architecture API Specification & Reference - Apendix A : Standard Names
+ Values are : MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512
+ -->
+ <algorithm>MD5</algorithm>
+
+ </sso-session-id-generator>
+
+ </sso-session-manager>
+
+ <!-- SSO Audit Manager compoment -->
+ <sso-audit-manager>
+ <class>org.josso.gateway.audit.service.SSOAuditManagerImpl</class>
+
+ <!--
+ List of handlers that will process this request
+ Every handler must have its own unique name.
+ -->
+ <handlers>
+
+ <!-- This handler logs all audit trails using Log4J, under the given category -->
+ <handler>
+ <class>org.josso.gateway.audit.service.handler.LoggerAuditTrailHandler</class>
+ <name>LoggerAuditTrailHandler</name>
+ <category>org.josso.gateway.audit.SSO_AUDIT</category>
+ </handler>
+
+ <!--
+ <handler>
+ <class>MyOtherHandler</class>
+ <name>MyOhterHandlerName</name>
+ <myProperty>value</myProperty>
+ </handler>
+ -->
+
+ </handlers>
+ </sso-audit-manager>
+
+ <!-- SSO Event Manager component -->
+ <sso-event-manager>
+ <class>org.josso.gateway.event.security.JMXSSOEventManagerImpl</class>
+ <!--
+ JMX Name of the EventManager MBean that will send SSO Events as JMX Notifications
+ The MBean will be registered by the MBeanComponentKeeper.
+ -->
+ <oname>josso:type=SSOEventManager</oname>
+ <!-- You can add your own listeners here : -->
+ <!-- Every listener should have a unique name -->
+
+ <!--
+ <listeners>
+ <listener>
+ <class>com.myCompany.MyEventListener</class>
+ <name>MyEventListener</name>
+ <property1>MyListenerProperty1Value</property1>
+ </listener>
+ <listener>
+ <class>com.myCompany.MyOtherEventListener</class>
+ <name>MyOtherEventListener</name>
+ <propertyA>MyOtherListenerPropertyAValue</propertyA>
+ </listener>
+ </listeners>
+ -->
+
+ </sso-event-manager>
+
+</domain>
Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml 2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,206 @@
+<?xml version='1.0'?>
+<!DOCTYPE policy PUBLIC
+ "-//JBoss//DTD JBOSS Security Config 3.0//EN"
+ "http://www.jboss.org/j2ee/dtd/security_config.dtd">
+
+<!-- The XML based JAAS login configuration read by the
+ org.jboss.security.auth.login.XMLLoginConfig mbean. Add
+ an application-policy element for each security domain.
+
+ The outline of the application-policy is:
+ <application-policy name="security-domain-name">
+ <authentication>
+ <login-module code="login.module1.class.name" flag="control_flag">
+ <module-option name = "option1-name">option1-value</module-option>
+ <module-option name = "option2-name">option2-value</module-option>
+ ...
+ </login-module>
+
+ <login-module code="login.module2.class.name" flag="control_flag">
+ ...
+ </login-module>
+ ...
+ </authentication>
+ </application-policy>
+
+ $Revision: 64598 $
+-->
+
+<policy>
+ <!-- Used by clients within the application server VM such as
+ mbeans and servlets that access EJBs.
+ -->
+ <application-policy name="client-login">
+ <authentication>
+ <login-module code="org.jboss.security.ClientLoginModule"
+ flag="required">
+ <!-- Any existing security context will be restored on logout -->
+ <module-option name="restore-login-identity">
+ true
+ </module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+ <!-- Security domain for JBossMQ -->
+ <application-policy name="jbossmq">
+ <authentication>
+ <login-module
+ code="org.jboss.security.auth.spi.DatabaseServerLoginModule"
+ flag="required">
+ <module-option name="unauthenticatedIdentity">
+ guest
+ </module-option>
+ <module-option name="dsJndiName">
+ java:/DefaultDS
+ </module-option>
+ <module-option name="principalsQuery">
+ SELECT PASSWD FROM JMS_USERS WHERE USERID=?
+ </module-option>
+ <module-option name="rolesQuery">
+ SELECT ROLEID, 'Roles' FROM JMS_ROLES WHERE USERID=?
+ </module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+ <!-- Security domain for JBossMQ when using file-state-service.xml
+ <application-policy name = "jbossmq">
+ <authentication>
+ <login-module code = "org.jboss.mq.sm.file.DynamicLoginModule"
+ flag = "required">
+ <module-option name = "unauthenticatedIdentity">guest</module-option>
+ <module-option name = "sm.objectname">jboss.mq:service=StateManager</module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+ -->
+
+ <!-- Security domains for testing new jca framework -->
+ <application-policy name="HsqlDbRealm">
+ <authentication>
+ <login-module
+ code="org.jboss.resource.security.ConfiguredIdentityLoginModule"
+ flag="required">
+ <module-option name="principal">sa</module-option>
+ <module-option name="userName">sa</module-option>
+ <module-option name="password"></module-option>
+ <module-option name="managedConnectionFactoryName">
+ jboss.jca:service=LocalTxCM,name=DefaultDS
+ </module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+ <application-policy name="JmsXARealm">
+ <authentication>
+ <login-module
+ code="org.jboss.resource.security.ConfiguredIdentityLoginModule"
+ flag="required">
+ <module-option name="principal">guest</module-option>
+ <module-option name="userName">guest</module-option>
+ <module-option name="password">guest</module-option>
+ <module-option name="managedConnectionFactoryName">
+ jboss.jca:service=TxCM,name=JmsXA
+ </module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+ <!-- A template configuration for the jmx-console web application. This
+ defaults to the UsersRolesLoginModule the same as other and should be
+ changed to a stronger authentication mechanism as required.
+ -->
+ <application-policy name="jmx-console">
+ <authentication>
+ <login-module
+ code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+ flag="required">
+ <module-option name="usersProperties">
+ props/jmx-console-users.properties
+ </module-option>
+ <module-option name="rolesProperties">
+ props/jmx-console-roles.properties
+ </module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+ <!-- A template configuration for the web-console web application. This
+ defaults to the UsersRolesLoginModule the same as other and should be
+ changed to a stronger authentication mechanism as required.
+ -->
+ <application-policy name="web-console">
+ <authentication>
+ <login-module
+ code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+ flag="required">
+ <module-option name="usersProperties">
+ web-console-users.properties
+ </module-option>
+ <module-option name="rolesProperties">
+ web-console-roles.properties
+ </module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+ <!--
+ A template configuration for the JBossWS security domain.
+ This defaults to the UsersRolesLoginModule the same as other and should be
+ changed to a stronger authentication mechanism as required.
+ -->
+ <application-policy name="JBossWS">
+ <authentication>
+ <login-module
+ code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+ flag="required">
+ <module-option name="usersProperties">
+ props/jbossws-users.properties
+ </module-option>
+ <module-option name="rolesProperties">
+ props/jbossws-roles.properties
+ </module-option>
+ <module-option name="unauthenticatedIdentity">
+ anonymous
+ </module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+ <!-- The default login configuration used by any security domain that
+ does not have a application-policy entry with a matching name
+ -->
+ <application-policy name="other">
+ <!-- A simple server login module, which can be used when the number
+ of users is relatively small. It uses two properties files:
+ users.properties, which holds users (key) and their password (value).
+ roles.properties, which holds users (key) and a comma-separated list of
+ their roles (value).
+ The unauthenticatedIdentity property defines the name of the principal
+ that will be used when a null username and password are presented as is
+ the case for an unuathenticated web client or MDB. If you want to
+ allow such users to be authenticated add the property, e.g.,
+ unauthenticatedIdentity="nobody"
+ -->
+ <authentication>
+ <login-module
+ code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+ flag="required" />
+ </authentication>
+ </application-policy>
+
+ <application-policy name="josso">
+ <authentication>
+ <login-module
+ code="org.josso.jb42.agent.JBossSSOGatewayLoginModule"
+ flag="required">
+ <module-option name="debug">true</module-option>
+ </login-module>
+ </authentication>
+ </application-policy>
+
+
+
+</policy>
+
Modified: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml 2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml 2008-01-18 14:09:29 UTC (rev 17952)
@@ -41,7 +41,15 @@
emptySessionPath="true" enableLookups="false" redirectPort="8443" />
<Engine name="jboss.web" defaultHost="localhost">
+
+ <!-- JOSS Realm -->
+ <Realm className="org.josso.jb42.agent.JBossCatalinaRealm"
+ appName="josso"
+ userClassNames="org.josso.gateway.identity.service.BaseUserImpl"
+ roleClassNames="org.josso.gateway.identity.service.BaseRoleImpl"
+ debug="1" />
+
<!-- The JAAS based authentication and authorization realm implementation
that is compatible with the jboss 3.2.x realm implementation.
- certificatePrincipal : the class name of the
@@ -55,10 +63,13 @@
+ strictAuthOnly = Allow any authenticated user only if there are no
web-app/security-roles
-->
- <Realm className="org.jboss.web.tomcat.security.JBossSecurityMgrRealm"
+
+
+ <!-- <Realm className="org.jboss.web.tomcat.security.JBossSecurityMgrRealm"
certificatePrincipal="org.jboss.security.auth.certs.SubjectDNMapping"
allRolesMode="authOnly"
- />
+ /> -->
+
<!-- A subclass of JBossSecurityMgrRealm that uses the authentication
behavior of JBossSecurityMgrRealm, but overrides the authorization
checks to use JACC permissions with the current java.security.Policy
@@ -158,6 +169,9 @@
<Valve className="org.jboss.web.tomcat.service.jca.CachedConnectionValve"
cachedConnectionManagerObjectName="jboss.jca:service=CachedConnectionManager"
transactionManagerObjectName="jboss:service=TransactionManager" />
+
+ <!-- JOSSO SECURITY -->
+ <Valve className="org.josso.tc55.agent.SSOAgentValve" debug="1"/>
</Host>
Added: labs/jbosslabs/labs-3.0-build/resources/README.txt
===================================================================
--- labs/jbosslabs/labs-3.0-build/resources/README.txt (rev 0)
+++ labs/jbosslabs/labs-3.0-build/resources/README.txt 2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,2 @@
+Put all sample configuration files etc. here
+
Added: labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp
===================================================================
--- labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp (rev 0)
+++ labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp 2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,28 @@
+<%--
+ ~ JOSSO: Java Open Single Sign-On
+ ~
+ ~ Copyright 2004-2007, Atricore, Inc.
+ ~
+ ~ This is free software; you can redistribute it and/or modify it
+ ~ under the terms of the GNU Lesser General Public License as
+ ~ published by the Free Software Foundation; either version 2.1 of
+ ~ the License, or (at your option) any later version.
+ ~
+ ~ This software is distributed in the hope that it will be useful,
+ ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ ~ Lesser General Public License for more details.
+ ~
+ ~ You should have received a copy of the GNU Lesser General Public
+ ~ License along with this software; if not, write to the Free
+ ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ --%>
+
+<%@page contentType="text/html; charset=iso-8859-1" language="java" session="true" %>
+<!--
+Redirects the user to the propper login page. Configured as the login url the web.xml for this application.
+-->
+<%
+ response.sendRedirect(request.getContextPath() + "/josso_login/");
+%>
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/axis.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/axis.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-beanutils.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-beanutils.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-codec-1.2.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-codec-1.2.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-collections-3.1.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-collections-3.1.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-configuration-1.1.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-configuration-1.1.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-digester.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-digester.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-discovery-0.2.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-discovery-0.2.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-httpclient-3.0-rc2.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-httpclient-3.0-rc2.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-lang-2.0.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-lang-2.0.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-logging.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-logging.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-modeler.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-modeler.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/jaxrpc.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/jaxrpc.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/saaj.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/saaj.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-aop-2.0.7.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-aop-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-beans-2.0.7.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-beans-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-context-2.0.7.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-context-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-core-2.0.7.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-core-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-jmx-2.0.7.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-jmx-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/wsdl4j-1.5.1.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/wsdl4j-1.5.1.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-common-20030701.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-common-20030701.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-xupdate-20040205.jar
===================================================================
(Binary files differ)
Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-xupdate-20040205.jar
___________________________________________________________________
Name: svn:mime-type
+ application/octet-stream
Modified: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java 2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java 2008-01-18 14:09:29 UTC (rev 17952)
@@ -29,7 +29,16 @@
resp
.getWriter()
.println(
- "<html><head><title>hello world</title></head><body><h1>Hello World[changed] !</h1>Foo says: "
+ "<html><head><title>hello world</title></head><body><h1>Hello World[changed] !</h1>");
+ if (req.getUserPrincipal() != null) {
+ resp
+ .getWriter()
+ .println("Authenticated as: "+req.getUserPrincipal().getName()+"<br/>");
+ }
+
+ resp
+ .getWriter()
+ .println("Foo says: "
+ "Foo["+ fooService.sayFoo().id + "]<br/></body></html>");
} catch (NamingException e) {
log(e.getMessage(), e);
Modified: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml 2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml 2008-01-18 14:09:29 UTC (rev 17952)
@@ -2,40 +2,39 @@
<!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
"http://java.sun.com/dtd/web-app_2_3.dtd">
<web-app>
- <display-name>Foo Web Application</display-name>
- <servlet>
- <servlet-name>FooServlet</servlet-name>
- <display-name>FooServlet</display-name>
- <description>My foo servlet</description>
- <servlet-class>org.jboss.labs.MyServlet</servlet-class>
- <load-on-startup>1</load-on-startup>
- <security-role-ref>
- <role-name>Authenticated</role-name>
- <role-link>Authenticated</role-link>
- </security-role-ref>
- </servlet>
- <servlet-mapping>
- <servlet-name>FooServlet</servlet-name>
- <url-pattern>/*</url-pattern>
- </servlet-mapping>
- <security-constraint>
- <web-resource-collection>
- <web-resource-name>Authenticated</web-resource-name>
- <url-pattern>/auth/*</url-pattern>
- </web-resource-collection>
- <auth-constraint>
- <role-name>Authenticated</role-name>
- </auth-constraint>
- </security-constraint>
- <login-config>
- <auth-method>FORM</auth-method>
- <realm-name>file</realm-name>
- <form-login-config>
- <form-login-page>/login/logon.jsp</form-login-page>
- <form-error-page>/login/logonError.jsp</form-error-page>
- </form-login-config>
- </login-config>
- <security-role>
- <role-name>Authenticated</role-name>
- </security-role>
+ <display-name>Foo Web Application</display-name>
+ <servlet>
+ <servlet-name>FooServlet</servlet-name>
+ <display-name>FooServlet</display-name>
+ <description>My foo servlet</description>
+ <servlet-class>org.jboss.labs.MyServlet</servlet-class>
+ <load-on-startup>1</load-on-startup>
+ <security-role-ref>
+ <role-name>user</role-name>
+ <role-link>user</role-link>
+ </security-role-ref>
+ </servlet>
+ <servlet-mapping>
+ <servlet-name>FooServlet</servlet-name>
+ <url-pattern>*.ole</url-pattern>
+ </servlet-mapping>
+ <security-constraint>
+ <web-resource-collection>
+ <web-resource-name>Authenticated</web-resource-name>
+ <url-pattern>/auth/*</url-pattern>
+ </web-resource-collection>
+ <auth-constraint>
+ <role-name>user</role-name>
+ </auth-constraint>
+ </security-constraint>
+ <login-config>
+ <auth-method>FORM</auth-method>
+ <form-login-config>
+ <form-login-page>/login-redirect.jsp</form-login-page>
+ <form-error-page>/login-redirect.jsp</form-error-page>
+ </form-login-config>
+ </login-config>
+ <security-role>
+ <role-name>user</role-name>
+ </security-role>
</web-app>
Modified: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp 2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp 2008-01-18 14:09:29 UTC (rev 17952)
@@ -1,5 +1,5 @@
<html>
<body>
-<h2>Hello World!</h2>
+<h2>This is a foo page</h2>
</body>
</html>
Added: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp (rev 0)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp 2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,28 @@
+<%--
+ ~ JOSSO: Java Open Single Sign-On
+ ~
+ ~ Copyright 2004-2007, Atricore, Inc.
+ ~
+ ~ This is free software; you can redistribute it and/or modify it
+ ~ under the terms of the GNU Lesser General Public License as
+ ~ published by the Free Software Foundation; either version 2.1 of
+ ~ the License, or (at your option) any later version.
+ ~
+ ~ This software is distributed in the hope that it will be useful,
+ ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ ~ Lesser General Public License for more details.
+ ~
+ ~ You should have received a copy of the GNU Lesser General Public
+ ~ License along with this software; if not, write to the Free
+ ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+ ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+ --%>
+
+<%@page contentType="text/html; charset=iso-8859-1" language="java" session="true" %>
+<!--
+Redirects the user to the propper login page. Configured as the login url the web.xml for this application.
+-->
+<%
+ response.sendRedirect(request.getContextPath() + "/josso_login/");
+%>
More information about the jboss-svn-commits
mailing list