[jboss-svn-commits] JBL Code SVN: r17952 - in labs/jbosslabs/labs-3.0-build: configuration/resources/to-copy/server/default/conf and 7 other directories.

jboss-svn-commits at lists.jboss.org jboss-svn-commits at lists.jboss.org
Fri Jan 18 09:09:29 EST 2008


Author: szimano
Date: 2008-01-18 09:09:29 -0500 (Fri, 18 Jan 2008)
New Revision: 17952

Added:
   labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml
   labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml
   labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml
   labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml
   labs/jbosslabs/labs-3.0-build/resources/
   labs/jbosslabs/labs-3.0-build/resources/README.txt
   labs/jbosslabs/labs-3.0-build/resources/auth/
   labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/axis.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-beanutils.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-codec-1.2.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-collections-3.1.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-configuration-1.1.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-digester.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-discovery-0.2.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-httpclient-3.0-rc2.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-lang-2.0.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-logging.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-modeler.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/jaxrpc.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/saaj.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-aop-2.0.7.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-beans-2.0.7.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-context-2.0.7.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-core-2.0.7.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-jmx-2.0.7.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/wsdl4j-1.5.1.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-common-20030701.jar
   labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-xupdate-20040205.jar
   labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp
Modified:
   labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml
   labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java
   labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml
   labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp
Log:
build configured with JOSSO JBLAB-901

Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml	                        (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-agent-config.xml	2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,108 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!--
+  ~ JOSSO: Java Open Single Sign-On
+  ~
+  ~ Copyright 2004-2007, Atricore, Inc.
+  ~
+  ~ This is free software; you can redistribute it and/or modify it
+  ~ under the terms of the GNU Lesser General Public License as
+  ~ published by the Free Software Foundation; either version 2.1 of
+  ~ the License, or (at your option) any later version.
+  ~
+  ~ This software is distributed in the hope that it will be useful,
+  ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+  ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+  ~ Lesser General Public License for more details.
+  ~
+  ~ You should have received a copy of the GNU Lesser General Public
+  ~ License along with this software; if not, write to the Free
+  ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+  ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+  -->
+
+<!--
+JOSSO Agent configuration file.
+-->
+<agent>
+
+    <!-- JOSSO Agent classes -->
+    <!--class>org.josso.tc50.agent.CatalinaSSOAgent</class-->
+    <!--<class>org.josso.tc55.agent.CatalinaSSOAgent</class> -->
+    <!--class>org.josso.tc60.agent.CatalinaSSOAgent</class-->
+    <!--class>org.josso.jb32.agent.JBossCatalinaSSOAgent</class-->
+    <!--class>org.josso.jb4.agent.JBossCatalinaSSOAgent</class-->
+    <class>org.josso.jb42.agent.JBossCatalinaSSOAgent</class>
+
+    <!-- Login/Logout URLs -->
+    <gatewayLoginUrl>http://localhost:8080/josso/signon/login.do</gatewayLoginUrl>
+    <gatewayLogoutUrl>http://localhost:8080/josso/signon/logout.do</gatewayLogoutUrl>
+    <!--gatewayLoginErrorUrl>http://localhost:8080/josso/signon/login.do</gatewayLoginErrorUrl-->
+
+    <!--
+    Usefull when working in N-Tier modes behind a reverse proxy or load balancer
+    Here you should place the reverse proxy or load balancer base URL.
+
+    Note : When using this options, the gatewayLoginURL and gatewayLogoutURL should also point to this host.
+
+    <singlePointOfAccess>http://reverse-proxy-host:8080</singlePointOfAccess>
+
+    <gatewayLoginUrl>http://reverse-proxy-host:8080/josso/signon/login.do</gatewayLoginUrl>
+    <gatewayLogoutUrl>http://reverse-proxy-host:8080/josso/signon/logout.do</gatewayLogoutUrl>
+    -->
+
+    <!-- Mininum interval between sso session access , in milliseconds -->
+    <sessionAccessMinInterval>1000</sessionAccessMinInterval>
+
+    <!-- JOSSO Agent service locator configuration -->
+    <service-locator>
+        <class>org.josso.gateway.WebserviceGatewayServiceLocator</class>
+        <endpoint>localhost:8080</endpoint>
+
+        <!-- Associate an identity to SOAP messages
+        <username>wsclient</username>
+        <password>wsclientpwd</password>
+        -->
+
+        <!-- Enabled SSL on the SOAP circuit.
+        <transportSecurity>confidential</transportSecurity>
+        -->
+    </service-locator>
+
+    <!--
+    JOSSO Parnter application definicions :
+
+    Configure all web applications that should be a josso partner application within this server.
+    For each partner application you have to define the propper web-context.
+    -->
+    <partner-apps>
+
+        <partner-app>
+            <context>/partnerapp</context>
+            <!-- This is an optional feature :
+            You can reference any web resource collection that should not be subject to SSO protection.
+            The SSO agent will not provide identity nor demand authentication to requests matching the
+            security constraint associated to this web resource collections.
+            In order to work, the security constraint must not contain auth-constraints declarations.
+            See sample web.xml file from josso partnerapp.
+            <security-constraint>
+                <ignore-web-resource-collection>public-resources</ignore-web-resource-collection>
+            </security-constraint>
+            -->
+        </partner-app>
+
+        <!-- Other partner apps. -->
+        <partner-app>
+            <context>/foo-view</context>
+        </partner-app>
+        
+
+        <!-- Root context protection
+        <partner-app>
+            <context>/</context>
+        </partner-app>
+         -->
+
+    </partner-apps>
+
+</agent>
+

Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml	                        (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-config.xml	2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,29 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+
+<!--
+  ~ JOSSO: Java Open Single Sign-On
+  ~
+  ~ Copyright 2004-2007, Atricore, Inc.
+  ~
+  ~ This is free software; you can redistribute it and/or modify it
+  ~ under the terms of the GNU Lesser General Public License as
+  ~ published by the Free Software Foundation; either version 2.1 of
+  ~ the License, or (at your option) any later version.
+  ~
+  ~ This software is distributed in the hope that it will be useful,
+  ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+  ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+  ~ Lesser General Public License for more details.
+  ~
+  ~ You should have received a copy of the GNU Lesser General Public
+  ~ License along with this software; if not, write to the Free
+  ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+  ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+  -->
+
+<configuration>
+    <!-- Comment this if no Agent is configured for this server -->
+    <hierarchicalXml fileName="josso-agent-config.xml"/>
+    <!-- Comment this if no Gateway is configured for this server -->
+    <hierarchicalXml fileName="josso-gateway-config.xml"/>
+</configuration>

Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml	                        (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/josso-gateway-config.xml	2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,532 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!--
+  ~ JOSSO: Java Open Single Sign-On
+  ~
+  ~ Copyright 2004-2007, Atricore, Inc.
+  ~
+  ~ This is free software; you can redistribute it and/or modify it
+  ~ under the terms of the GNU Lesser General Public License as
+  ~ published by the Free Software Foundation; either version 2.1 of
+  ~ the License, or (at your option) any later version.
+  ~
+  ~ This software is distributed in the hope that it will be useful,
+  ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+  ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+  ~ Lesser General Public License for more details.
+  ~
+  ~ You should have received a copy of the GNU Lesser General Public
+  ~ License along with this software; if not, write to the Free
+  ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+  ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+  -->
+
+<domain>
+    <name>JOSSO</name>
+    <type>web</type>
+
+    <!--sso-web-config-->
+
+        <!-- Optional : The URL where the user will be redirected after a successfull login only if josso_back_to request parameter
+        is not present when accessing the login url
+        <loginBackToURL>http://localhost:8080/partnerapp/protected/</loginBackToURL>
+        -->
+
+        <!-- Optional : The URL where the user will be redirected after a logout only if josso_back_to is not present
+        when accessing the logout url
+        <logoutBackToURL>http://localhost:8080/partnerapp/protected/</logoutBackToURL>
+        -->
+
+        <!-- Session token properties -->
+        <!--session-token-->
+
+            <!-- Optional : Use a secure session token, a secure channel like SSL must be available for this to work
+            <secure>false</secure>
+            -->
+
+
+        <!--/session-token-->
+
+    <!--/sso-web-config-->
+    <sso-web-config>
+        <customLoginUrl>http://192.168.1.11/login.html</customLoginUrl>
+    </sso-web-config>
+
+    <authenticator>
+        <class>org.josso.auth.AuthenticatorImpl</class>
+        <authentication-schemes>
+            <!-- Basic Authentication Scheme -->
+            <authentication-scheme>
+                <name>basic-authentication</name>
+                <class>org.josso.auth.scheme.UsernamePasswordAuthScheme</class>
+
+                <!--
+                The message digest algorithm to be used when hashing passwords.
+                This must be an algorithm supported by the java.security.MessageDigest class
+                on your platform.
+
+                In J2SE 1.4.2 you can check :
+                  Java Cryptography Architecture API Specification & Reference - Apendix B : Algorithms
+                  Values are : MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512,etc.
+
+                  To provide LDAP support, also CRYPT is available.
+                -->
+                <hashAlgorithm>MD5</hashAlgorithm>
+
+                <!-- Supported values are HEX, BASE64. Mandatory if hashAlgorithm was specified -->
+                <hashEncoding>HEX</hashEncoding>
+
+                <!-- Some hash algorithms, like CRYPT, use this property.  The default value is 2.
+                <saltLength>2</saltLength>
+                -->
+
+                <ignorePasswordCase>false</ignorePasswordCase>
+                <ignoreUserCase>false</ignoreUserCase>
+
+                <!-- ========================================================= -->
+                <!-- JDBC Credential Store                                     -->
+                <!--                                                           -->
+                <!-- Always scape comma chars [,] in queries because           -->
+                <!-- jakarta commons-configuration uses them to define arrays. -->
+                <!-- ========================================================= -->
+                <!-- -->
+                <!-- credential-store>
+                    <class>org.josso.gateway.identity.service.store.db.JDBCIdentityStore</class>
+
+                    <credentialsQueryString>
+
+                        SELECT login AS username , password AS password FROM josso_user WHERE login = ?
+
+                    </credentialsQueryString>
+                    <connectionName>dotorgdata</connectionName>
+                    <connectionPassword>dotorgdata</connectionPassword>
+                    <connectionURL>jdbc:mysql://localhost:3306/dotorgdata?useServerPrepStmts=false</connectionURL>
+                    <driverName>org.gjt.mm.mysql.Driver</driverName>
+                </credential-store-->
+                <credential-store>
+                    <class>org.josso.gateway.identity.service.store.db.DataSourceIdentityStore</class>
+
+                    <credentialsQueryString>SELECT pn_uname AS username, pn_pass AS password FROM nuke_users WHERE pn_uname = ?</credentialsQueryString>
+                    <dsJndiName>java:JBossDS</dsJndiName>
+                </credential-store>
+                
+
+                <!-- =============================================================== -->
+                <!-- LDAP Credential Store                                           -->
+                <!--                                                                 -->
+                <!-- Chcek javadoc for configuration details :                       -->
+                <!-- org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore -->
+                <!-- =============================================================== -->
+                <!--
+                <credential-store>
+                    <class>org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore</class>
+                    <initialContextFactory>com.sun.jndi.ldap.LdapCtxFactory</initialContextFactory>
+                    <providerUrl>ldap://ldaphost</providerUrl>
+                    <securityPrincipal>cn=Manager,dc=my-domain,dc=com</securityPrincipal>
+                    <securityCredential>secret</securityCredential>
+                    <securityAuthentication>simple</securityAuthentication>
+                    <ldapSearchScope>SUBTREE</ldapSearchScope>
+                    <usersCtxDN>ou=People,dc=my-domain,dc=com</usersCtxDN>
+                    <principalUidAttributeID>uid</principalUidAttributeID>
+                    <rolesCtxDN>ou=Roles,dc=my-domain,dc=com</rolesCtxDN>
+                    <uidAttributeID>uniquemember</uidAttributeID>
+                    <roleAttributeID>cn</roleAttributeID>
+                    <credentialQueryString>uid=username,userPassword=password</credentialQueryString>
+                    <userPropertiesQueryString>mail=mail,cn=description</userPropertiesQueryString>
+                </credential-store>
+                -->
+
+                <!-- ================================================= -->
+                <!-- Memory Credential Store                           -->
+                <!-- ================================================= -->
+                <credential-store>
+                    <class>org.josso.gateway.identity.service.store.MemoryIdentityStore</class>
+                    <credentialsFileName>josso-credentials.xml</credentialsFileName>
+                </credential-store>
+
+                <!-- ================================================= -->
+                <!-- Credential Store Key adapter                      -->
+                <!-- ================================================= -->
+                <credential-store-key-adapter>
+                    <class>org.josso.gateway.identity.service.store.SimpleIdentityStoreKeyAdapter</class>
+                </credential-store-key-adapter>
+
+            </authentication-scheme>
+
+            <!-- Strong Authentication Scheme -->
+            <authentication-scheme>
+                <name>strong-authentication</name>
+                <class>org.josso.auth.scheme.X509CertificateAuthScheme</class>
+
+                <!-- ========================================================= -->
+                <!-- JDBC Credential Store                                     -->
+                <!--                                                           -->
+                <!-- Always scape comma chars [,] in queries because           -->
+                <!-- jakarta commons-configuration uses them to define arrays. -->
+                <!-- ========================================================= -->
+                <!--
+                <credential-store>
+                    <class>org.josso.gateway.identity.service.store.db.JDBCIdentityStore</class>
+
+                    <credentialsQueryString>
+
+                        SELECT login AS username , password AS password FROM josso_user WHERE login = ?
+
+                    </credentialsQueryString>
+                    <connectionName>josso</connectionName>
+                    <connectionPassword>josso</connectionPassword>
+                    <connectionURL>jdbc:oracle:thin:@localhost:1521:josso_db</connectionURL>
+                    <driverName>oracle.jdbc.driver.OracleDriver</driverName>
+                </credential-store>
+                -->
+
+                <!-- =============================================================== -->
+                <!-- LDAP Credential Store                                           -->
+                <!--                                                                 -->
+                <!-- Chcek javadoc for configuration details :                       -->
+                <!-- org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore -->
+                <!-- =============================================================== -->
+                <!--
+                <credential-store>
+                    <class>org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore</class>
+                    <initialContextFactory>com.sun.jndi.ldap.LdapCtxFactory</initialContextFactory>
+                    <providerUrl>ldap://ldaphost</providerUrl>
+                    <securityPrincipal>cn=Manager,dc=my-domain,dc=com</securityPrincipal>
+                    <securityCredential>secret</securityCredential>
+                    <securityAuthentication>simple</securityAuthentication>
+                    <ldapSearchScope>SUBTREE</ldapSearchScope>
+                    <usersCtxDN>ou=People,dc=my-domain,dc=com</usersCtxDN>
+                    <principalUidAttributeID>uid</principalUidAttributeID>
+                    <rolesCtxDN>ou=Roles,dc=my-domain,dc=com</rolesCtxDN>
+                    <uidAttributeID>uniquemember</uidAttributeID>
+                    <roleAttributeID>cn</roleAttributeID>
+                    <credentialQueryString>uid=username,userCertificate;binary=userCertificate</credentialQueryString>
+                    <userPropertiesQueryString>mail=mail,cn=description</userPropertiesQueryString>
+                </credential-store>
+                -->
+
+                <!-- ================================================= -->
+                <!-- Memory Credential Store                           -->
+                <!-- ================================================= -->
+                <credential-store>
+                    <class>org.josso.gateway.identity.service.store.MemoryIdentityStore</class>
+                    <credentialsFileName>josso-credentials.xml</credentialsFileName>
+                </credential-store>
+
+                <!-- ================================================= -->
+                <!-- Credential Store Key adapter                      -->
+                <!-- ================================================= -->
+                <credential-store-key-adapter>
+                    <class>org.josso.gateway.identity.service.store.SimpleIdentityStoreKeyAdapter</class>
+                </credential-store-key-adapter>
+
+            </authentication-scheme>
+        </authentication-schemes>
+    </authenticator>
+
+    <sso-identity-manager>
+
+        <class>org.josso.gateway.identity.service.SSOIdentityManagerImpl</class>
+
+        <!-- ========================================================= -->
+        <!-- DataSource Identity Store                                 -->
+        <!--                                                           -->
+        <!-- Always scape comma chars [,] in queries because           -->
+        <!-- jakarta commons-configuration uses them to define arrays. -->
+        <!-- ========================================================= -->
+        <!-- -->
+        <sso-identity-store>
+            <class>org.josso.gateway.identity.service.store.db.DataSourceIdentityStore</class>
+
+            <userQueryString>
+                SELECT pn_uname AS login FROM nuke_users WHERE pn_uname = ?
+            </userQueryString>
+
+            <userPropertiesQueryString>
+                SELECT pn_name AS name , pn_bio AS value FROM nuke_users WHERE pn_uname = ?
+            </userPropertiesQueryString>
+
+            <rolesQueryString>
+                SELECT "admin" AS 'josso_role.name' UNION SELECT "user" AS 'josso_role.name' UNION SELECT ? UNION SELECT "role1";
+            </rolesQueryString>
+
+            <dsJndiName>java:JBossDS</dsJndiName>
+        </sso-identity-store>
+        
+        <!-- ========================================================= -->
+        <!-- JDBC Identity Store                                       -->
+        <!--                                                           -->
+        <!-- Always scape comma chars [,] in queries because           -->
+        <!-- jakarta commons-configuration uses them to define arrays. -->
+        <!-- ========================================================= -->
+
+        <!--sso-identity-store>
+            <class>org.josso.gateway.identity.service.store.db.JDBCIdentityStore</class>
+
+            <userQueryString>
+                SELECT login FROM josso_user WHERE login = ?
+            </userQueryString>
+
+            You could use a UNION to select properties from different tables/columns :
+            SELECT 'user.lastName' AS name ,  lastName AS value FROM josso_user WHERE login = ?
+            UNION
+            SELECT 'user.name' AS name ,  name AS value FROM josso_user WHERE login = ?
+            UNION
+            SELECT name AS name ,  value AS value FROM josso_user_properties WHERE login = ?
+
+            <userPropertiesQueryString>
+                SELECT 'user.description' AS name , description AS value FROM josso_user WHERE login = ?
+                UNION
+                SELECT name AS name ,  value AS value FROM josso_user_property WHERE login = ?
+            </userPropertiesQueryString>
+            <rolesQueryString>
+                SELECT josso_role.name FROM josso_role , josso_user_role , josso_user WHERE josso_user.login = ? AND josso_user.login = josso_user_role.login AND josso_role.name = josso_user_role.name
+            </rolesQueryString>
+            <connectionName>josso</connectionName>
+            <connectionPassword>josso</connectionPassword>
+            <connectionURL>jdbc:oracle:thin:@localhost:1521:josso_db</connectionURL>
+            <driverName>oracle.jdbc.driver.OracleDriver</driverName>
+        </sso-identity-store-->
+
+        <!-- =============================================================== -->
+        <!-- LDAP Identity Store                                             -->
+        <!--                                                                 -->
+        <!-- Chcek javadoc for configuration details :                       -->
+        <!-- org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore -->
+        <!-- ================================================= -->
+        <!--
+        <sso-identity-store>
+            <class>org.josso.gateway.identity.service.store.ldap.LDAPIdentityStore</class>
+            <initialContextFactory>com.sun.jndi.ldap.LdapCtxFactory</initialContextFactory>
+            <providerUrl>ldap://ldaphost</providerUrl>
+            <securityPrincipal>cn=Manager,dc=my-domain,dc=com</securityPrincipal>
+            <securityCredential>secret</securityCredential>
+            <securityAuthentication>simple</securityAuthentication>
+            <ldapSearchScope>SUBTREE</ldapSearchScope>
+            <usersCtxDN>ou=People,dc=my-domain,dc=com</usersCtxDN>
+            <principalUidAttributeID>uid</principalUidAttributeID>
+            <rolesCtxDN>ou=Roles,dc=my-domain,dc=com</rolesCtxDN>
+            <uidAttributeID>uniquemember</uidAttributeID>
+            <roleAttributeID>cn</roleAttributeID>
+            <credentialQueryString>uid=username,userPassword=password</credentialQueryString>
+            <userPropertiesQueryString>mail=mail,cn=description</userPropertiesQueryString>
+        </sso-identity-store>
+        -->
+
+        <!-- ================================================= -->
+        <!-- Memory Identity Store                             -->
+        <!-- ================================================= -->
+        <sso-identity-store>
+            <class>org.josso.gateway.identity.service.store.MemoryIdentityStore</class>
+            <usersFileName>josso-users.xml</usersFileName>
+        </sso-identity-store>
+
+        <!-- ================================================= -->
+        <!-- Identity Store Key adapter                        -->
+        <!-- ================================================= -->
+        <sso-identity-store-key-adapter>
+            <class>org.josso.gateway.identity.service.store.SimpleIdentityStoreKeyAdapter</class>
+        </sso-identity-store-key-adapter>
+
+    </sso-identity-manager>
+
+    <sso-session-manager>
+
+        <class>org.josso.gateway.session.service.SSOSessionManagerImpl</class>
+
+        <!--
+        Set the maximum time interval, in minutes, between client requests before the SSO Service will invalidate
+        the session. A negative time indicates that the session should never time out.
+        -->
+        <maxInactiveInterval>30</maxInactiveInterval>
+
+        <!-- Max number of sessions per user, default 1
+        A negative value indicates that an unlimited number of sessions per user is allowed.
+        -->
+        <maxSessionsPerUser>-1</maxSessionsPerUser>
+        <!--
+        If true, when the max number of sessions per user is exceeded,
+        an already existing session will be invalidated to create a new one.
+        If false, when the max number of sessions per user is exceeded,
+        an exception is thrown and the new session is not created.
+        -->
+        <invalidateExceedingSessions>false</invalidateExceedingSessions>
+
+
+        <!--
+        Time interval, in milliseconds, between exired sessions cleanup.
+        -->
+        <sessionMonitorInterval>10000</sessionMonitorInterval>
+
+        <!-- =================================================================== -->
+        <!-- Serialized Session Store                                            -->
+        <!--                                                                     -->
+        <!-- Session Store implementation which uses Java Serialization to       -->
+        <!-- persist Single Sign-On user sessions.                               -->
+        <!-- It allows to reconstruct the session state after a system shutdown. -->
+        <!-- =================================================================== -->
+        <!--  -->
+        <sso-session-store>
+            <class>org.josso.gateway.session.service.store.SerializedSessionStore</class>
+            <!-- file where serialized sessions will be stored (optional) -->
+            <serializedFile>/tmp/josso_sessions.ser</serializedFile>
+        </sso-session-store> 
+      
+
+
+        <!-- =============================================================== -->
+        <!-- DataSource Session Store                                        -->
+        <!--                                                                 -->
+        <!-- This store persists SSO sessions in a RDBMS, it's usefull for   -->
+        <!-- example when multiple SSO servers must share session information-->
+        <!-- like in a cluster.                                              -->
+        <!--                                                                 -->
+        <!-- NOTE :Remember to escape spetial chars like  < with &lt; , etc  -->
+        <!--                                                                 -->
+        <!--                                                                 -->
+        <!-- Chcek javadoc for configuration details :                       -->
+        <!-- org.josso.gateway.session.service.store.db.DataSourceSessionStore -->
+        <!-- =============================================================== -->
+        <!-- 
+        <sso-session-store>
+
+            <class>org.josso.gateway.session.service.store.db.DataSourceSessionStore</class>
+
+            <dsJndiName>java:JBossDS</dsJndiName>
+
+            <sizeQuery>SELECT COUNT(*) FROM JOSSO_SESSION</sizeQuery>
+            <keysQuery>SELECT session_id FROM JOSSO_SESSION</keysQuery>
+            <loadAllQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION</loadAllQuery>
+            <loadQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE session_id = ?</loadQuery>
+            <loadByUserNameQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE username = ?</loadByUserNameQuery>
+
+            <loadByLastAccessTimeQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE last_access_time &lt; ?</loadByLastAccessTimeQuery>
+            <loadByValidQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE valid = ?</loadByValidQuery>
+            <deleteDml>DELETE FROM JOSSO_SESSION WHERE session_id = ?</deleteDml>
+            <deleteAllDml>DELETE FROM JOSSO_SESSION</deleteAllDml>
+            <insertDml>INSERT INTO JOSSO_SESSION (session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid) VALUES (?, ?, ?, ?, ?, ?, ?) </insertDml>
+
+            
+
+        </sso-session-store>-->
+        
+
+        <!-- =============================================================== -->
+        <!-- Jdbc Session Store                                              -->
+        <!--                                                                 -->
+        <!-- This store persists SSO sessions in a RDBMS, it's usefull for   -->
+        <!-- example when multiple SSO servers must share session information-->
+        <!-- like in a cluster.                                              -->
+        <!--                                                                 -->
+        <!-- NOTE :Remember to escape spetial chars like  < with &lt; , etc  -->
+        <!--                                                                 -->
+        <!-- Chcek javadoc for configuration details :                       -->
+        <!-- org.josso.gateway.session.service.store.db.JdbcSessionStore     -->
+        <!-- =============================================================== -->
+        <!--
+        <sso-session-store>
+
+            <class>org.josso.gateway.session.service.store.db.JdbcSessionStore</class>
+
+            <connectionName>josso</connectionName>
+            <connectionPassword>josso</connectionPassword>
+            <connectionURL>jdbc:oracle:thin:@localhost:1521:josso_db</connectionURL>
+            <driverName>oracle.jdbc.driver.OracleDriver</driverName>
+
+            <sizeQuery>SELECT COUNT(*) FROM JOSSO_SESSION</sizeQuery>
+            <keysQuery>SELECT session_id FROM JOSSO_SESSION</keysQuery>
+            <loadAllQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION</loadAllQuery>
+            <loadQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE session_id = ?</loadQuery>
+            <loadByUserNameQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE username = ?</loadByUserNameQuery>
+
+            <loadByLastAccessTimeQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE last_access_time &lt; ?</loadByLastAccessTimeQuery>
+            <loadByValidQuery>SELECT session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid FROM JOSSO_SESSION WHERE valid = ?</loadByValidQuery>
+            <deleteDml>DELETE FROM JOSSO_SESSION WHERE session_id = ?</deleteDml>
+            <deleteAllDml>DELETE FROM JOSSO_SESSION</deleteAllDml>
+            <insertDml>INSERT INTO JOSSO_SESSION (session_id, userName, creation_time, last_access_time, access_count, max_inactive_interval, valid) VALUES (?, ?, ?, ?, ?, ?, ?) </insertDml>
+
+        </sso-session-store>
+        -->
+
+
+        <!-- =============================================================== -->
+        <!-- Memory Session Store                                            -->
+        <!-- =============================================================== -->
+        <!-- sso-session-store>
+            <class>org.josso.gateway.session.service.store.MemorySessionStore</class>
+        </sso-session-store -->
+
+        <sso-session-id-generator>
+
+            <class>org.josso.gateway.session.service.SessionIdGeneratorImpl</class>
+            <!--
+            The message digest algorithm to be used when generating session
+            identifiers.  This must be an algorithm supported by the
+            java.security.MessageDigest class on your platform.
+
+            In J2SE 1.4.2 you can check :
+              Java Cryptography Architecture API Specification & Reference - Apendix A : Standard Names
+              Values are : MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512
+            -->
+            <algorithm>MD5</algorithm>
+
+        </sso-session-id-generator>
+
+    </sso-session-manager>
+
+    <!-- SSO Audit Manager compoment -->
+    <sso-audit-manager>
+        <class>org.josso.gateway.audit.service.SSOAuditManagerImpl</class>
+
+        <!--
+        List of handlers that will process this request
+        Every handler must have its own unique name.
+        -->
+        <handlers>
+
+            <!-- This handler logs all audit trails using Log4J, under the given category -->
+            <handler>
+                <class>org.josso.gateway.audit.service.handler.LoggerAuditTrailHandler</class>
+                <name>LoggerAuditTrailHandler</name>
+                <category>org.josso.gateway.audit.SSO_AUDIT</category>
+            </handler>
+
+            <!--
+            <handler>
+                <class>MyOtherHandler</class>
+                <name>MyOhterHandlerName</name>
+                <myProperty>value</myProperty>
+            </handler>
+            -->
+
+        </handlers>
+    </sso-audit-manager>
+
+    <!-- SSO Event Manager component -->
+    <sso-event-manager>
+        <class>org.josso.gateway.event.security.JMXSSOEventManagerImpl</class>
+        <!--
+        JMX Name of the EventManager MBean that will send SSO Events as JMX Notifications
+        The MBean will be registered by the MBeanComponentKeeper.
+        -->
+        <oname>josso:type=SSOEventManager</oname>
+        <!-- You can add your own listeners here : -->
+        <!-- Every listener should have a unique name -->
+
+        <!--
+        <listeners>
+            <listener>
+                <class>com.myCompany.MyEventListener</class>
+                <name>MyEventListener</name>
+                <property1>MyListenerProperty1Value</property1>
+            </listener>
+            <listener>
+                <class>com.myCompany.MyOtherEventListener</class>
+                <name>MyOtherEventListener</name>
+                <propertyA>MyOtherListenerPropertyAValue</propertyA>
+            </listener>
+         </listeners>
+         -->
+
+    </sso-event-manager>
+
+</domain>

Added: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml	                        (rev 0)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/conf/login-config.xml	2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,206 @@
+<?xml version='1.0'?>
+<!DOCTYPE policy PUBLIC
+      "-//JBoss//DTD JBOSS Security Config 3.0//EN"
+      "http://www.jboss.org/j2ee/dtd/security_config.dtd">
+
+<!-- The XML based JAAS login configuration read by the
+	org.jboss.security.auth.login.XMLLoginConfig mbean. Add
+	an application-policy element for each security domain.
+	
+	The outline of the application-policy is:
+	<application-policy name="security-domain-name">
+	<authentication>
+	<login-module code="login.module1.class.name" flag="control_flag">
+	<module-option name = "option1-name">option1-value</module-option>
+	<module-option name = "option2-name">option2-value</module-option>
+	...
+	</login-module>
+	
+	<login-module code="login.module2.class.name" flag="control_flag">
+	...
+	</login-module>
+	...
+	</authentication>
+	</application-policy>
+	
+	$Revision: 64598 $
+-->
+
+<policy>
+	<!-- Used by clients within the application server VM such as
+		mbeans and servlets that access EJBs.
+	-->
+	<application-policy name="client-login">
+		<authentication>
+			<login-module code="org.jboss.security.ClientLoginModule"
+				flag="required">
+				<!-- Any existing security context will be restored on logout -->
+				<module-option name="restore-login-identity">
+					true
+				</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+	<!-- Security domain for JBossMQ -->
+	<application-policy name="jbossmq">
+		<authentication>
+			<login-module
+				code="org.jboss.security.auth.spi.DatabaseServerLoginModule"
+				flag="required">
+				<module-option name="unauthenticatedIdentity">
+					guest
+				</module-option>
+				<module-option name="dsJndiName">
+					java:/DefaultDS
+				</module-option>
+				<module-option name="principalsQuery">
+					SELECT PASSWD FROM JMS_USERS WHERE USERID=?
+				</module-option>
+				<module-option name="rolesQuery">
+					SELECT ROLEID, 'Roles' FROM JMS_ROLES WHERE USERID=?
+				</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+	<!-- Security domain for JBossMQ when using file-state-service.xml
+		<application-policy name = "jbossmq">
+		<authentication>
+		<login-module code = "org.jboss.mq.sm.file.DynamicLoginModule"
+		flag = "required">
+		<module-option name = "unauthenticatedIdentity">guest</module-option>
+		<module-option name = "sm.objectname">jboss.mq:service=StateManager</module-option>
+		</login-module>
+		</authentication>
+		</application-policy>
+	-->
+
+	<!-- Security domains for testing new jca framework -->
+	<application-policy name="HsqlDbRealm">
+		<authentication>
+			<login-module
+				code="org.jboss.resource.security.ConfiguredIdentityLoginModule"
+				flag="required">
+				<module-option name="principal">sa</module-option>
+				<module-option name="userName">sa</module-option>
+				<module-option name="password"></module-option>
+				<module-option name="managedConnectionFactoryName">
+					jboss.jca:service=LocalTxCM,name=DefaultDS
+				</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+	<application-policy name="JmsXARealm">
+		<authentication>
+			<login-module
+				code="org.jboss.resource.security.ConfiguredIdentityLoginModule"
+				flag="required">
+				<module-option name="principal">guest</module-option>
+				<module-option name="userName">guest</module-option>
+				<module-option name="password">guest</module-option>
+				<module-option name="managedConnectionFactoryName">
+					jboss.jca:service=TxCM,name=JmsXA
+				</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+	<!-- A template configuration for the jmx-console web application. This
+		defaults to the UsersRolesLoginModule the same as other and should be
+		changed to a stronger authentication mechanism as required.
+	-->
+	<application-policy name="jmx-console">
+		<authentication>
+			<login-module
+				code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+				flag="required">
+				<module-option name="usersProperties">
+					props/jmx-console-users.properties
+				</module-option>
+				<module-option name="rolesProperties">
+					props/jmx-console-roles.properties
+				</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+	<!-- A template configuration for the web-console web application. This
+		defaults to the UsersRolesLoginModule the same as other and should be
+		changed to a stronger authentication mechanism as required.
+	-->
+	<application-policy name="web-console">
+		<authentication>
+			<login-module
+				code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+				flag="required">
+				<module-option name="usersProperties">
+					web-console-users.properties
+				</module-option>
+				<module-option name="rolesProperties">
+					web-console-roles.properties
+				</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+	<!--
+		A template configuration for the JBossWS security domain.
+		This defaults to the UsersRolesLoginModule the same as other and should be
+		changed to a stronger authentication mechanism as required.
+	-->
+	<application-policy name="JBossWS">
+		<authentication>
+			<login-module
+				code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+				flag="required">
+				<module-option name="usersProperties">
+					props/jbossws-users.properties
+				</module-option>
+				<module-option name="rolesProperties">
+					props/jbossws-roles.properties
+				</module-option>
+				<module-option name="unauthenticatedIdentity">
+					anonymous
+				</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+	<!-- The default login configuration used by any security domain that
+		does not have a application-policy entry with a matching name
+	-->
+	<application-policy name="other">
+		<!-- A simple server login module, which can be used when the number
+			of users is relatively small. It uses two properties files:
+			users.properties, which holds users (key) and their password (value).
+			roles.properties, which holds users (key) and a comma-separated list of
+			their roles (value).
+			The unauthenticatedIdentity property defines the name of the principal
+			that will be used when a null username and password are presented as is
+			the case for an unuathenticated web client or MDB. If you want to
+			allow such users to be authenticated add the property, e.g.,
+			unauthenticatedIdentity="nobody"
+		-->
+		<authentication>
+			<login-module
+				code="org.jboss.security.auth.spi.UsersRolesLoginModule"
+				flag="required" />
+		</authentication>
+	</application-policy>
+
+	<application-policy name="josso">
+		<authentication>
+			<login-module
+				code="org.josso.jb42.agent.JBossSSOGatewayLoginModule"
+				flag="required">
+				<module-option name="debug">true</module-option>
+			</login-module>
+		</authentication>
+	</application-policy>
+
+
+
+</policy>
+

Modified: labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml	2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/configuration/resources/to-copy/server/default/deploy/jboss-web.deployer/server.xml	2008-01-18 14:09:29 UTC (rev 17952)
@@ -41,7 +41,15 @@
          emptySessionPath="true" enableLookups="false" redirectPort="8443" />
 
       <Engine name="jboss.web" defaultHost="localhost">
+      
+      	 <!-- JOSS Realm -->
 
+		<Realm className="org.josso.jb42.agent.JBossCatalinaRealm"
+                 appName="josso"
+                 userClassNames="org.josso.gateway.identity.service.BaseUserImpl"
+                 roleClassNames="org.josso.gateway.identity.service.BaseRoleImpl"
+                 debug="1" />
+                 
          <!-- The JAAS based authentication and authorization realm implementation
          that is compatible with the jboss 3.2.x realm implementation.
          - certificatePrincipal : the class name of the
@@ -55,10 +63,13 @@
            + strictAuthOnly = Allow any authenticated user only if there are no
            web-app/security-roles
          -->
-         <Realm className="org.jboss.web.tomcat.security.JBossSecurityMgrRealm"
+         
+         
+         <!-- <Realm className="org.jboss.web.tomcat.security.JBossSecurityMgrRealm"
             certificatePrincipal="org.jboss.security.auth.certs.SubjectDNMapping"
             allRolesMode="authOnly"
-            />
+            /> -->
+            
          <!-- A subclass of JBossSecurityMgrRealm that uses the authentication
          behavior of JBossSecurityMgrRealm, but overrides the authorization
          checks to use JACC permissions with the current java.security.Policy
@@ -158,6 +169,9 @@
             <Valve className="org.jboss.web.tomcat.service.jca.CachedConnectionValve"
                 cachedConnectionManagerObjectName="jboss.jca:service=CachedConnectionManager"
                 transactionManagerObjectName="jboss:service=TransactionManager" />
+                
+            <!-- JOSSO SECURITY -->
+			<Valve className="org.josso.tc55.agent.SSOAgentValve" debug="1"/>	
 
          </Host>
 

Added: labs/jbosslabs/labs-3.0-build/resources/README.txt
===================================================================
--- labs/jbosslabs/labs-3.0-build/resources/README.txt	                        (rev 0)
+++ labs/jbosslabs/labs-3.0-build/resources/README.txt	2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,2 @@
+Put all sample configuration files etc. here
+

Added: labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp
===================================================================
--- labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp	                        (rev 0)
+++ labs/jbosslabs/labs-3.0-build/resources/auth/login-redirect.jsp	2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,28 @@
+<%--
+  ~ JOSSO: Java Open Single Sign-On
+  ~
+  ~ Copyright 2004-2007, Atricore, Inc.
+  ~
+  ~ This is free software; you can redistribute it and/or modify it
+  ~ under the terms of the GNU Lesser General Public License as
+  ~ published by the Free Software Foundation; either version 2.1 of
+  ~ the License, or (at your option) any later version.
+  ~
+  ~ This software is distributed in the hope that it will be useful,
+  ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+  ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+  ~ Lesser General Public License for more details.
+  ~
+  ~ You should have received a copy of the GNU Lesser General Public
+  ~ License along with this software; if not, write to the Free
+  ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+  ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+  --%>
+
+<%@page contentType="text/html; charset=iso-8859-1" language="java" session="true" %>
+<!--
+Redirects the user to the propper login page.  Configured as the login url the web.xml for this application.
+-->
+<%
+    response.sendRedirect(request.getContextPath() + "/josso_login/");
+%>

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/axis.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/axis.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-beanutils.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-beanutils.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-codec-1.2.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-codec-1.2.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-collections-3.1.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-collections-3.1.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-configuration-1.1.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-configuration-1.1.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-digester.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-digester.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-discovery-0.2.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-discovery-0.2.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-httpclient-3.0-rc2.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-httpclient-3.0-rc2.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-lang-2.0.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-lang-2.0.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-logging.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-logging.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-modeler.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/commons-modeler.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/jaxrpc.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/jaxrpc.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/saaj.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/saaj.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-aop-2.0.7.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-aop-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-beans-2.0.7.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-beans-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-context-2.0.7.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-context-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-core-2.0.7.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-core-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-jmx-2.0.7.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/spring-jmx-2.0.7.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/wsdl4j-1.5.1.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/wsdl4j-1.5.1.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-common-20030701.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-common-20030701.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-xupdate-20040205.jar
===================================================================
(Binary files differ)


Property changes on: labs/jbosslabs/labs-3.0-build/services/authorization/resources/jboss-web.deployer/xmldb-xupdate-20040205.jar
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Modified: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java	2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/java/org/jboss/labs/MyServlet.java	2008-01-18 14:09:29 UTC (rev 17952)
@@ -29,7 +29,16 @@
 			resp
 			.getWriter()
 			.println(
-					"<html><head><title>hello world</title></head><body><h1>Hello World[changed] !</h1>Foo says: "
+					"<html><head><title>hello world</title></head><body><h1>Hello World[changed] !</h1>");
+			if (req.getUserPrincipal() != null) {
+				resp
+				.getWriter()
+				.println("Authenticated as: "+req.getUserPrincipal().getName()+"<br/>");
+			}
+			
+			resp
+			.getWriter()
+			.println("Foo says: "
 							+ "Foo["+ fooService.sayFoo().id + "]<br/></body></html>");
 		} catch (NamingException e) {
 			log(e.getMessage(), e);

Modified: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml	2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/WEB-INF/web.xml	2008-01-18 14:09:29 UTC (rev 17952)
@@ -2,40 +2,39 @@
 <!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
                          "http://java.sun.com/dtd/web-app_2_3.dtd">
 <web-app>
- <display-name>Foo Web Application</display-name>
- <servlet>
-  <servlet-name>FooServlet</servlet-name>
-  <display-name>FooServlet</display-name>
-  <description>My foo servlet</description>
-  <servlet-class>org.jboss.labs.MyServlet</servlet-class>
-  <load-on-startup>1</load-on-startup>
-  <security-role-ref>
-   <role-name>Authenticated</role-name>
-   <role-link>Authenticated</role-link>
-  </security-role-ref>
- </servlet>
- <servlet-mapping>
-  <servlet-name>FooServlet</servlet-name>
-  <url-pattern>/*</url-pattern>
- </servlet-mapping>
- <security-constraint>
-  <web-resource-collection>
-   <web-resource-name>Authenticated</web-resource-name>
-   <url-pattern>/auth/*</url-pattern>
-  </web-resource-collection>
-  <auth-constraint>
-   <role-name>Authenticated</role-name>
-  </auth-constraint>
- </security-constraint>
- <login-config>
-  <auth-method>FORM</auth-method>
-  <realm-name>file</realm-name>
-  <form-login-config>
-   <form-login-page>/login/logon.jsp</form-login-page>
-   <form-error-page>/login/logonError.jsp</form-error-page>
-  </form-login-config>
- </login-config>
- <security-role>
-  <role-name>Authenticated</role-name>
- </security-role>
+	<display-name>Foo Web Application</display-name>
+	<servlet>
+		<servlet-name>FooServlet</servlet-name>
+		<display-name>FooServlet</display-name>
+		<description>My foo servlet</description>
+		<servlet-class>org.jboss.labs.MyServlet</servlet-class>
+		<load-on-startup>1</load-on-startup>
+		<security-role-ref>
+			<role-name>user</role-name>
+			<role-link>user</role-link>
+		</security-role-ref>
+	</servlet>
+	<servlet-mapping>
+		<servlet-name>FooServlet</servlet-name>
+		<url-pattern>*.ole</url-pattern>
+	</servlet-mapping>
+	<security-constraint>
+		<web-resource-collection>
+			<web-resource-name>Authenticated</web-resource-name>
+			<url-pattern>/auth/*</url-pattern>
+		</web-resource-collection>
+		<auth-constraint>
+			<role-name>user</role-name>
+		</auth-constraint>
+	</security-constraint>
+	<login-config>
+		<auth-method>FORM</auth-method>
+		<form-login-config>
+			<form-login-page>/login-redirect.jsp</form-login-page>
+			<form-error-page>/login-redirect.jsp</form-error-page>
+		</form-login-config>
+	</login-config>
+	<security-role>
+		<role-name>user</role-name>
+	</security-role>
 </web-app>

Modified: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp	2008-01-18 14:00:47 UTC (rev 17951)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/index.jsp	2008-01-18 14:09:29 UTC (rev 17952)
@@ -1,5 +1,5 @@
 <html>
 <body>
-<h2>Hello World!</h2>
+<h2>This is a foo page</h2>
 </body>
 </html>

Added: labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp
===================================================================
--- labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp	                        (rev 0)
+++ labs/jbosslabs/labs-3.0-build/views/foo-view/src/main/webapp/login-redirect.jsp	2008-01-18 14:09:29 UTC (rev 17952)
@@ -0,0 +1,28 @@
+<%--
+  ~ JOSSO: Java Open Single Sign-On
+  ~
+  ~ Copyright 2004-2007, Atricore, Inc.
+  ~
+  ~ This is free software; you can redistribute it and/or modify it
+  ~ under the terms of the GNU Lesser General Public License as
+  ~ published by the Free Software Foundation; either version 2.1 of
+  ~ the License, or (at your option) any later version.
+  ~
+  ~ This software is distributed in the hope that it will be useful,
+  ~ but WITHOUT ANY WARRANTY; without even the implied warranty of
+  ~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+  ~ Lesser General Public License for more details.
+  ~
+  ~ You should have received a copy of the GNU Lesser General Public
+  ~ License along with this software; if not, write to the Free
+  ~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+  ~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+  --%>
+
+<%@page contentType="text/html; charset=iso-8859-1" language="java" session="true" %>
+<!--
+Redirects the user to the propper login page.  Configured as the login url the web.xml for this application.
+-->
+<%
+    response.sendRedirect(request.getContextPath() + "/josso_login/");
+%>




More information about the jboss-svn-commits mailing list