[JBoss JIRA] (ELY-849) Rename setMechanismProperties to setSaslMechanismProperties
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/ELY-849?page=com.atlassian.jira.plugin.sy... ]
Darran Lofthouse updated ELY-849:
---------------------------------
Fix Version/s: 1.1.0.Beta23
(was: 1.1.0.Beta22)
> Rename setMechanismProperties to setSaslMechanismProperties
> -----------------------------------------------------------
>
> Key: ELY-849
> URL: https://issues.jboss.org/browse/ELY-849
> Project: WildFly Elytron
> Issue Type: Enhancement
> Components: Authentication Client
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
> Priority: Blocker
> Fix For: 1.1.0.Beta23
>
>
> If we later add HTTP mechanisms we have no way to differentiate between HTTP and SASL mechanism properties.
> We could probably share properties and rely on protocol matching in the MatchRule but as a single AuthenticationConfiguration will support both HTTP and SASL I think independent properties will be required.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months
[JBoss JIRA] (ELY-916) Add ability to use specified Provider[] when creating KeyStore instance in KeyStoreCredentialStore
by Peter Skopek (JIRA)
[ https://issues.jboss.org/browse/ELY-916?page=com.atlassian.jira.plugin.sy... ]
Peter Skopek updated ELY-916:
-----------------------------
Description:
Add ability to use specified Provider[] when creating KeyStore instance in KeyStoreCredentialStore.
This will give us opportunity to use custom KeyStore (for example for FIPS certified CredentialStore).
was:
Add ability to use specified Provider[] when creating KeyStore instance in KeyStoreCredentialStore.
This will give us opportunity to consume custom KeyStore (for example for FIPS certified CredentialStore).
> Add ability to use specified Provider[] when creating KeyStore instance in KeyStoreCredentialStore
> --------------------------------------------------------------------------------------------------
>
> Key: ELY-916
> URL: https://issues.jboss.org/browse/ELY-916
> Project: WildFly Elytron
> Issue Type: Task
> Components: Credential Store
> Reporter: Peter Skopek
> Assignee: Peter Skopek
>
> Add ability to use specified Provider[] when creating KeyStore instance in KeyStoreCredentialStore.
> This will give us opportunity to use custom KeyStore (for example for FIPS certified CredentialStore).
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months
[JBoss JIRA] (ELY-915) Elytron filesystem caching realm should cache attributes and credentials
by Ondrej Kotek (JIRA)
[ https://issues.jboss.org/browse/ELY-915?page=com.atlassian.jira.plugin.sy... ]
Ondrej Kotek moved JBEAP-8663 to ELY-915:
-----------------------------------------
Project: WildFly Elytron (was: JBoss Enterprise Application Platform)
Key: ELY-915 (was: JBEAP-8663)
Workflow: GIT Pull Request workflow (was: CDW with loose statuses v1)
Component/s: Realms
(was: Security)
Affects Version/s: 1.1.0.Beta21
(was: 7.1.0.DR11)
> Elytron filesystem caching realm should cache attributes and credentials
> ------------------------------------------------------------------------
>
> Key: ELY-915
> URL: https://issues.jboss.org/browse/ELY-915
> Project: WildFly Elytron
> Issue Type: Bug
> Components: Realms
> Affects Versions: 1.1.0.Beta21
> Reporter: Ondrej Kotek
>
> Elytron caching realm backed by filesystem realm provides caching for identity objects but not for related credentials and attributes.
> Credentials and attributes should not be loaded from file system for a cache hit.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months
[JBoss JIRA] (ELY-913) Incorrect username is passed to principal when principal-transformers are enabled
by Ondrej Lukas (JIRA)
[ https://issues.jboss.org/browse/ELY-913?page=com.atlassian.jira.plugin.sy... ]
Ondrej Lukas closed ELY-913.
----------------------------
Resolution: Rejected
Ok, I understand it now. Thanks for the clarification. I am closing this issue since this is not a bug.
> Incorrect username is passed to principal when principal-transformers are enabled
> ---------------------------------------------------------------------------------
>
> Key: ELY-913
> URL: https://issues.jboss.org/browse/ELY-913
> Project: WildFly Elytron
> Issue Type: Bug
> Affects Versions: 1.1.0.Beta21
> Reporter: Ondrej Lukas
> Assignee: Darran Lofthouse
> Priority: Critical
>
> In case when some principal-transformers are used for transforming principal in security domain then final username which is used for authentication and later for authorization is: input_username transformed by pre-realm-principal-transformer, post-realm-principal-transformer and realm principal-transformer. However Principal assigned to SecurityIdentity uses only name input_username transformed by pre-realm-principal-transformer.
> It seems it is caused by passing {{preRealmPrincipal}} as fourth parameter in https://github.com/wildfly-security/wildfly-elytron/blob/7b5c89c437d27fec...
> Value of SecurityIdentity.getPrincipal() can be seen when trace log is enabled due to https://github.com/wildfly-security/wildfly-elytron/blob/7b5c89c437d27fec...
> Since it seems there is currently no documentation related to this topic I cannot say whether it is real bug. [~dlofthouse] could you please provide some clarification?
> Log (see Steps to Reproduce for more details about configuration):
> {code}
> TRACE [org.wildfly.security] (default task-3) Principal assigning: [user], pre-realm rewritten: [user1], realm name: [ApplicationRealm], post realm rewritten: [user12], realm rewritten: [user123]
> TRACE [org.wildfly.security] (default task-3) Attempting to authenticate account user123 using LegacyPropertiesSecurityRealm.
> ...
> TRACE [org.wildfly.security] (default task-3) Role mapping: principal [user1] -> decoded roles [JBossAdmin] -> realm mapped roles [JBossAdmin] -> domain mapped roles [JBossAdmin]
> {code}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months