Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Authenticate users > Use the JAAS programming model for web authentication > Develop custom login modules for a system login configuration for JAAS > Customize application login with JAAS > 1. Develop programmatic logins with JAAS.


Develop programmatic logins with the Java Authentication and Authorization Service

Use this topic to develop programmatic logins with the Java Authentication and Authorization Service. Java Authentication and Authorization Service (JAAS) represents the strategic application programming interfaces (API) for authentication.

JAAS replaces the Common ORB Architecture (CORBA) programmatic login API.

WAS provides some extension to JAAS:

Set com.ibm.CORBA.validateBasicAuth=false whenever connecting to a z/OS server. This function does not currently work from a distributed client to a z/OS server because the SecurityServer is located using the UNAUTHENTICATED principal, which is not accepted on a z/OS system.


Procedure

  1. Use the sas.client.props file and look for the following properties:
    com.ibm.CORBA.securityServerHost=myhost.mydomain
    com.ibm.CORBA.securityServerPort=mybootstrap port 
    If you specify these properties, you are guaranteed that security looks here for the SecurityServer. The host and port specified can represent any valid WebSphere host and bootstrap port. The SecurityServer resides on all server processes and therefore it is not important which host or port you choose. If specified, the security infrastructure within the client process look up the SecurityServer based on the information in the sas.client.props file.
  2. Place the following code in your client application to get a new InitialContext():
    ...
       import java.util.Hashtable;
       import javax.naming.Context;
       import javax.naming.InitialContext;
       ...
    
    // Perform an InitialContext and default lookup prior to logging
    // in so that target realm and bootstrap host/port can be
    // determined for SecurityServer lookup.
    
          Hashtable env = new Hashtable();
          env.put(Context.INITIAL_CONTEXT_FACTORY,    "
                  com.ibm.websphere.naming.WsnInitialContextFactory");
          env.put(Context.PROVIDER_URL,
                  "corbaloc:iiop:myhost.mycompany.com:2809");
          Context initialContext = new InitialContext(env);
          Object obj = initialContext.lookup("");
    
       // programmatic login code goes here.
    
    
    Complete this step prior to running any programmatic login. It is in this code that you specify a URL provider for your naming context, but it must point to a valid WAS within the cell to which you are authenticating. Pointing to one cell allows thread specific programmatic logins going to different cells to have a single system-wide SecurityServer location.

  3. Use the new default InitialContext() method relying on the naming precedence rules described in the example of getting the default initial context.


Example

This example illustrates how application programs can perform a programmatic login using BasicAuth.

Add Programmatic logins with Kerberos token:

LoginContext lc = null;
     
 try {
       lc = new LoginContext("WSKRB5Login",  
                  new WSCallbackHandlerImpl("userName", "password"));
 } catch (LoginException le) {
        .println("Cannot create LoginContext. " + le.getMessage());
        // Insert the error processing code
 } catch(SecurityException se) {
        .println("Cannot create LoginContext." + se.getMessage());
        // Insert the error processing code   }

  try {
         lc.login();
  } catch(LoginException le) {
         .println("Fails to create Subject. " + le.getMessage());
          // Insert the error processing code 

As shown in the example, the new login context is initialized with the WSKRB5Login login configuration and the WSCallbackHandlerImpl callback handler. Use the WSCallbackHandlerImpl instance on a server-side application where you do not want to be prompted. A WSCallbackHandlerImpl instance is initialized by the specified user ID, password, and realm information. The present Krb5LoginModuleWrapperClient class implementation specified by the WSKRB5Login login configuration can only retrieve authentication information from the specified callback handler. You can construct a login context with a Subject object, but the Subject is disregarded by the present Krb5LoginModuleWrapperClient implementation.

For a pure Java application client, the product provides two other callback handler implementations: WSStdinCallbackHandlerImpl and WSGUICallbackHandlerImpl, which prompt for user ID, password, and realm information on the command line and pop-up panel, respectively. We can choose either of these product callback handler implementations, depending on the particular application environment. We can develop a new callback handler if neither of these implementations fit your particular application requirement.

There are additional callbacks that can be used with WSKRB5Login, WSAuthMechOidCallbackImpl and WSCcacheCallBackHandlerImpl. WSAuthMechOidCallbackImpl enabls you to specify the authentication mechanism OID, the Kerberos authentication mechanism OID value is "1.2.840.113554.1.2.2". The WSCcacheCallBackHandlerImpl enables you to specify the user name, Kerberos realm name, the Kerberos credential cache full path and whether to use the default location of the Kerberos credential cache. If you choose to use the default location of the Kerberos credential cache, then the Kerberos credential cache is ignored. If you are using Kerberos for authentication, then you have to update the sas.client.props file.

You also can develop your own login module if the default WSLoginModuleImpl implementation fails to meet all your requirements. This product provides utility functions that the custom login module can use, which are described in the next section.

In cases where no java.naming.provider.url property is set as a system property or in the jndi.properties file, a default InitialContext context does not function if the product server is not at the localhost:2809 location. In this situation, construct a new InitialContext context programmatically ahead of the JAAS login. JAAS needs to know where the security server resides to verify that the entered user ID or password is correct, prior to performing a commit method. By constructing a new InitialContext context in the way specified below, the security code has the information that is needed to find the security server location and the target realm.

Attention: The first line starting with env.put was split into two lines for illustration purposes only.

import java.util.Hashtable;
   import javax.naming.Context;
   import javax.naming.InitialContext;
   ...

// Perform an InitialContext and default lookup prior to logging in so that target realm
// and bootstrap host/port can be determined for SecurityServer lookup.

   Hashtable env = new Hashtable();
   env.put(Context.INITIAL_CONTEXT_FACTORY,
           "com.ibm.websphere.naming.WsnInitialContextFactory");
   env.put(Context.PROVIDER_URL, "corbaloc:iiop:myhost.mycompany.com:2809");
   Context initialContext = new InitialContext(env);
   Object obj = initialContext.lookup("");

    LoginContext lc = null;
    try {
       lc = new LoginContext("WSLogin",  
                  new WSCallbackHandlerImpl("userName", "realm", "password"));
    } catch (LoginException le) {
        .println("Cannot create LoginContext. " + le.getMessage());
        // insert error processing code
    } catch(SecurityException se) {
        .printlin("Cannot create LoginContext." + se.getMessage();
        // Insert error processing
    }

    try {
         lc.login();
    } catch(LoginException le) {
         .printlin("Fails to create Subject. " + le.getMessage());

    
    // Insert error processing code
    }


Programmatic login for JAAS
Configure programmatic logins for JAAS
Develop applications that use CosNaming (CORBA Naming interface)
Customize application login with JAAS


Related


Example: Getting an initial context by setting the provider URL property
Security: Resources for learning

+

Search Tips   |   Advanced Search