> I think that only ticket.getChainedAuthentications() have to be evaluated
> (which include the previous two).

Chained authentications are only meaningful for proxy chains and are
deliberately not checked here. (see below)

> Suppose this scenario:
> There are two service: SA and SB.
> The user UA is allowed to the service SA but he is not allowed to the
> service SB.
> The user UA try to access the service SB, through a proxy ticket of the
> service SA.
> Before the creation of the proxy ticket, at the method
> ContextualAuthenticationPolicy.isSatisfiedBy() is passed an authentication
> with a principalId of this kind: "https://myhost:8443/SA/proxyCallback"; and
> I cannot evaluate if the user behind this authentication is allowed to
> access the service SB.

Honestly, authentication policy here was only designed to perform
checks on authentications that result from presentations of
credentials by users (i.e. the multi-factor use case). There's simply
not enough information returned from a proxy callback authentication
event to do anything meaningful (at least as implemented in its
default impl of a PKIX trust check on a SSL/TLS connection). I'm open
to expanding the policy to include proxy use cases, but it's not at
all clear how that could happen while preserving the foremost use
case, namely implementing security policy around user credentials.

M

-- 
You are currently subscribed to cas-dev@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to