> I don't know how to configure CRL Checking in the authentication bean.
That's my fault. I've been meaning to pen documentation for months now.
> But CRLDistributionPointRevocationChecker constructor expects a Cache
> object... but I've no idea how to set it up. So I'm looking for advices...
That implementation has a poller process to fetch the CRL from the
resource (URL in practice) defined in the CRLDistributionPoints
extension field and then cache it for a period of time so that certs
issued by the same CA can avoid fetching it on every authentication.
Here's a complete example from our university:
<bean
class="org.jasig.cas.adaptors.x509.authentication.handler.support.X509CredentialsAuthenticationHandler"
p:trustedIssuerDnPattern="${x509.trusted.issuer.pattern}"
p:maxPathLength="2147483647"
p:maxPathLengthAllowUnspecified="true"
p:checkKeyUsage="true"
p:requireKeyUsage="true">
<property name="revocationChecker">
<bean
class="org.jasig.cas.adaptors.x509.authentication.handler.support.CRLDistributionPointRevocationChecker">
<constructor-arg>
<!-- Cache CRL fetches for 6h -->
<bean
class="org.springframework.cache.ehcache.EhCacheFactoryBean"
p:cacheName="CRLCache"
p:eternal="false"
p:overflowToDisk="false"
p:maxElementsInMemory="100"
p:timeToLive="${x509.crl.cache.timeout}"
p:timeToIdle="${x509.crl.cache.timeout}">
<property name="cacheManager">
<bean
class="org.springframework.cache.ehcache.EhCacheManagerFactoryBean" />
</property>
</bean>
</constructor-arg>
<property name="unavailableCRLPolicy">
<bean class="${x509.unavailable.crl.policy}" />
</property>
<property name="expiredCRLPolicy">
<!-- Allow expired CRL data up to 48h -->
<bean
class="org.jasig.cas.adaptors.x509.authentication.handler.support.ThresholdExpiredCRLRevocationPolicy"
p:threshold="${x509.expired.crl.policy.threshold}" />
</property>
</bean>
</property>
</bean>
The unavailableCRLPolicy can be either of the following:
org.jasig.cas.adaptors.x509.authentication.handler.support.AllowRevocationPolicy
org.jasig.cas.adaptors.x509.authentication.handler.support.DenyRevocationPolicy
While the Deny policy is arguably more secure, its use has dramatic
consequences when CRL data is unavailable: all X.509 authentication
will fail. In our opinion the availability/security trade off isn't
worth it for this policy.
M
--
You are currently subscribed to [email protected] as:
[email protected]
To unsubscribe, change settings or access archives, see
http://www.ja-sig.org/wiki/display/JSG/cas-user