Sorry, missed the point, the idea was to use an issuer to get the right
verifier in case of JWS, which would use the issuer-specific key material ?
Just FYI, JwsJwtConsumer (this one differs from JoseJwtConsumer is that
it only supports the signature validation) will return
JwtToken/JwtClaims (still unvalidated - JWS format allows to introspect
a JWS payload by any 3rd party JWS library as opposed to JWE), with
getIssuer() then used to load the right JwsSignatureVerifier.
If the token contains 'kid' of the key (in its JwsHeaders) then it can
be used to load JwsSignatureVerifier too though the producer will need
to know the 'kids' so Colm is right using the issuers will be more
flexible...
Sorry for the noise in case the above is not relevant :-)
Sergey
On 27/06/17 10:05, Sergey Beryozkin wrote:
Hi Francesco
I'm not sure it can help but a utility class JoseJwtConsumer will return
a verified (and/or decrypted) JwtToken which has the typed methods like
getIssuer, etc...
JoseJwtConsumer will itself create JwsSignatureVerifier (and/or
JweDecryptionProvider) (using the endpoint contextual properties) and
use them to prepare JwtToken for the application code.
Cheers, Sergey
On 27/06/17 09:24, Francesco Chicchiriccò wrote:
On 26/06/2017 18:07, Colm O hEigeartaigh wrote:
Hi all,
It occurred to me that we can easily support SSO using third party JWT
tokens. Instead of (or as well as) having a single
"jwsSignatureVerifier"
in securityContext.xml, we could have a map of issuer ->
jwsSignatureVerifier Objects.
We could get the verifier to use to verify the signature by querying the
map using the issuer of the token. If this succeeds, and if the
subject is
a known user, we could allow the call to proceed.
Alternatively, we could have a separate service which translates third
party JWT tokens into local SSO tokens.
Hi Colm,
your idea seems interesting.
Instead of providing a map in securityContext.xml, I would rather
enable [1] to dynamically discover JwsSignatureVerifier
implementations (or maybe a new interface of ours extending that,
adding a getIssuer() method).
Moreover, the new interface extending JwsSignatureVerifier could also
provide a method to resolve the JWT subject into Syncope username
(known user).
If you like, I can take care of this.
Please also note that such SSO would work only at REST level; in order
to enable Admin Console or Enduser UI to that, something like the SAML
2.0 SP Agent [2] will need to be provided.
As people started asking for 2.0.4 [3][4] and CXF 3.1.12 is under
vote, I think we should start finalizing, e.g. postponing new features
and improvements to 2.0.5. But maybe this one can still fit.
Regards.
[1]
https://github.com/apache/syncope/blob/2_0_X/core/logic/src/main/java/org/apache/syncope/core/logic/init/ClassPathScanImplementationLookup.java
[2]
https://github.com/apache/syncope/blob/2_0_X/ext/saml2sp/agent/src/main/java/org/apache/syncope/ext/saml2lsp/agent/AssertionConsumer.java#L47
[3]
https://lists.apache.org/thread.html/d8a6f8fe3629d1d00165e2461458511d8ace983af6006a5d304fa6a9@%3Cuser.syncope.apache.org%3E
[4]
https://lists.apache.org/thread.html/7d9072146f01994c8fb7f02c8af1f88e031345e391c06970a8fcf1ff@%3Cuser.syncope.apache.org%3E
--
Sergey Beryozkin
Talend Community Coders
http://coders.talend.com/