[
https://issues.apache.org/jira/browse/CXF-3496?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13029880#comment-13029880
]
Aris Tsaklidis commented on CXF-3496:
-------------------------------------
added the working SpnegoAuthSupplier.java (see attachment)
> SpnegoAuthSupplier using Kerberos OID instead of Spnego
> -------------------------------------------------------
>
> Key: CXF-3496
> URL: https://issues.apache.org/jira/browse/CXF-3496
> Project: CXF
> Issue Type: Bug
> Components: Transports
> Affects Versions: 2.4
> Reporter: Aris Tsaklidis
> Attachments: SpnegoAuthSupplier.java
>
>
> Updating from 2.3.4 to 2.4.0 added the SpnegoAuthSupplier which is called
> everytime you use "Negotiate" as AuthorizationType. SpnegoAuthSupplier uses
> Kerberos OID instead of Spnego. Spnego would be correct.
> http://cxf.547215.n5.nabble.com/CXF-2-4-Kerberos-SpnegoAuthSupplier-Message-content-from-Soap-Response-is-null-td4369582.html
> ## correct code in SpnegoAuthSupplier.java
> private byte[] getToken(AuthorizationPolicy proxyAuthPolicy, String spn)
> throws GSSException,
> LoginException {
> GSSManager manager = GSSManager.getInstance();
> GSSName serverName = manager.createName(spn, null);
> // need to use SPNEGO_OID
> Oid oid = new Oid(SPNEGO_OID);
>
> GSSContext context = manager
> .createContext(serverName.canonicalize(oid), oid, null,
> GSSContext.DEFAULT_LIFETIME);
> // TODO Do we need mutual auth. Will the code we have really work with
> // mutual auth?
> context.requestMutualAuth(true);
> // TODO Credential delegation could be a security hole if it was not
> // intended. Both settings should be configurable
> context.requestCredDeleg(true);
> return getToken(proxyAuthPolicy, context);
> }
--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira