Hi Greg-
On 10/12/12 15:49, web-id wrote:
Greetings!

Newbie here..

I am interested in using cxf's Oauth 2 jar/lib for a provider
implementation.


thanks for the interest

My Qs. 1. I already have a SAML 2.0 IDP ; What is the easiest and  the best
way to
introduce Oauth 2 and glue them together? really appreciate if anyone can
point me
in the right direction.

CXF has a service provider support for Web SSO:
http://cxf.apache.org/docs/saml-web-sso.html

Does your IDP support it too ? If yes then it will be the easiest way to start, to get it all linked.
If it does not then we can think of using CXF Fediz.

Next please check the demo at

https://github.com/Talend/tesb-rt-se/tree/master/examples/cxf/jaxrs-oauth2.

The default implementation has all the parties (the client, the resource server, OAuth services) collocated in the same container instance.

"saml-sso" has the same demo implemented but with all the parties running in its own containers, on different ports. So we have the 3 web apps for OAuth2 main parties, plus WebSSO RACS endpoint where IDP will redirect the user after it has authenticated, plus IDP itself, Shibboleth (and Kerberos) is used to authenticate the user...

Note, in the simple/default demo, the user login, say "[email protected]" is used to link the current authenticated user to the resources this user owns. This 'social.com' id is not necessarily the one the user will enter when authenticating with the existing IDP, it can be something different. So in the "saml-sso" version, the users logs in with say "[email protected]" and also has a chance to enter an 'alias', say, 'barrym'.

The demo assumption is that the user will have this alias entered to IDP, to get its own social.com login value completely different. So after IDP redirects the user to RACS, this 'barrym' value will be eventually available to SAML SSO filter protecting the endpoint which will set the security context and after that the social.com implementation will get it and check if the user with the given alias exists or not...

I guess it can be further enhanced to actually also submit the alias to Kerberos, but I thought it would go a bit too far for the purpose of the demo :-)



2. A stand-alone Oauth 2 authorization provider implementation. Any pointers
on this too.


Have a look at the linked demo please, if you have any questions - let me know please.

Cheers, Sergey

Thanks in advance.
-Greg



--
View this message in context: 
http://cxf.547215.n5.nabble.com/Oauth-2-provider-lib-and-Qs-tp5719975.html
Sent from the cxf-user mailing list archive at Nabble.com.


--
Sergey Beryozkin

Talend Community Coders
http://coders.talend.com/

Blog: http://sberyozkin.blogspot.com

Reply via email to