public class SSLAuthenticator extends AuthenticatorBase
AuthenticatorBase.AllowCorsPreflightLifecycle.SingleUsealwaysUseSession, AUTH_HEADER_NAME, cache, changeSessionIdOnAuthentication, context, disableProxyCaching, jaspicCallbackHandlerClass, REALM_NAME, securePagesWithPragma, secureRandomAlgorithm, secureRandomClass, secureRandomProvider, sendAuthInfoResponseHeaders, sessionIdGenerator, sm, ssoasyncSupported, container, containerLog, nextmserverAFTER_DESTROY_EVENT, AFTER_INIT_EVENT, AFTER_START_EVENT, AFTER_STOP_EVENT, BEFORE_DESTROY_EVENT, BEFORE_INIT_EVENT, BEFORE_START_EVENT, BEFORE_STOP_EVENT, CONFIGURE_START_EVENT, CONFIGURE_STOP_EVENT, PERIODIC_EVENT, START_EVENT, STOP_EVENT| Constructor and Description |
|---|
SSLAuthenticator() |
| Modifier and Type | Method and Description |
|---|---|
protected boolean |
doAuthenticate(Request request,
HttpServletResponse response)
Authenticate the user by checking for the existence of a certificate
chain, validating it against the trust manager for the connector and then
validating the user's identity against the configured Realm.
|
protected String |
getAuthMethod() |
protected X509Certificate[] |
getRequestCertificates(Request request)
Look for the X509 certificate chain in the Request under the key
jakarta.servlet.request.X509Certificate. |
protected boolean |
isPreemptiveAuthPossible(Request request)
Can the authenticator perform preemptive authentication for the given
request?
|
allowCorsPreflightBypass, associate, authenticate, changeSessionID, checkForCachedAuthentication, doLogin, getAllowCorsPreflight, getAlwaysUseSession, getCache, getChangeSessionIdOnAuthentication, getContainer, getDisableProxyCaching, getJaspicCallbackHandlerClass, getRealmName, getSecurePagesWithPragma, getSecureRandomAlgorithm, getSecureRandomClass, getSecureRandomProvider, invoke, isContinuationRequired, isSendAuthInfoResponseHeaders, login, logout, notify, reauthenticateFromSSO, register, register, setAllowCorsPreflight, setAlwaysUseSession, setCache, setChangeSessionIdOnAuthentication, setContainer, setDisableProxyCaching, setJaspicCallbackHandlerClass, setSecurePagesWithPragma, setSecureRandomAlgorithm, setSecureRandomClass, setSecureRandomProvider, setSendAuthInfoResponseHeaders, startInternal, stopInternalbackgroundProcess, getDomainInternal, getNext, getObjectNameKeyProperties, initInternal, isAsyncSupported, setAsyncSupported, setNext, toStringdestroyInternal, getDomain, getObjectName, postDeregister, postRegister, preDeregister, preRegister, register, setDomain, unregisteraddLifecycleListener, destroy, findLifecycleListeners, fireLifecycleEvent, getState, getStateName, getThrowOnFailure, init, removeLifecycleListener, setState, setState, setThrowOnFailure, start, stopprotected boolean doAuthenticate(Request request, HttpServletResponse response) throws IOException
doAuthenticate in class AuthenticatorBaserequest - Request we are processingresponse - Response we are creatingtrue if the the user was authenticated, otherwise false, in which case an authentication challenge will have been
written to the responseIOException - if an input/output error occursprotected String getAuthMethod()
getAuthMethod in class AuthenticatorBaseprotected boolean isPreemptiveAuthPossible(Request request)
AuthenticatorBaseisPreemptiveAuthPossible in class AuthenticatorBaserequest - The request to check for credentialstrue if preemptive authentication is possible, otherwise
falseprotected X509Certificate[] getRequestCertificates(Request request) throws IllegalStateException
jakarta.servlet.request.X509Certificate. If not found, trigger
extracting the certificate chain from the Coyote request.request - Request to be processednull otherwise.IllegalStateExceptionCopyright © 2000-2022 Apache Software Foundation. All Rights Reserved.