| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606 |
- //------------------------------------------------------------
- // Copyright (c) Microsoft Corporation. All rights reserved.
- //------------------------------------------------------------
- using System.Collections.Generic;
- using System.Collections.ObjectModel;
- using System.Globalization;
- using System.IdentityModel;
- using System.IdentityModel.Protocols.WSTrust;
- using System.IdentityModel.Selectors;
- using System.IdentityModel.Tokens;
- using System.ServiceModel.Description;
- using System.ServiceModel.Security.Tokens;
- using SR = System.ServiceModel.SR;
- namespace System.ServiceModel.Security
- {
- /// <summary>
- /// SecurityTokenManager that enables plugging custom tokens easily.
- /// The SecurityTokenManager provides methods to register custom token providers,
- /// serializers and authenticators. It can wrap another Token Managers and
- /// delegate token operation calls to it if required.
- /// </summary>
- /// <remarks>
- /// Framework use only - this is an implementation adapter class that is used to expose
- /// the Framework SecurityTokenHandlers to WCF.
- /// </remarks>
- sealed class FederatedSecurityTokenManager : ServiceCredentialsSecurityTokenManager
- {
- static string ListenUriProperty = "http://schemas.microsoft.com/ws/2006/05/servicemodel/securitytokenrequirement/ListenUri";
- ExceptionMapper _exceptionMapper;
- SecurityTokenResolver _defaultTokenResolver;
- SecurityTokenHandlerCollection _securityTokenHandlerCollection;
- object _syncObject = new object();
- ReadOnlyCollection<CookieTransform> _cookieTransforms;
- SessionSecurityTokenCache _tokenCache;
- /// <summary>
- /// Initializes an instance of <see cref="FederatedSecurityTokenManager"/>.
- /// </summary>
- /// <param name="parentCredentials">ServiceCredentials that created this instance of TokenManager.</param>
- /// <exception cref="ArgumentNullException">The argument 'parentCredentials' is null.</exception>
- public FederatedSecurityTokenManager( ServiceCredentials parentCredentials )
- : base( parentCredentials )
- {
- if ( parentCredentials == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "parentCredentials" );
- }
- if ( parentCredentials.IdentityConfiguration == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "parentCredentials.IdentityConfiguration" );
- }
- _exceptionMapper = parentCredentials.ExceptionMapper;
- _securityTokenHandlerCollection = parentCredentials.IdentityConfiguration.SecurityTokenHandlers;
- _tokenCache = _securityTokenHandlerCollection.Configuration.Caches.SessionSecurityTokenCache;
- _cookieTransforms = SessionSecurityTokenHandler.DefaultCookieTransforms;
- }
- /// <summary>
- /// Returns the list of SecurityTokenHandlers.
- /// </summary>
- public SecurityTokenHandlerCollection SecurityTokenHandlers
- {
- //
- //
- get { return _securityTokenHandlerCollection; }
- }
- /// <summary>
- /// Gets or sets the ExceptionMapper to be used when throwing exceptions.
- /// </summary>
- public ExceptionMapper ExceptionMapper
- {
- get
- {
- return _exceptionMapper;
- }
- set
- {
- if ( value == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "value" );
- }
- _exceptionMapper = value;
- }
- }
- #region SecurityTokenManager Implementation
- /// <summary>
- /// Overriden from the base class. Creates the requested Token Authenticator.
- /// Looks up the list of Token Handlers registered with the token Manager
- /// based on the TokenType Uri in the SecurityTokenRequirement. If none is found,
- /// then the call is delegated to the inner Token Manager.
- /// </summary>
- /// <param name="tokenRequirement">Security Token Requirement for which the Authenticator should be created.</param>
- /// <param name="outOfBandTokenResolver">Token resolver that resolves any out-of-band tokens.</param>
- /// <returns>Instance of Security Token Authenticator.</returns>
- /// <exception cref="ArgumentNullException">'tokenRequirement' parameter is null.</exception>
- /// <exception cref="NotSupportedException">No Authenticator is registered for the given token type.</exception>
- public override SecurityTokenAuthenticator CreateSecurityTokenAuthenticator( SecurityTokenRequirement tokenRequirement, out SecurityTokenResolver outOfBandTokenResolver )
- {
- if ( tokenRequirement == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "tokenRequirement" );
- }
- outOfBandTokenResolver = null;
- // Check for a registered authenticator
- SecurityTokenAuthenticator securityTokenAuthenticator = null;
- string tokenType = tokenRequirement.TokenType;
- //
- // When the TokenRequirement.TokenType is null, we treat this as a SAML issued token case. It may be SAML 1.1 or SAML 2.0.
- //
- if ( String.IsNullOrEmpty( tokenType ) )
- {
- return CreateSamlSecurityTokenAuthenticator( tokenRequirement, out outOfBandTokenResolver );
- }
- //
- // When the TokenType is set, build a token authenticator for the specified token type.
- //
- SecurityTokenHandler securityTokenHandler = _securityTokenHandlerCollection[tokenType];
- if ( ( securityTokenHandler != null ) && ( securityTokenHandler.CanValidateToken ) )
- {
- outOfBandTokenResolver = GetDefaultOutOfBandTokenResolver();
- if ( StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.UserName ) )
- {
- UserNameSecurityTokenHandler upSecurityTokenHandler = securityTokenHandler as UserNameSecurityTokenHandler;
- if ( upSecurityTokenHandler == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(
- new InvalidOperationException( SR.GetString( SR.ID4072, securityTokenHandler.GetType(), tokenType, typeof( UserNameSecurityTokenHandler ) ) ) );
- }
- securityTokenAuthenticator = new WrappedUserNameSecurityTokenAuthenticator( upSecurityTokenHandler, _exceptionMapper );
- }
- else if ( StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.Kerberos ) )
- {
- securityTokenAuthenticator = CreateInnerSecurityTokenAuthenticator( tokenRequirement, out outOfBandTokenResolver );
- }
- else if ( StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.Rsa ) )
- {
- RsaSecurityTokenHandler rsaSecurityTokenHandler = securityTokenHandler as RsaSecurityTokenHandler;
- if ( rsaSecurityTokenHandler == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(
- new InvalidOperationException( SR.GetString( SR.ID4072, securityTokenHandler.GetType(), tokenType, typeof( RsaSecurityTokenHandler ) ) ) );
- }
- securityTokenAuthenticator = new WrappedRsaSecurityTokenAuthenticator( rsaSecurityTokenHandler, _exceptionMapper );
- }
- else if ( StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.X509Certificate ) )
- {
- X509SecurityTokenHandler x509SecurityTokenHandler = securityTokenHandler as X509SecurityTokenHandler;
- if ( x509SecurityTokenHandler == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(
- new InvalidOperationException( SR.GetString( SR.ID4072, securityTokenHandler.GetType(), tokenType, typeof( X509SecurityTokenHandler ) ) ) );
- }
- securityTokenAuthenticator = new WrappedX509SecurityTokenAuthenticator( x509SecurityTokenHandler, _exceptionMapper );
- }
- else if ( StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.SamlTokenProfile11 ) ||
- StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.OasisWssSamlTokenProfile11 ) )
- {
- SamlSecurityTokenHandler saml11SecurityTokenHandler = securityTokenHandler as SamlSecurityTokenHandler;
- if ( saml11SecurityTokenHandler == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(
- new InvalidOperationException( SR.GetString( SR.ID4072, securityTokenHandler.GetType(), tokenType, typeof( SamlSecurityTokenHandler ) ) ) );
- }
- if ( saml11SecurityTokenHandler.Configuration == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperInvalidOperation( SR.GetString( SR.ID4274 ) );
- }
- securityTokenAuthenticator = new WrappedSaml11SecurityTokenAuthenticator( saml11SecurityTokenHandler, _exceptionMapper );
- // The out-of-band token resolver will be used by WCF to decrypt any encrypted SAML tokens.
- outOfBandTokenResolver = saml11SecurityTokenHandler.Configuration.ServiceTokenResolver;
- }
- else if ( StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.Saml2TokenProfile11 ) ||
- StringComparer.Ordinal.Equals( tokenType, SecurityTokenTypes.OasisWssSaml2TokenProfile11 ) )
- {
- Saml2SecurityTokenHandler saml2SecurityTokenHandler = securityTokenHandler as Saml2SecurityTokenHandler;
- if ( saml2SecurityTokenHandler == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(
- new InvalidOperationException( SR.GetString( SR.ID4072, securityTokenHandler.GetType(), tokenType, typeof( Saml2SecurityTokenHandler ) ) ) );
- }
- if ( saml2SecurityTokenHandler.Configuration == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperInvalidOperation( SR.GetString( SR.ID4274 ) );
- }
- securityTokenAuthenticator = new WrappedSaml2SecurityTokenAuthenticator( saml2SecurityTokenHandler, _exceptionMapper );
- // The out-of-band token resolver will be used by WCF to decrypt any encrypted SAML tokens.
- outOfBandTokenResolver = saml2SecurityTokenHandler.Configuration.ServiceTokenResolver;
- }
- else if ( StringComparer.Ordinal.Equals( tokenType, ServiceModelSecurityTokenTypes.SecureConversation ) )
- {
- RecipientServiceModelSecurityTokenRequirement tr = tokenRequirement as RecipientServiceModelSecurityTokenRequirement;
- if ( tr == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperInvalidOperation( SR.GetString( SR.ID4240, tokenRequirement.GetType().ToString() ) );
- }
- securityTokenAuthenticator = SetupSecureConversationWrapper( tr, securityTokenHandler as SessionSecurityTokenHandler, out outOfBandTokenResolver );
- }
- else
- {
- securityTokenAuthenticator = new SecurityTokenAuthenticatorAdapter( securityTokenHandler, _exceptionMapper );
- }
- }
- else
- {
- if ( tokenType == ServiceModelSecurityTokenTypes.SecureConversation
- || tokenType == ServiceModelSecurityTokenTypes.MutualSslnego
- || tokenType == ServiceModelSecurityTokenTypes.AnonymousSslnego
- || tokenType == ServiceModelSecurityTokenTypes.SecurityContext
- || tokenType == ServiceModelSecurityTokenTypes.Spnego )
- {
- RecipientServiceModelSecurityTokenRequirement tr = tokenRequirement as RecipientServiceModelSecurityTokenRequirement;
- if ( tr == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperInvalidOperation( SR.GetString( SR.ID4240, tokenRequirement.GetType().ToString() ) );
- }
- securityTokenAuthenticator = SetupSecureConversationWrapper( tr, null, out outOfBandTokenResolver );
- }
- else
- {
- securityTokenAuthenticator = CreateInnerSecurityTokenAuthenticator( tokenRequirement, out outOfBandTokenResolver );
- }
- }
- return securityTokenAuthenticator;
- }
- /// <summary>
- /// Helper method to setup the WrappedSecureConversttion
- /// </summary>
- SecurityTokenAuthenticator SetupSecureConversationWrapper( RecipientServiceModelSecurityTokenRequirement tokenRequirement, SessionSecurityTokenHandler tokenHandler, out SecurityTokenResolver outOfBandTokenResolver )
- {
- // This code requires Orcas SP1 to compile.
- // WCF expects this securityTokenAuthenticator to support:
- // 1. IIssuanceSecurityTokenAuthenticator
- // 2. ICommunicationObject is needed for this to work right.
- // WCF opens a listener in this STA that handles the nego and uses an internal class for negotiating the
- // the bootstrap tokens. We want to handle ValidateToken to return our authorization policies and surface the bootstrap tokens.
- // when sp1 is installed, use this one.
- //SecurityTokenAuthenticator sta = base.CreateSecureConversationTokenAuthenticator( tokenRequirement as RecipientServiceModelSecurityTokenRequirement, _saveBootstrapTokensInSession, out outOfBandTokenResolver );
- // use this code if SP1 is not installed
- SecurityTokenAuthenticator sta = base.CreateSecurityTokenAuthenticator( tokenRequirement, out outOfBandTokenResolver );
- SessionSecurityTokenHandler sessionTokenHandler = tokenHandler;
- //
- // If there is no SCT handler here, create one.
- //
- if ( tokenHandler == null )
- {
- sessionTokenHandler = new SessionSecurityTokenHandler( _cookieTransforms, SessionSecurityTokenHandler.DefaultTokenLifetime );
- sessionTokenHandler.ContainingCollection = _securityTokenHandlerCollection;
- sessionTokenHandler.Configuration = _securityTokenHandlerCollection.Configuration;
- }
- if ( ServiceCredentials != null )
- {
- sessionTokenHandler.Configuration.MaxClockSkew = ServiceCredentials.IdentityConfiguration.MaxClockSkew;
- }
- SctClaimsHandler claimsHandler = new SctClaimsHandler(
- _securityTokenHandlerCollection,
- GetNormalizedEndpointId( tokenRequirement ) );
- WrappedSessionSecurityTokenAuthenticator wssta = new WrappedSessionSecurityTokenAuthenticator( sessionTokenHandler, sta,
- claimsHandler, _exceptionMapper );
- WrappedTokenCache wrappedTokenCache = new WrappedTokenCache( _tokenCache, claimsHandler);
- SetWrappedTokenCache( wrappedTokenCache, sta, wssta, claimsHandler );
- outOfBandTokenResolver = wrappedTokenCache;
- return wssta;
- }
- /// <summary>
- /// The purpose of this method is to set our WrappedTokenCache as the token cache for SCT's.
- /// And to set our OnIssuedToken callback when in cookie mode.
- /// We have to use reflection here as this is a private method.
- /// </summary>
- static void SetWrappedTokenCache(
- WrappedTokenCache wrappedTokenCache,
- SecurityTokenAuthenticator sta,
- WrappedSessionSecurityTokenAuthenticator wssta,
- SctClaimsHandler claimsHandler )
- {
- if ( sta is SecuritySessionSecurityTokenAuthenticator )
- {
- ( sta as SecuritySessionSecurityTokenAuthenticator ).IssuedTokenCache = wrappedTokenCache;
- }
- else if ( sta is AcceleratedTokenAuthenticator )
- {
- ( sta as AcceleratedTokenAuthenticator ).IssuedTokenCache = wrappedTokenCache;
- }
- else if ( sta is SpnegoTokenAuthenticator )
- {
- ( sta as SpnegoTokenAuthenticator ).IssuedTokenCache = wrappedTokenCache;
- }
- else if ( sta is TlsnegoTokenAuthenticator )
- {
- ( sta as TlsnegoTokenAuthenticator ).IssuedTokenCache = wrappedTokenCache;
- }
- // we need to special case this as the OnTokenIssued callback is not hooked up in the cookie mode case.
- IIssuanceSecurityTokenAuthenticator issuanceTokenAuthenticator = sta as IIssuanceSecurityTokenAuthenticator;
- if ( issuanceTokenAuthenticator != null )
- {
- issuanceTokenAuthenticator.IssuedSecurityTokenHandler = claimsHandler.OnTokenIssued;
- issuanceTokenAuthenticator.RenewedSecurityTokenHandler = claimsHandler.OnTokenRenewed;
- }
- }
- /// <summary>
- /// Overriden from the base class. Creates the requested Token Serializer.
- /// Returns a Security Token Serializer that is wraps the list of token
- /// hanlders registerd and also the serializers from the inner token manager.
- /// </summary>
- /// <param name="version">SecurityTokenVersion of the serializer to be created.</param>
- /// <returns>Instance of SecurityTokenSerializer.</returns>
- /// <exception cref="ArgumentNullException">Input parameter is null.</exception>
- public override SecurityTokenSerializer CreateSecurityTokenSerializer( SecurityTokenVersion version )
- {
- if ( version == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "version" );
- }
- TrustVersion trustVersion = null;
- SecureConversationVersion scVersion = null;
- foreach ( string securitySpecification in version.GetSecuritySpecifications() )
- {
- if ( StringComparer.Ordinal.Equals( securitySpecification, WSTrustFeb2005Constants.NamespaceURI ) )
- {
- trustVersion = TrustVersion.WSTrustFeb2005;
- }
- else if ( StringComparer.Ordinal.Equals( securitySpecification, WSTrust13Constants.NamespaceURI ) )
- {
- trustVersion = TrustVersion.WSTrust13;
- }
- else if ( StringComparer.Ordinal.Equals( securitySpecification, WSSecureConversationFeb2005Constants.Namespace ) )
- {
- scVersion = SecureConversationVersion.WSSecureConversationFeb2005;
- }
- else if ( StringComparer.Ordinal.Equals( securitySpecification, WSSecureConversation13Constants.Namespace ) )
- {
- scVersion = SecureConversationVersion.WSSecureConversation13;
- }
- if ( trustVersion != null && scVersion != null )
- {
- break;
- }
- }
- if ( trustVersion == null )
- {
- trustVersion = TrustVersion.WSTrust13;
- }
- if ( scVersion == null )
- {
- scVersion = SecureConversationVersion.WSSecureConversation13;
- }
- WsSecurityTokenSerializerAdapter adapter = new WsSecurityTokenSerializerAdapter( _securityTokenHandlerCollection,
- GetSecurityVersion( version ), trustVersion, scVersion, false, this.ServiceCredentials.IssuedTokenAuthentication.SamlSerializer,
- this.ServiceCredentials.SecureConversationAuthentication.SecurityStateEncoder,
- this.ServiceCredentials.SecureConversationAuthentication.SecurityContextClaimTypes );
- adapter.MapExceptionsToSoapFaults = true;
- adapter.ExceptionMapper = _exceptionMapper;
- return adapter;
- }
- /// <summary>
- /// The out-of-band token resolver to be used if the authenticator does
- /// not provide another.
- /// </summary>
- /// <remarks>By default this will create the resolver with the service certificate and
- /// know certificates collections specified in the service credentials when the STS is
- /// hosted inside WCF.</remarks>
- SecurityTokenResolver GetDefaultOutOfBandTokenResolver()
- {
- if ( _defaultTokenResolver == null )
- {
- lock ( _syncObject )
- {
- if ( _defaultTokenResolver == null )
- {
- //
- // Create default Out-Of-Band SecurityResolver.
- //
- List<SecurityToken> outOfBandTokens = new List<SecurityToken>();
- if ( base.ServiceCredentials.ServiceCertificate.Certificate != null )
- {
- outOfBandTokens.Add( new X509SecurityToken( base.ServiceCredentials.ServiceCertificate.Certificate ) );
- }
- if ( ( base.ServiceCredentials.IssuedTokenAuthentication.KnownCertificates != null ) && ( base.ServiceCredentials.IssuedTokenAuthentication.KnownCertificates.Count > 0 ) )
- {
- for ( int i = 0; i < base.ServiceCredentials.IssuedTokenAuthentication.KnownCertificates.Count; ++i )
- {
- outOfBandTokens.Add( new X509SecurityToken( base.ServiceCredentials.IssuedTokenAuthentication.KnownCertificates[i]));
- }
- }
- _defaultTokenResolver = SecurityTokenResolver.CreateDefaultSecurityTokenResolver( outOfBandTokens.AsReadOnly(), false );
- }
- }
- }
- return _defaultTokenResolver;
- }
- /// <summary>
- /// There is a bug in WCF where the version obtained from the public SecurityTokenVersion strings is wrong.
- /// The internal MessageSecurityTokenVersion has the right version.
- /// </summary>
- internal static SecurityVersion GetSecurityVersion( SecurityTokenVersion tokenVersion )
- {
- if ( tokenVersion == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "tokenVersion" );
- }
- //
- // Workaround for WCF bug.
- // In .NET 3.5 WCF returns the wrong Token Specification. We need to reflect on the
- // internal code so we can access the SecurityVersion directly instead of depending
- // on the security specification.
- //
- if ( tokenVersion is MessageSecurityTokenVersion )
- {
- SecurityVersion sv = ( tokenVersion as MessageSecurityTokenVersion ).SecurityVersion;
- if ( sv != null )
- {
- return sv;
- }
- }
- else
- {
- if ( tokenVersion.GetSecuritySpecifications().Contains( WSSecurity11Constants.Namespace ) )
- {
- return SecurityVersion.WSSecurity11;
- }
- else if ( tokenVersion.GetSecuritySpecifications().Contains( WSSecurity10Constants.Namespace ) )
- {
- return SecurityVersion.WSSecurity10;
- }
- }
- return SecurityVersion.WSSecurity11;
- }
- #endregion // SecurityTokenManager Implementation
- /// <summary>
- /// This method creates the inner security token authenticator from the base class.
- /// The wrapped token cache is initialized with this authenticator.
- /// </summary>
- SecurityTokenAuthenticator CreateInnerSecurityTokenAuthenticator( SecurityTokenRequirement tokenRequirement, out SecurityTokenResolver outOfBandTokenResolver )
- {
- SecurityTokenAuthenticator securityTokenAuthenticator = base.CreateSecurityTokenAuthenticator( tokenRequirement, out outOfBandTokenResolver );
- SctClaimsHandler claimsHandler = new SctClaimsHandler(
- _securityTokenHandlerCollection,
- GetNormalizedEndpointId( tokenRequirement ) );
-
- SetWrappedTokenCache( new WrappedTokenCache( _tokenCache, claimsHandler ), securityTokenAuthenticator, null, claimsHandler );
- return securityTokenAuthenticator;
- }
- /// <summary>
- /// This method creates a SAML security token authenticator when token type is null.
- /// It wraps the SAML 1.1 and the SAML 2.0 token handlers that are configured.
- /// If no token handler was found, then the inner token manager is created.
- /// </summary>
- SecurityTokenAuthenticator CreateSamlSecurityTokenAuthenticator( SecurityTokenRequirement tokenRequirement, out SecurityTokenResolver outOfBandTokenResolver )
- {
- outOfBandTokenResolver = null;
- SecurityTokenAuthenticator securityTokenAuthenticator = null;
- SamlSecurityTokenHandler saml11SecurityTokenHandler = _securityTokenHandlerCollection[SecurityTokenTypes.SamlTokenProfile11] as SamlSecurityTokenHandler;
- Saml2SecurityTokenHandler saml2SecurityTokenHandler = _securityTokenHandlerCollection[SecurityTokenTypes.Saml2TokenProfile11] as Saml2SecurityTokenHandler;
- if ( saml11SecurityTokenHandler != null && saml11SecurityTokenHandler.Configuration == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperInvalidOperation( SR.GetString( SR.ID4274 ) );
- }
- if ( saml2SecurityTokenHandler != null && saml2SecurityTokenHandler.Configuration == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperInvalidOperation( SR.GetString( SR.ID4274 ) );
- }
- if ( saml11SecurityTokenHandler != null && saml2SecurityTokenHandler != null )
- {
- //
- // Both SAML 1.1 and SAML 2.0 token handlers have been configured.
- //
- WrappedSaml11SecurityTokenAuthenticator wrappedSaml11SecurityTokenAuthenticator = new WrappedSaml11SecurityTokenAuthenticator( saml11SecurityTokenHandler, _exceptionMapper );
- WrappedSaml2SecurityTokenAuthenticator wrappedSaml2SecurityTokenAuthenticator = new WrappedSaml2SecurityTokenAuthenticator( saml2SecurityTokenHandler, _exceptionMapper );
- securityTokenAuthenticator = new WrappedSamlSecurityTokenAuthenticator( wrappedSaml11SecurityTokenAuthenticator, wrappedSaml2SecurityTokenAuthenticator );
- // The out-of-band token resolver will be used by WCF to decrypt any encrypted SAML tokens.
- List<SecurityTokenResolver> resolvers = new List<SecurityTokenResolver>();
- resolvers.Add( saml11SecurityTokenHandler.Configuration.ServiceTokenResolver );
- resolvers.Add( saml2SecurityTokenHandler.Configuration.ServiceTokenResolver );
- outOfBandTokenResolver = new AggregateTokenResolver( resolvers );
- }
- else if ( saml11SecurityTokenHandler == null && saml2SecurityTokenHandler != null )
- {
- //
- // SAML 1.1 token handler is not present but SAML 2.0 is. Set the token type to SAML 2.0
- //
- securityTokenAuthenticator = new WrappedSaml2SecurityTokenAuthenticator( saml2SecurityTokenHandler, _exceptionMapper );
- // The out-of-band token resolver will be used by WCF to decrypt any encrypted SAML tokens.
- outOfBandTokenResolver = saml2SecurityTokenHandler.Configuration.ServiceTokenResolver;
- }
- else if ( saml11SecurityTokenHandler != null && saml2SecurityTokenHandler == null )
- {
- //
- // SAML 1.1 token handler is present but SAML 2.0 is not. Set the token type to SAML 1.1
- //
- securityTokenAuthenticator = new WrappedSaml11SecurityTokenAuthenticator( saml11SecurityTokenHandler, _exceptionMapper );
- // The out-of-band token resolver will be used by WCF to decrypt any encrypted SAML tokens.
- outOfBandTokenResolver = saml11SecurityTokenHandler.Configuration.ServiceTokenResolver;
- }
- else
- {
- securityTokenAuthenticator = CreateInnerSecurityTokenAuthenticator( tokenRequirement, out outOfBandTokenResolver );
- }
- return securityTokenAuthenticator;
- }
- /// <summary>
- /// Converts the ListenUri in the <see cref="SecurityTokenRequirement"/> to a normalized string.
- /// The method preserves the Uri scheme, port and absolute path and replaces the host name
- /// with the string 'NormalizedHostName'.
- /// </summary>
- /// <param name="tokenRequirement">The <see cref="SecurityTokenRequirement"/> which contains the 'ListenUri' property.</param>
- /// <returns>A string representing the Normalized URI string.</returns>
- public static string GetNormalizedEndpointId( SecurityTokenRequirement tokenRequirement )
- {
- if ( tokenRequirement == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "tokenRequirement" );
- }
- Uri listenUri = null;
- if ( tokenRequirement.Properties.ContainsKey( ListenUriProperty ) )
- {
- listenUri = tokenRequirement.Properties[ListenUriProperty] as Uri;
- }
- if ( listenUri == null )
- {
- throw DiagnosticUtility.ExceptionUtility.ThrowHelperInvalidOperation( SR.GetString( SR.ID4287, tokenRequirement ) );
- }
- if ( listenUri.IsDefaultPort )
- {
- return String.Format( CultureInfo.InvariantCulture, "{0}://NormalizedHostName{1}", listenUri.Scheme, listenUri.AbsolutePath );
- }
- else
- {
- return String.Format( CultureInfo.InvariantCulture, "{0}://NormalizedHostName:{1}{2}", listenUri.Scheme, listenUri.Port, listenUri.AbsolutePath );
- }
- }
- }
- }
|