SecurityContextSecurityTokenHelper.cs 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127
  1. //-----------------------------------------------------------------------------
  2. // Copyright (c) Microsoft Corporation. All rights reserved.
  3. //-----------------------------------------------------------------------------
  4. using System.Collections.Generic;
  5. using System.Collections.ObjectModel;
  6. using System.IdentityModel.Policy;
  7. using System.IdentityModel.Tokens;
  8. using System.Security.Claims;
  9. using System.Runtime;
  10. namespace System.ServiceModel.Security.Tokens
  11. {
  12. static class SecurityContextSecurityTokenHelper
  13. {
  14. static public SessionSecurityToken ConvertSctToSessionToken(SecurityContextSecurityToken sct)
  15. {
  16. return ConvertSctToSessionToken(sct, SecureConversationVersion.Default);
  17. }
  18. static public SessionSecurityToken ConvertSctToSessionToken(SecurityContextSecurityToken sct, SecureConversationVersion version)
  19. {
  20. string endpointId = String.Empty;
  21. for (int i = 0; i < sct.AuthorizationPolicies.Count; ++i)
  22. {
  23. EndpointAuthorizationPolicy epAuthPolicy = sct.AuthorizationPolicies[i] as EndpointAuthorizationPolicy;
  24. if (epAuthPolicy != null)
  25. {
  26. endpointId = epAuthPolicy.EndpointId;
  27. break;
  28. }
  29. }
  30. SctAuthorizationPolicy sctAuthPolicy = null;
  31. for (int i = 0; i < sct.AuthorizationPolicies.Count; i++)
  32. {
  33. IAuthorizationPolicy authPolicy = sct.AuthorizationPolicies[i];
  34. // The WCF SCT will have a SctAuthorizationPolicy that wraps the Primary Identity
  35. // of the bootstrap token. This is required for SCT renewal scenarios. Write the
  36. // SctAuthorizationPolicy if one is available.
  37. sctAuthPolicy = authPolicy as SctAuthorizationPolicy;
  38. if (sctAuthPolicy != null)
  39. {
  40. break;
  41. }
  42. }
  43. ClaimsPrincipal claimsPrincipal = null;
  44. // these can be empty in transport security
  45. if (sct.AuthorizationPolicies != null && sct.AuthorizationPolicies.Count > 0)
  46. {
  47. AuthorizationPolicy ap = null;
  48. for (int i = 0; i < sct.AuthorizationPolicies.Count; ++i)
  49. {
  50. ap = sct.AuthorizationPolicies[i] as AuthorizationPolicy;
  51. if (ap != null)
  52. {
  53. // We should have exactly one IAuthorizationPolicy of type AuthorizationPolicy.
  54. break;
  55. }
  56. }
  57. if (ap != null)
  58. {
  59. if (ap.IdentityCollection != null)
  60. {
  61. claimsPrincipal = new ClaimsPrincipal(ap.IdentityCollection);
  62. }
  63. }
  64. }
  65. if (claimsPrincipal == null)
  66. {
  67. // When _securityContextTokenWrapper is true, this implies WCF.
  68. // Authpolicies not found occurs when the SCT represents a bootstrap nego that is used obtain a key
  69. // for the outer or actual SCT {unfortunate but true and we haven't found a way to distinguish this otherwise}.
  70. // So return an empty ClaimsPrincipal so that when written on wire in cookie mode we DO NOT write an empty identity.
  71. // If we did, then when the actual bootstrap token, such as a SAML token arrives, we will add the bootstrap AND the SAML identities to the ClaimsPrincipal
  72. // and end up with multiple, one of them anonymous.
  73. //
  74. claimsPrincipal = new ClaimsPrincipal();
  75. }
  76. return new SessionSecurityToken(claimsPrincipal, sct.ContextId, sct.Id, String.Empty, sct.GetKeyBytes(), endpointId, sct.ValidFrom, sct.ValidTo, sct.KeyGeneration, sct.KeyEffectiveTime, sct.KeyExpirationTime, sctAuthPolicy, new Uri(version.Namespace.Value));
  77. }
  78. static public SecurityContextSecurityToken ConvertSessionTokenToSecurityContextSecurityToken(SessionSecurityToken token)
  79. {
  80. if (token == null)
  81. {
  82. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("token");
  83. }
  84. List<IAuthorizationPolicy> policies = new List<IAuthorizationPolicy>();
  85. if (token.SctAuthorizationPolicy != null)
  86. {
  87. policies.Add(token.SctAuthorizationPolicy);
  88. }
  89. if (token.ClaimsPrincipal != null && token.ClaimsPrincipal.Identities != null)
  90. {
  91. policies.Add(new AuthorizationPolicy(token.ClaimsPrincipal.Identities));
  92. }
  93. byte[] key = null;
  94. SymmetricSecurityKey symmetricKey = token.SecurityKeys[0] as SymmetricSecurityKey;
  95. if (symmetricKey != null)
  96. {
  97. key = symmetricKey.GetSymmetricKey();
  98. }
  99. SecurityContextSecurityToken sct = new SecurityContextSecurityToken(
  100. token.ContextId,
  101. token.Id,
  102. key,
  103. token.ValidFrom,
  104. token.ValidTo,
  105. token.KeyGeneration,
  106. token.KeyEffectiveTime,
  107. token.KeyExpirationTime,
  108. policies.AsReadOnly());
  109. return sct;
  110. }
  111. }
  112. }