Formated configuration files to make more readable. Update the README

and got rid of some un-necessary printfs.
This commit is contained in:
Juan Carlos Luciani 2006-06-01 14:58:41 +00:00
parent f2b9c95d89
commit af93081d2e
17 changed files with 93 additions and 92 deletions
auth_token/server/AuthTokenSvc
README
sampleConf
auth.policyauthtoken.settings
enabled_services/appserver.companyname.com/testService
iaRealms.xmlsvc.settings
src/com/novell/casa/authtoksvc

@ -64,7 +64,7 @@ Thhe following is an example svc.settings file:
<?xml version="1.0" encoding="ISO-8859-1"?>
<settings>
<SessionTokenLifetime>720</SessionTokenLifetime>
<SessionTokenLifetime>43200</SessionTokenLifetime>
<LifetimeShorter>10</LifetimeShorter>
<IAConfigFile>/home/jluciani/jakarta-tomcat-5.0.28/webapps/CasaAuthTokenSvc/WEB-INF/conf/iaRealms.xml</IAConfigFile>
<startSearchContext>o=novell</startSearchContext>
@ -77,7 +77,7 @@ Note the following about the sample svc.settings file:
- The SessionTokenLifetime setting specifies the number of seconds for which a
session token is good for after being issued. The default value for this setting
is 360 seconds. Note that a larger value reduces overhead.
is 43200 seconds. Note that a larger value reduces overhead.
- The LifetimeShorter setting specifies the number of seconds that should be substracted
from the SessionTokenLifetime when calculating the number of seconds that clients are
@ -165,7 +165,7 @@ The following is an example authtoken.settings file:
<?xml version="1.0" encoding="ISO-8859-1"?>
<settings>
<TokenLifetime>720</TokenLifetime>
<TokenLifetime>3600</TokenLifetime>
<LifetimeShorter>10</LifetimeShorter>
<IdentityTokenType>CasaIdentityToken</IdentityTokenType>
</settings>
@ -177,7 +177,7 @@ Note the following about the sample authtoken.settings file:
its default value is utilized.
- The TokenLifetime setting specifies the number of seconds for which a token is good
for after being issued. The default value for this setting is 360 seconds. Note that
for after being issued. The default value for this setting is 3600 seconds. Note that
a larger value reduces overhead, but it also gives more time for an intruder to
utilize the token if it becomes compromized.
@ -253,7 +253,7 @@ mechanism:
<settings>
<ClassName>com.novell.casa.authtoksvc.Krb5Authenticate</ClassName>
<RelativeClassPath>WEB-INF/classes</RelativeClassPath>
<ServicePrincipalName>host@tokenserver.company.novell.com</ServicePrincipalName>
<ServicePrincipalName>host@authtokenserver.company.com</ServicePrincipalName>
</settings>
The base AuthTokenSvc package contains two authentication mechanisms, these are

@ -3,7 +3,7 @@
<auth_source>
<realm>CorpTree</realm>
<mechanism>Krb5Authenticate</mechanism>
<mechanism_info>host@tokenserver.company.novell.com</mechanism_info>
<mechanism_info>host@authtokenserver.company.com</mechanism_info>
</auth_source>
<auth_source>
<realm>CorpTree</realm>

@ -1,4 +1,4 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<settings>
<TokenLifetime>720</TokenLifetime>
<TokenLifetime>3600</TokenLifetime>
</settings>

@ -1,4 +1,4 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<settings>
<TokenLifetime>720</TokenLifetime>
<TokenLifetime>3600</TokenLifetime>
</settings>

@ -1,21 +1,25 @@
<realms
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<realm
<bci:realms
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:bci="http://www.bandit-project.org/commonidentity"
xmlns:xacml="urn:oasis:names:tc:xacml:2.0:policy:schema:os"
xsi:schemaLocation="urn:oasis:names:tc:xacml:2.0:policy:schema:os:access_control-xacml-2.0-policy-schema-os.xsd">
<bci:realm
desc="My Corporate Directory"
connectorType="org.bandit.ia.connectors.LDAPConnectorInitialCtxFactory"
id="CorpTree">
<connection xsi:type="ldapConnector">
<address>ldap://dirserver.companyname.com:389</address>
<security>
<authentication>simple</authentication>
<principal>cn=admin,o=companyname</principal>
<credentials>password</credentials>
</security>
</connection>
</realm>
<realm desc="Realm Join Definition" id="E263CCC1-8F9D-4551-B786-068AA84E8564">
<connection xsi:type="joinConnector">
<realmID>CorpTree</realmID>
</connection>
</realm>
</realms>
id="jctree">
<bci:connection xsi:type="bci:LDAPConnector">
<bci:address>ldap://dirserver.companyname.com:389</bci:address>
<bci:security>
<bci:authentication>simple</bci:authentication>
<bci:principal>cn=admin,o=companyname</bci:principal>
<bci:credentials>password</bci:credentials>
</bci:security>
</bci:connection>
</bci:realm>
<bci:realm desc="Realm Join Definition" id="E263CCC1-8F9D-4551-B786-068AA84E8564">
<bci:connection xsi:type="bci:JoinConnector">
<bci:realmID>CorpTree</bci:realmID>
</bci:connection>
</bci:realm>
</bci:realms>

@ -1,5 +1,5 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<settings>
<IAConfigFile>/home/jluciani/jakarta-tomcat-5.0.28/webapps/CasaAuthTokenSvc/WEB-INF/conf/iaRealms.xml</IAConfigFile>
<startSearchContext>o=novell</startSearchContext>
<SessionTokenLifetime>43200</SessionTokenLifetime>
</settings>

@ -493,12 +493,9 @@ public class CasaIdentityToken implements IdentityToken
else
{
// The data is base64 encoded
System.err.println("CasaIdentityToken SAXHandler.characters()- encodedChars = " + length);
char[] encodedChars = new char[length];
System.arraycopy(ch, start, encodedChars, 0, length);
System.err.println("CasaIdentityToken SAXHandler.characters()- encodedChars copied to new array");
m_casaIdentToken.m_attributes.put(m_currAttribute, Base64Coder.decode(encodedChars));
System.err.println("CasaIdentityToken SAXHandler.characters()- encodedChars decoded");
}
// Advance to the next state