During the authentication process the principal transformers and principal decoders form a very similar function in that they are both used to map principals from one form to another, principal transformers can also be used to validate a principal as an example double check the formatting so authentication can be terminated early if an invalid principal is detected.
At the appropriate state in the process that is being described in this blog post the realm mappers will then operate on the mapped principal to identify which security realm should be used to load the identity.
Here are a couple of diagrams to illustrate how these concepts fit together, the remainder of this blog post will describe the steps in more detail.
The first diagram illustrates the general states the authentication process undergoes to map the Principal used for authentication.
|Identity Assignment States|
Resolve Mechanism ConfigurationWhen the authentication processes commences for a single authentication mechanism the first step is to resolve the MechanismConfiguration that should be used, this is resolved by taking into account the name of the selected mechanism, the host name, and the protocol.
During this stage the mechanism realm configuration will also be resolved, the authentication mechanism will either request this by name or if the mechanism does not request this then the first one in the list is used.
Note: The mechanism realm is specifically in relation to the realm name negotiated by the authentication mechanism if applicable and is independent of the security realm representing the identity store.
Pre Realm MappingThe purpose of this state is to take the Principal from the form that was provided by the authentication mechanism and map it to the form that can be used to identify which security realm to use to load the identity.
At the very end of the authentication process the identity is represented by a SecurityIdentity which contains a single Principal, the Principal will be the one created by this mapping stage.
The principal transformers and principal decoder will be called in the following order: -
1. Mechanism Realm - pre-realm principal-transformer
2. Mechanism Configuration - pre-realm principal transformer
3. Security Domain - principal-decoder
4. Security Domain - pre-realm-principal-transformer
If the end result is a null principal and error will be reported and authentication will terminate.
Realm MappingThe next stage is to take the mapping principal and map it to a realm name to identify the name of the Security Realm to use to load the identity.
Note: At this stage the realm name is the name of the SecurityRealm as referenced by the SecurityDomain and is not the mechanism realm name.
The configuration will be inspected for the first realm mapper that can be found in the following locations: -
A. Mechanism Realm - realm-mapper
B. Mechanism Configuration - realm-mapper
C. Security Domain - realm-mapper
If a RealmMapper is identified but that mapper returns null when mapping the Principal then the default-realm specified on the Security Domain will be used instead.
If no RealmMapper is available then the default-realm on the SecurityDomain will be used.
Post Realm MappingAfter the realm has been identified a further round of principal transformation happens, this time the following transformers are called: -
5. Mechanism Realm - post-realm principal-transformer
6. Mechanism Configuration - post-realm principal-transformer
7. Security Domain - post-realm principal-transformer
As before if the result is a null principal an error will be reported and authentication will be terminated.
Final Principal TransformationAfter the post realm mapping stage one final round of principal transforming takes place, this time the following transformers are called in order.
8. Mechanism Realm - final principal-transformer
9. Mechanism Configuration - final principal-transformer
10. Realm Mapping - principal-transformer
Once again a null principal will result in an error being reported and authentication being terminated.
Having to transformations after the realm has been identified allows for mechanism specific transformations to be applied both before and after domain specific transformations, if this is not required then either the post-realm principal transformers or the final principal-transformers can be used to obtain the same result.
The EndIt is only now at the very end of principal transformation that the security realm previously identified will be call to obtain the RealmIdentity that is now used for authentication to continue.
The key points to keep in mind are: -
- The Principal created by the pre-realm-principal-transformers is: -
- The Principal used to map the SecurityRealm
- The Principal that will be associated with the resulting SecurityIdentity.
- The Principal created after the final principal transformers is: -
- The Principal that will be passed to the SecurityRealm to obtain the RealmIdentity.