aspose file tools*
The moose likes Web Component Certification (SCWCD/OCPJWCD) and the fly likes Webapp-Security chapter revision notes from HFSJ , may be useful Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login
JavaRanch » Java Forums » Certification » Web Component Certification (SCWCD/OCPJWCD)
Bookmark "Webapp-Security chapter revision notes from HFSJ , may be useful " Watch "Webapp-Security chapter revision notes from HFSJ , may be useful " New topic
Author

Webapp-Security chapter revision notes from HFSJ , may be useful

Vishal Chugh
Ranch Hand

Joined: Oct 27, 2007
Posts: 177
Chapter : 9 : Security in webapps.

1) We are concerened about four things in terms of security :
a) Authentication
b) Authorization
c) Data integrity
d) Confidentiality

2) We will discuss below tags for security :
a) For authentication we use : (Remeber word login for this .)

When we use any of these in our DD , client will be sent login screen to enter their username and password except in FORM way , where customised login and error forms are used writen by us.

During the authentication , the username and password is matched with the enteries in tomcat-users.xml present under web-app/config directory or enteries may be in some other table used for this or enteries may be in LDAP system.

But we are interrested in way the tomcat-users.xml is written , the format of it:

Fron tomcat-users.xml : This will be used while authenticating .
<tomcat-users> [ role and user two main elements]
<role rolename = “Admin” />
<role rolename = “Guest” />
<role rolename= “Member” />
<user username=”vishal” password=”code” roles=”Admin, Member, Guest” />
<user username=”Mohit” password=”decode” roles=”Admin,Member”/>
<user username=”Anuj” password=”victory” roles=”Guest” />

</tomcat-users>


From web.xml:
Under <web-app>
<web-app>
<login-config>
<auth-method>BASIC</auth-method> [ uses Encoding , weak , HTTP supported]
</login-config>
</web-app>

<web-app>

<login-config>
<auth-method>DIGEST</auth-method> [ uses Encryption , strong , HTTP supported , all container do not support it , less used]
</login-config>
</web-app>

<web-app>
<login-config>
<auth-method>CLIENT_CERT</auth-method> [Strong , clients must have PKC, J2EE supported]
</login-config>
</web-app>

<web-app>
<login-config>
<auth-method>FORM</auth-method> [Very weak , no encryption , J2EE supported]
<form-login-config>
<form-login-page>/loginPage.html</form-login-page>
<form-error-page>/loginError.html</form-error-page>
</form-login-config>
</login-config>
</web-app>

Here I wanna practice like how to write customized login and error page as below:

1)loginPage.html :

<form method=”POST” action=”j_security_check”>
<input type=”text” name=”j_username” />
<input type=”password” name=”j_password” />
<input type=”submit” value=”Enter” />
</form>

2)errorPage.html :

<html> <body>
Sorry dude, wrong password.
</body> </html>


b)For authorization and data integrity we use :
Authrization is for maintaining access to the constarined resources by using constrained methods by constarined roles.
( For this remmeber the word “security” of web-app , under it we take care of )

 <security-constraint> will come directly under <web-app> directly
 Very Important : We can have >1 security constraint in DD

For authorization : <security-role > element must also be there in DD as below which will do mapping between the roles in realm to roles in DD. Its declared as below :

<security-role>
<role-name>Admin</role-name> [ see here (and in <auth-consta we have role-name and in realm we had rolename]
<role-name>Member</role-name>
<role-name>Guest</role-name>
</security-role>


<security-constraint>
<web-resource-collection>
<web-resource-name>UpdateRecipes </web-resource-name> [Mandatory]
<url-pattern>/Beer/UpdateRecipes/*</url-pattern>
<url-pattern>/Beer/AddRecipes/*</</url-pattern>

<http-method>GET/POST/PUT/*</http-method>
</web-resource-collection>

<auth-constarint >
< role-name>ADMIN/MEMBER/GUEST/*< /role-name>
</auth-constarint >

<user-data-constarint>
<transport-guarantee>NONE/INTEGRAL/CONFIDENTIAL</transport-guarantee>
</user-data-constarint>

</security-constraint>


While using <security-constraint> , in this element , using <http-method> and <auth-constraint> is optional and some hard rules as below , and I have digested them  as below:

 If there is no <http-method> element used , then No HTTP methods are allowed by any user.
 If there is method specified , then that specified method is constarined and that method can be invoked by roles authorised by <auth-constraint> to access the constrained resourse , the methods not specified are not constrained and can be invoked by any role.
If there is no <auth-constraint> element , that means all roles are allowed to make access.
If there is empty <auth-constarint> element , that means all roles are constarined , no role can access constrained resource using constrained method.
If roles are specified then only those roles will be able to access the constrained resource using the constarined method.

 If the resource requested is constarined then only container bothers for authentication and achieve this by sending status code: 401 , www-authenticate header with realm info.After this browser makes another request sending the username and password with a security HTTP header and now the container matches the username and password , if they match , then it asks for authorization that is it checks if the user is assigned to role and that role has access to constrained resource , if it succeeds then access is granted to constrained resource.

Servlet developer – writes servlet
Application admin – decides and writes roles in tomcat-users.xml
Deployer – which servlets should be protected and which roles will have access to them

Programeatic security :

if (request.isUserInRole(“Manager”) )
{ }

[Our company uses Admin instead of Manager , but we don’t want to change the every occuranve of this as then we have to recompile the whole servlet code which we don’t want.]
If the developer uses above programatic security, he has to use <security-role-ref> also to map his hardcoded roles to existing roles in <security-role> element as below.PLEASE NOTE THAT THIS <security-role-ref> is under <servlet> element .Yes the servlet code in which this programatic security is used up.

<web-app> [Manpping from Manager to Admin]
<servlet>
<security-role-ref>
<role-link>Manager</role-link>
<role-name>Admin</role-name>
</security-role-ref>
</servlet>

<security-role>
<role-name>Admin</role-name>
<role-name>Member</role-name>
<role-name>Guest</role-name>
</security-role>
</web-app>

when we tell the container that we want to implement the data int. and confidentiality , we use <user-data-constraint> element in the DD , then J2EE guarantees that data will travel over the “protected transport layer “ . Protocol used will be changed from http to https over SSL (Secure Sockets ) layer.
In this case , if the container recieves the request for constarined resource and if for this resource the <transport-gurantee> element is present then container responds with 301 status code and sends the Location header in response , then browser makes request again for the same resource but now over a secure connection using the protocol https ,
Now when the container sees that the request for constrained resource , it send the 401 status code and ask for authentication (yes broweser have to request for third time ), then client sends the username and password then it does authentication and authorization . Please note here username and password are traveling securely.
Reember https occurs over SSL always.
 
I agree. Here's the link: http://aspose.com/file-tools
 
subject: Webapp-Security chapter revision notes from HFSJ , may be useful