Skip to content
Snippets Groups Projects
Commit b2306e36 authored by Olav Morken's avatar Olav Morken
Browse files

authorize:Authorize: Add deny & regex flags.

This patch adds two new features to the authorize:Authorize filter:

- Add flag to change the policy from default-deny to default-allow. This
  makes it possible to block specific users.
- Add a flag that changes the matching algorithm from regex matching to
  string matching, which simplifies matching with strings that contain
  special characters.

This patch also makes it simpler to subclass this filter.

Thanks to Ryan Panning for implementing this!

git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@2987 44740490-163a-0410-bde0-09ae8108e29a
parent c4a6c2c3
No related branches found
No related tags found
No related merge requests found
...@@ -8,31 +8,43 @@ authorize Module ...@@ -8,31 +8,43 @@ authorize Module
--> -->
* Version: `$Id$` * Version: `$Id$`
* Author: Ernesto Revilla <erny@yaco.es>, Yaco Sistemas * Author: Ernesto Revilla <erny@yaco.es>, Yaco Sistemas, Ryan Panning
* Package: simpleSAMLphp * Package: simpleSAMLphp
This module provides an user authorization filter based on regular expressions for those applications that do not cleanly separate authentication from authorization and set some default permissions for authenticated users. This module provides a user authorization filter based on attribute matching for those applications that do not cleanly separate authentication from authorization and set some default permissions for authenticated users.
`authorize:Authorize` `authorize:Authorize`
: Authorize certain users based on regular expressions. : Authorize certain users based on attribute matching
`authorize:Authorize` `authorize:Authorize`
--------------------- ---------------------
For each attribute you can specify a regular expression string or array of strings. If one of those attributes matches (OR operator) one of the regular expression, the user is authorized successfully. There are two configuration options that can be defined; deny and regex. All other filter configuration options are considered attribute matching rules.
You must use the preg_match format, i.e. you have to enclose it with a delimiter that does not appear inside the regex (e.g. slash (/), at sign (@), number sign (#) or underscore (`_`)).
The users not authorized will be shown a 403 Forbidden page. The users not authorized will be shown a 403 Forbidden page.
Problems: ### Deny ###
The default action of the filter is to authorize only if an attribute match is found (default allow). When set to TRUE, this option reverses that rule and authorizes the user unless an attribute match is found (default deny), causing an unauthorized action.
Note: This option needs to be boolean (TRUE/FALSE) else it will be considered an attribute matching rule.
### Regex ###
Turn regex pattern matching on or off for the attribute values defined. For backwards compatibility, this option defaults to TRUE, but can be turned off by setting it to FALSE.
Note: This option needs to be boolean (TRUE/FALSE) else it will be considered an attribute matching rule.
### Attribute Rules ###
Each additional filter configuration option is considered an attribute matching rule. For each attribute, you can specify a string or array of strings to match. If one of those attributes match one of the rules (OR operator), the user is authorized/unauthorized (depending on the deny config option).
Note: If regex is enabled, you must use the preg_match format, i.e. you have to enclose it with a delimiter that does not appear inside the regex (e.g. slash (/), at sign (@), number sign (#) or underscore (`_`)).
### Problems ###
* Once you get the forbidden page, you can't logout at the IdP directly, * Once you get the forbidden page, you can't logout at the IdP directly,
(as far as I know), you have to close the browser. (as far as I know), you have to close the browser.
### Examples ###
To use this filter configure it in `config/config.php`: To use this filter configure it in `config/config.php`:
'authproc.sp' => array( 'authproc.sp' => array(
...@@ -45,3 +57,28 @@ To use this filter configure it in `config/config.php`: ...@@ -45,3 +57,28 @@ To use this filter configure it in `config/config.php`:
'schacUserStatus' => '@urn:mace:terena.org:userStatus:' . 'schacUserStatus' => '@urn:mace:terena.org:userStatus:' .
'example.org:service:active.*@', 'example.org:service:active.*@',
) )
An alternate way of using this filter is to deny certain users. Or even use multiple filters to create a simple ACL, by first allowing a group of users but then denying a "black list" of users.
'authproc.sp' => array(
60 => array(
'class' => 'authorize:Authorize',
'deny' => TRUE,
'uid' => array(
'/.*@students.example.edu/',
'/(stu1|stu2|stu3)@example.edu/',
)
)
The regex pattern matching can be turned off, allowing for exact attribute matching rules. This can be helpful in cases where you know what the value should be. An example of this is with the memberOf attribute or using the ldap:AttributeAddUsersGroups filter with the group attribute.
'authproc.sp' => array(
60 => array(
'class' => 'authorize:Authorize',
'regex' => FALSE,
'group' => array(
'CN=SimpleSAML Students,CN=Users,DC=example,DC=edu',
'CN=All Teachers,OU=Staff,DC=example,DC=edu',
)
)
...@@ -4,18 +4,32 @@ ...@@ -4,18 +4,32 @@
* Filter to authorize only certain users. * Filter to authorize only certain users.
* See docs directory. * See docs directory.
* *
* @author Ernesto Revilla, Yaco Sistemas SL. * @author Ernesto Revilla, Yaco Sistemas SL., Ryan Panning
* @package simpleSAMLphp * @package simpleSAMLphp
* @version $Id$ * @version $Id$
*/ */
class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_ProcessingFilter { class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_ProcessingFilter {
/**
* Flag to deny/unauthorize the user a attribute filter IS found
*
* @var bool
*/
protected $deny = FALSE;
/**
* Flag to turn the REGEX pattern matching on or off
*
* @var bool
*/
protected $regex = TRUE;
/** /**
* Array of valid users. Each element is a regular expression. You should * Array of valid users. Each element is a regular expression. You should
* user \ to escape special chars, like '.' etc. * user \ to escape special chars, like '.' etc.
* *
*/ */
private $valid_attribute_values = array(); protected $valid_attribute_values = array();
/** /**
...@@ -30,6 +44,20 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing ...@@ -30,6 +44,20 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing
assert('is_array($config)'); assert('is_array($config)');
// Check for the deny option, get it and remove it
// Must be bool specifically, if not, it might be for a attrib filter below
if (isset($config['deny']) && is_bool($config['deny'])) {
$this->deny = $config['deny'];
unset($config['deny']);
}
// Check for the regex option, get it and remove it
// Must be bool specifically, if not, it might be for a attrib filter below
if (isset($config['regex']) && is_bool($config['regex'])) {
$this->regex = $config['regex'];
unset($config['regex']);
}
foreach ($config as $attribute => $values) { foreach ($config as $attribute => $values) {
if (is_string($values)) if (is_string($values))
$values = array($values); $values = array($values);
...@@ -51,7 +79,7 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing ...@@ -51,7 +79,7 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing
* @param array &$request The current request * @param array &$request The current request
*/ */
public function process(&$request) { public function process(&$request) {
$authorize = FALSE; $authorize = $this->deny;
assert('is_array($request)'); assert('is_array($request)');
assert('array_key_exists("Attributes", $request)'); assert('array_key_exists("Attributes", $request)');
...@@ -64,8 +92,13 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing ...@@ -64,8 +92,13 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing
if (!is_array($values)) if (!is_array($values))
$values = array($values); $values = array($values);
foreach ($values as $value){ foreach ($values as $value){
if(preg_match($pattern, $value)) { if ($this->regex) {
$authorize = TRUE; $matched = preg_match($pattern, $value);
} else {
$matched = ($value == $pattern);
}
if ($matched) {
$authorize = ($this->deny ? FALSE : TRUE);
break 3; break 3;
} }
} }
...@@ -73,14 +106,31 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing ...@@ -73,14 +106,31 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing
} }
} }
if (!$authorize){ if (!$authorize){
/* Save state and redirect to 403 page. */ $this->unauthorized($request);
$id = SimpleSAML_Auth_State::saveState($request,
'authorize:Authorize');
$url = SimpleSAML_Module::getModuleURL(
'authorize/authorize_403.php');
SimpleSAML_Utilities::redirect($url, array('StateId' => $id));
} }
} }
/**
* When the process logic determines that the user is not
* authorized for this service, then forward the user to
* an 403 unauthorized page.
*
* Separated this code into its own method so that child
* classes can override it and change the action. Forward
* thinking in case a "chained" ACL is needed, more complex
* permission logic.
*
* @param array $request
*/
protected function unauthorized(&$request) {
/* Save state and redirect to 403 page. */
$id = SimpleSAML_Auth_State::saveState($request,
'authorize:Authorize');
$url = SimpleSAML_Module::getModuleURL(
'authorize/authorize_403.php');
SimpleSAML_Utilities::redirect($url, array('StateId' => $id));
}
} }
?> ?>
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment