Jakarta Authentication (formerly JASPIC)

Table of Contents

Introduction

Tomcat implements Jakarta Authentication 3.0. The implementation is primarily intended to enable the integration of 3rd party authentication implementations with Tomcat.

Jakarta Authentication may be configured in one of two ways:

  • At the container level via the static configuration file $CATALINA_BASE/conf/jaspic-providers.xml. With this approach all required classes must be visible to Tomcat's Common class loader which normally means placing a JAR in $CATALINA_BASE/lib.
  • At the web application level via dynamic configuration using the Jakarta Authentication API. With this approach all required classes must be visible to the web application class loader which normally means placing a JAR in the web application's WEB-INF/lib directory.

Users should be aware that if the static Jakarta Authentication configuration file configures Jakarta Authentication for a given web application then the Jakarta Authentication configuration will take precedence over any <login-config> present in the web application's WEB-INF/web.xml file.

Static configuration

AuthConfigProvider

If the 3rd party implementation includes an AuthConfigProvider then a web application can be configured to use it by nesting the following inside the <jaspic-providers> element in $CATALINA_BASE/conf/jaspic-providers.xml.

<provider name="any"
          className="fully.qualified.implementation.class.Name"
          layer="HttpServlet"
          appContext="Catalina/localhost /contextPath"
          description="any">
  <property name="see-provider-documentation"
            value="see-provider-documentation" />
</provider>

The name and description attributes are not used by Tomcat.

The className attribute must be the fully qualified class name of the AuthConfigProvider. The implementation may be packaged with the web application or in Tomcat's $CATALINA_BASE/lib directory.

The layer attribute must be HttpServlet.

The appContext attribute must be exactly the concatenation of:

  • The engine name
  • The forward slash character
  • The host name
  • A single space
  • The context path

If the AuthConfigProvider supports configuration via properties these may be specified via <property> elements nesting inside the <provide> element.

ServerAuthModule

If the 3rd party implementation only provides an ServerAuthModule then it will be necessary to provide a number of supporting classes. These may be a custom implementation or, alternatively, Tomcat provides a simple wrapper implementation for ServerAuthModules.

Tomcat's wrapper for ServerAuthModule can be configured by nesting the following inside the <jaspic-providers> element in $CATALINA_BASE/conf/jaspic-providers.xml.

<provider name="any"
          className="org.apache.catalina.authenticator.jaspic.SimpleAuthConfigProvider"
          layer="HttpServlet"
          appContext="Catalina/localhost /contextPath"
          description="any">
  <property name="org.apache.catalina.authenticator.jaspic.ServerAuthModule.1"
            value="fully.qualified.implementation.class.Name" />
  <property name="see-provider-documentation"
            value="see-provider-documentation" />
</provider>

The configuration is similar to the AuthConfigProvider in the previous section but with some key differences.

The className attribute must be org.apache.catalina.authenticator.jaspic.SimpleAuthConfigProvider.

The ServerAuthModule(s) are specified via properties. The property name must be org.apache.catalina.authenticator.jaspic.ServerAuthModule.n where n is the index of the module. The index must start at 1 an increment in steps of 1 until all modules are defined. The value of the property must be the fully qualified class name of the module.

Dynamic configuration

Jakarta Authentication modules and configuration can be packaged within a WAR file with the web application. The web application can then register the required Jakarta Authentication configuration when it starts using the standard Jakarta Authentication APIs.

If parallel deployment is being used then dynamic configuration should not be used. The Jakarta Authentication API assumes that a context path is unique for any given host which is not the case when using parallel deployment. When using parallel deployment, static Jakarta Authentication configuration should be used. This will require that all versions of the application use the same Jakarta Authentication configuration.

3rd party modules

This is not an exhaustive list. The Tomcat community welcomes contributions that add to this section.

Philip Green II's module for Google OAuth 2

The source code for this module along with the documentation which includes details of the necessary Google API configuration is available on GitHub.

A sample configuration for using this module with Tomcat would look like this:

<jaspic-providers xmlns="https://tomcat.apache.org/xml"
                  xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
                  xsi:schemaLocation="https://tomcat.apache.org/xml jaspic-providers.xsd"
                  version="1.0">
  <provider name="google-oauth"
            className="org.apache.catalina.authenticator.jaspic.SimpleAuthConfigProvider"
            layer="HttpServlet"
            appContext="Catalina/localhost /contextPath"
            description="Google OAuth test">
    <property name="org.apache.catalina.authenticator.jaspic.ServerAuthModule.1"
              value="com.idmworks.security.google.GoogleOAuthServerAuthModule" />
    <property name="oauth.clientid"
              value="obtained-from-Google-console" />
    <property name="oauth.clientsecret"
              value="obtained-from-Google-console" />
    <property name="ignore_missing_login_context"
              value="true" />
  </provider>
</jaspic-providers>