Passing the DN of client's certificate to the deployed app in Tomcat












0














I configured Tomcat to require mutual authentication over TLS by setting clientAuth="true" in conf/server.xml file:



<Connector 
port="8443"
protocol="org.apache.coyote.http11.Http11NioProtocol"
maxThreads="150"
SSLEnabled="true"
scheme="https"
secure="true"
keystoreFile="conf/server.p12"
keystorePass="1t3TcUQY*2j^"
truststoreFile="conf/cacerts"
truststorePass="fx!eAKQO2^0c"
clientAuth="true"
sslProtocol="TLS"
sslEnabledProtocols="TLSv1.2">
</Connector>


Everything is good, and Tomcat only accepts clients with valid certificates.



The problem is that the web app deployed in Tomcat has no idea of the identity of the client. By identity, I mean the subject info, such as its distinguished name (DN), that appears in the client's certificate. Therefore, the web app cannot make access control decisions based on the identity of the client.



Is there a way for Tomcat to pass this information to the deployed we app upon successful authentication?










share|improve this question



























    0














    I configured Tomcat to require mutual authentication over TLS by setting clientAuth="true" in conf/server.xml file:



    <Connector 
    port="8443"
    protocol="org.apache.coyote.http11.Http11NioProtocol"
    maxThreads="150"
    SSLEnabled="true"
    scheme="https"
    secure="true"
    keystoreFile="conf/server.p12"
    keystorePass="1t3TcUQY*2j^"
    truststoreFile="conf/cacerts"
    truststorePass="fx!eAKQO2^0c"
    clientAuth="true"
    sslProtocol="TLS"
    sslEnabledProtocols="TLSv1.2">
    </Connector>


    Everything is good, and Tomcat only accepts clients with valid certificates.



    The problem is that the web app deployed in Tomcat has no idea of the identity of the client. By identity, I mean the subject info, such as its distinguished name (DN), that appears in the client's certificate. Therefore, the web app cannot make access control decisions based on the identity of the client.



    Is there a way for Tomcat to pass this information to the deployed we app upon successful authentication?










    share|improve this question

























      0












      0








      0







      I configured Tomcat to require mutual authentication over TLS by setting clientAuth="true" in conf/server.xml file:



      <Connector 
      port="8443"
      protocol="org.apache.coyote.http11.Http11NioProtocol"
      maxThreads="150"
      SSLEnabled="true"
      scheme="https"
      secure="true"
      keystoreFile="conf/server.p12"
      keystorePass="1t3TcUQY*2j^"
      truststoreFile="conf/cacerts"
      truststorePass="fx!eAKQO2^0c"
      clientAuth="true"
      sslProtocol="TLS"
      sslEnabledProtocols="TLSv1.2">
      </Connector>


      Everything is good, and Tomcat only accepts clients with valid certificates.



      The problem is that the web app deployed in Tomcat has no idea of the identity of the client. By identity, I mean the subject info, such as its distinguished name (DN), that appears in the client's certificate. Therefore, the web app cannot make access control decisions based on the identity of the client.



      Is there a way for Tomcat to pass this information to the deployed we app upon successful authentication?










      share|improve this question













      I configured Tomcat to require mutual authentication over TLS by setting clientAuth="true" in conf/server.xml file:



      <Connector 
      port="8443"
      protocol="org.apache.coyote.http11.Http11NioProtocol"
      maxThreads="150"
      SSLEnabled="true"
      scheme="https"
      secure="true"
      keystoreFile="conf/server.p12"
      keystorePass="1t3TcUQY*2j^"
      truststoreFile="conf/cacerts"
      truststorePass="fx!eAKQO2^0c"
      clientAuth="true"
      sslProtocol="TLS"
      sslEnabledProtocols="TLSv1.2">
      </Connector>


      Everything is good, and Tomcat only accepts clients with valid certificates.



      The problem is that the web app deployed in Tomcat has no idea of the identity of the client. By identity, I mean the subject info, such as its distinguished name (DN), that appears in the client's certificate. Therefore, the web app cannot make access control decisions based on the identity of the client.



      Is there a way for Tomcat to pass this information to the deployed we app upon successful authentication?







      security tomcat tls1.2 access-control client-certificates






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Nov 16 at 6:22









      M.S. Dousti

      1,40942237




      1,40942237
























          1 Answer
          1






          active

          oldest

          votes


















          1





          +100










          1. Client certificates are accessible as request.getAttribute("javax.servlet.request.X509Certificate") as an array of certificates. Read the Servlet Specification for the official reference. In Servlet 4.0 specification that is Chapter 3.10 SSL Attributes.



          2. If your application is configured with login-config/auth-method of CLIENT-CERT then an Authenticator in Tomcat will perform authentication of client certificate. The actual processing is delegated to a Realm.



            If the authentication is successful, a user name is extracted from the certificate and a java.security.Principal is created. Extraction of the user name is configurable with attribute X509UsernameRetrieverClassName of the Realm. See Realm configuration reference.



            (For reference, in Tomcat 9: org.apache.catalina.authenticator.SSLAuthenticator.doAuthenticate(), org.apache.catalina.realm.RealmBase.authenticate(X509Certificate))








          share|improve this answer





















            Your Answer






            StackExchange.ifUsing("editor", function () {
            StackExchange.using("externalEditor", function () {
            StackExchange.using("snippets", function () {
            StackExchange.snippets.init();
            });
            });
            }, "code-snippets");

            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "1"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53332497%2fpassing-the-dn-of-clients-certificate-to-the-deployed-app-in-tomcat%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            1





            +100










            1. Client certificates are accessible as request.getAttribute("javax.servlet.request.X509Certificate") as an array of certificates. Read the Servlet Specification for the official reference. In Servlet 4.0 specification that is Chapter 3.10 SSL Attributes.



            2. If your application is configured with login-config/auth-method of CLIENT-CERT then an Authenticator in Tomcat will perform authentication of client certificate. The actual processing is delegated to a Realm.



              If the authentication is successful, a user name is extracted from the certificate and a java.security.Principal is created. Extraction of the user name is configurable with attribute X509UsernameRetrieverClassName of the Realm. See Realm configuration reference.



              (For reference, in Tomcat 9: org.apache.catalina.authenticator.SSLAuthenticator.doAuthenticate(), org.apache.catalina.realm.RealmBase.authenticate(X509Certificate))








            share|improve this answer


























              1





              +100










              1. Client certificates are accessible as request.getAttribute("javax.servlet.request.X509Certificate") as an array of certificates. Read the Servlet Specification for the official reference. In Servlet 4.0 specification that is Chapter 3.10 SSL Attributes.



              2. If your application is configured with login-config/auth-method of CLIENT-CERT then an Authenticator in Tomcat will perform authentication of client certificate. The actual processing is delegated to a Realm.



                If the authentication is successful, a user name is extracted from the certificate and a java.security.Principal is created. Extraction of the user name is configurable with attribute X509UsernameRetrieverClassName of the Realm. See Realm configuration reference.



                (For reference, in Tomcat 9: org.apache.catalina.authenticator.SSLAuthenticator.doAuthenticate(), org.apache.catalina.realm.RealmBase.authenticate(X509Certificate))








              share|improve this answer
























                1





                +100







                1





                +100



                1




                +100





                1. Client certificates are accessible as request.getAttribute("javax.servlet.request.X509Certificate") as an array of certificates. Read the Servlet Specification for the official reference. In Servlet 4.0 specification that is Chapter 3.10 SSL Attributes.



                2. If your application is configured with login-config/auth-method of CLIENT-CERT then an Authenticator in Tomcat will perform authentication of client certificate. The actual processing is delegated to a Realm.



                  If the authentication is successful, a user name is extracted from the certificate and a java.security.Principal is created. Extraction of the user name is configurable with attribute X509UsernameRetrieverClassName of the Realm. See Realm configuration reference.



                  (For reference, in Tomcat 9: org.apache.catalina.authenticator.SSLAuthenticator.doAuthenticate(), org.apache.catalina.realm.RealmBase.authenticate(X509Certificate))








                share|improve this answer













                1. Client certificates are accessible as request.getAttribute("javax.servlet.request.X509Certificate") as an array of certificates. Read the Servlet Specification for the official reference. In Servlet 4.0 specification that is Chapter 3.10 SSL Attributes.



                2. If your application is configured with login-config/auth-method of CLIENT-CERT then an Authenticator in Tomcat will perform authentication of client certificate. The actual processing is delegated to a Realm.



                  If the authentication is successful, a user name is extracted from the certificate and a java.security.Principal is created. Extraction of the user name is configurable with attribute X509UsernameRetrieverClassName of the Realm. See Realm configuration reference.



                  (For reference, in Tomcat 9: org.apache.catalina.authenticator.SSLAuthenticator.doAuthenticate(), org.apache.catalina.realm.RealmBase.authenticate(X509Certificate))









                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Nov 19 at 9:51









                Konstantin Kolinko

                2,135514




                2,135514






























                    draft saved

                    draft discarded




















































                    Thanks for contributing an answer to Stack Overflow!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.





                    Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                    Please pay close attention to the following guidance:


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53332497%2fpassing-the-dn-of-clients-certificate-to-the-deployed-app-in-tomcat%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Biblatex bibliography style without URLs when DOI exists (in Overleaf with Zotero bibliography)

                    ComboBox Display Member on multiple fields

                    Is it possible to collect Nectar points via Trainline?