Code:
/ WCF / WCF / 3.5.30729.1 / untmp / Orcas / SP / ndp / cdf / src / WCF / TransactionBridge / Microsoft / Transactions / Wsat / Messaging / GlobalAclOperationRequirement.cs / 1 / GlobalAclOperationRequirement.cs
//------------------------------------------------------------------------------ // Copyright (c) Microsoft Corporation. All rights reserved. //----------------------------------------------------------------------------- // Enforce the global ACLs for Windows and X509 identities using System; using System.ServiceModel.Channels; using System.ServiceModel.Description; using System.Collections; using System.Collections.Generic; using System.Diagnostics; using System.Globalization; using System.IdentityModel.Claims; using System.IdentityModel.Policy; using System.Security.Principal; using System.ServiceModel; using Microsoft.Transactions.Wsat.Protocol; using DiagnosticUtility = Microsoft.Transactions.Bridge.DiagnosticUtility; namespace Microsoft.Transactions.Wsat.Messaging { class GlobalAclOperationRequirement : ServiceAuthorizationManager { Dictionarysids; Dictionary thumbprints; ProtocolVersion protocolVersion; public GlobalAclOperationRequirement(List windowsIdentities, List x509Thumbprints, ProtocolVersion protocolVersion) { BuildSidDictionary(windowsIdentities != null ? windowsIdentities : new List ()); BuildThumbprintDictionary(x509Thumbprints != null ? x509Thumbprints : new List ()); this.protocolVersion = protocolVersion; } protected override bool CheckAccessCore(OperationContext operationContext) { return AccessCheck(operationContext.ServiceSecurityContext.AuthorizationContext, operationContext.IncomingMessageProperties, operationContext.EndpointDispatcher.ChannelDispatcher.BindingName); } public bool AccessCheckReply(Message reply, string binding) { return AccessCheck(reply.Properties.Security.ServiceSecurityContext.AuthorizationContext, reply.Properties, binding); } bool AccessCheck(AuthorizationContext authzContext, MessageProperties messageProperties, string binding) { bool result = false; if (DebugTrace.Verbose) DebugTrace.Trace(TraceLevel.Verbose, "AccessCheck for binding {0}", binding); if (string.Compare(binding, BindingStrings.InteropBindingQName(this.protocolVersion), StringComparison.Ordinal) == 0) { result = AccessCheck(authzContext, messageProperties, ClaimTypes.Thumbprint, this.thumbprints); } else if (string.Compare(binding, BindingStrings.NamedPipeBindingQName, StringComparison.Ordinal) == 0 || string.Compare(binding, BindingStrings.WindowsBindingQName, StringComparison.Ordinal) == 0) { result = AccessCheck(authzContext, messageProperties, ClaimTypes.Sid, this.sids); } else { // Will not run against a binding that the WSAT protocol is unaware of. // This is assumed early on when the ServiceHost and endpoint // is setup for WS-AT. DiagnosticUtility.FailFast("Unknown binding " + binding); } TraceAccessCheckResult(result, messageProperties); return result; } bool AccessCheck(AuthorizationContext authzContext, MessageProperties messageProperties, string claimType, Dictionary dictionary) { if (authzContext != null) { foreach (ClaimSet claimSet in authzContext.ClaimSets) { IEnumerable claims = claimSet.FindClaims(claimType, Rights.PossessProperty); foreach (Claim claim in claims) { if (dictionary.ContainsKey(claim)) return true; } } } else { if (DebugTrace.Info) { DebugTrace.Trace(TraceLevel.Info, "No authzContext was passed into AccessCheck"); } } return false; } void TraceAccessCheckResult(bool result, MessageProperties messageProperties) { if (result) { if (DebugTrace.Info) { if (DebugTrace.Pii) { DebugTrace.TracePii(TraceLevel.Info, "Access granted to {0} by global ACL", CoordinationServiceSecurity.GetSenderName(messageProperties)); } else { DebugTrace.Trace(TraceLevel.Info, "Access granted by global ACL"); } } } else { if (DebugTrace.Warning) { if (DebugTrace.Pii) { DebugTrace.TracePii(TraceLevel.Warning, "Access denied to {0} by global ACL", CoordinationServiceSecurity.GetSenderName(messageProperties)); } else { DebugTrace.Trace(TraceLevel.Warning, "Access denied by global ACL"); } } } } void BuildSidDictionary(List windowsIdentities) { this.sids = new Dictionary (windowsIdentities.Count, Claim.DefaultComparer); foreach (string identity in windowsIdentities) { Exception failed = null; try { NTAccount account = new NTAccount(identity); SecurityIdentifier sid = (SecurityIdentifier)account.Translate(typeof(SecurityIdentifier)); Claim claim = Claim.CreateWindowsSidClaim(sid); if (!this.sids.ContainsKey(claim)) { this.sids.Add(claim, claim); } } catch (ArgumentException e) { DiagnosticUtility.ExceptionUtility.TraceHandledException(e, TraceEventType.Warning); failed = e; } catch (IdentityNotMappedException e) { DiagnosticUtility.ExceptionUtility.TraceHandledException(e, TraceEventType.Warning); failed = e; } catch(SystemException e) { DiagnosticUtility.ExceptionUtility.TraceHandledException(e, TraceEventType.Warning); failed = e; } if (failed != null && DebugTrace.Warning) { if (DebugTrace.Pii) { DebugTrace.Trace(TraceLevel.Warning, "Could not add account {0} to SID table: {1}", identity, failed.Message); } else { DebugTrace.Trace(TraceLevel.Warning, "Could not add account to SID table: {0}", failed.GetType().Name); } } } } void BuildThumbprintDictionary(List x509Thumbprints) { this.thumbprints = new Dictionary (x509Thumbprints.Count, Claim.DefaultComparer); foreach (string thumbprint in x509Thumbprints) { if (!string.IsNullOrEmpty(thumbprint)) { byte[] thumbprintBytes = DecodeThumbprint(thumbprint); if (thumbprintBytes == null) { DebugTrace.Trace(TraceLevel.Warning, "Could not decode thumbprint {0}", thumbprint); } else { Claim claim = Claim.CreateThumbprintClaim(thumbprintBytes); if (!this.thumbprints.ContainsKey(claim)) { this.thumbprints.Add(claim, claim); } } } } } // // The format of thumbprint is hex characters in a string // According to MSDN, X509Certificate2.Thumbprint is generated using SHA-1. // SHA-1 produces a 160-bit message digest. e.g. "697E8279D4E189CB774083C7C7AA22B6916418B5" // static byte[] DecodeThumbprint(string thumbprint) { const int ThumbprintSize = 40; if (string.IsNullOrEmpty(thumbprint) || thumbprint.Length != ThumbprintSize) { return null; } byte[] bytes = new byte[ThumbprintSize / 2]; for (int i = 0; i < bytes.Length; ++i) { if (!byte.TryParse(thumbprint.Substring(i * 2, 2), NumberStyles.HexNumber, CultureInfo.InvariantCulture, out bytes[i])) { return null; } } return bytes; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- AlternateView.cs
- EnumBuilder.cs
- ActiveXSite.cs
- DataSetUtil.cs
- XmlSchemaValidationException.cs
- PartBasedPackageProperties.cs
- DataService.cs
- InputReportEventArgs.cs
- ProfessionalColors.cs
- mda.cs
- TextTreeDeleteContentUndoUnit.cs
- SessionStateItemCollection.cs
- XamlClipboardData.cs
- CustomError.cs
- WeakReference.cs
- SafeHGlobalHandleCritical.cs
- DataTableClearEvent.cs
- InteropTrackingRecord.cs
- Comparer.cs
- PassportAuthentication.cs
- RegexBoyerMoore.cs
- ClientTargetSection.cs
- CreateUserWizard.cs
- BitmapScalingModeValidation.cs
- WebPartCatalogCloseVerb.cs
- MetadataHelper.cs
- XsltConvert.cs
- ContextMenu.cs
- RecordManager.cs
- SafeCoTaskMem.cs
- FilteredXmlReader.cs
- XamlStackWriter.cs
- MediaElementAutomationPeer.cs
- ErrorHandler.cs
- InkCollectionBehavior.cs
- Invariant.cs
- MenuItem.cs
- ManagementOptions.cs
- TimeSpanConverter.cs
- DbCommandDefinition.cs
- TrackingProfileCache.cs
- NetworkInterface.cs
- ProfilePropertyMetadata.cs
- DecoderNLS.cs
- AppDomainAttributes.cs
- LineMetrics.cs
- MembershipPasswordException.cs
- ScriptingWebServicesSectionGroup.cs
- Queue.cs
- SortAction.cs
- StandardCommands.cs
- ListViewItem.cs
- KeyValuePairs.cs
- ArithmeticException.cs
- InstanceDescriptor.cs
- __TransparentProxy.cs
- ButtonBase.cs
- CustomSignedXml.cs
- RuntimeEnvironment.cs
- UIElementAutomationPeer.cs
- RegexReplacement.cs
- CodePageUtils.cs
- HandleRef.cs
- TextMetrics.cs
- AppDomainUnloadedException.cs
- ToolStripScrollButton.cs
- DataBindingCollectionEditor.cs
- SecurityPolicySection.cs
- HotSpotCollection.cs
- DefaultTextStoreTextComposition.cs
- XamlWriter.cs
- DbProviderFactory.cs
- HwndMouseInputProvider.cs
- InstalledFontCollection.cs
- CompatibleComparer.cs
- _NegoState.cs
- CellIdBoolean.cs
- UnsafeNativeMethods.cs
- WebUtil.cs
- EdmToObjectNamespaceMap.cs
- UnauthorizedWebPart.cs
- ExtendedPropertiesHandler.cs
- Message.cs
- ItemsControl.cs
- TraceData.cs
- ClientTargetCollection.cs
- BitmapEffect.cs
- PreservationFileReader.cs
- InvalidComObjectException.cs
- SchemaEntity.cs
- xmlformatgeneratorstatics.cs
- HttpValueCollection.cs
- CodeGotoStatement.cs
- MediaContext.cs
- Int64.cs
- SendContent.cs
- DiffuseMaterial.cs
- DataControlLinkButton.cs
- TextOptionsInternal.cs
- DbMetaDataFactory.cs