Code:
/ WCF / WCF / 3.5.30729.1 / untmp / Orcas / SP / ndp / cdf / src / WCF / TransactionBridge / Microsoft / Transactions / Wsat / Messaging / GlobalAclOperationRequirement.cs / 1 / GlobalAclOperationRequirement.cs
//------------------------------------------------------------------------------ // Copyright (c) Microsoft Corporation. All rights reserved. //----------------------------------------------------------------------------- // Enforce the global ACLs for Windows and X509 identities using System; using System.ServiceModel.Channels; using System.ServiceModel.Description; using System.Collections; using System.Collections.Generic; using System.Diagnostics; using System.Globalization; using System.IdentityModel.Claims; using System.IdentityModel.Policy; using System.Security.Principal; using System.ServiceModel; using Microsoft.Transactions.Wsat.Protocol; using DiagnosticUtility = Microsoft.Transactions.Bridge.DiagnosticUtility; namespace Microsoft.Transactions.Wsat.Messaging { class GlobalAclOperationRequirement : ServiceAuthorizationManager { Dictionarysids; Dictionary thumbprints; ProtocolVersion protocolVersion; public GlobalAclOperationRequirement(List windowsIdentities, List x509Thumbprints, ProtocolVersion protocolVersion) { BuildSidDictionary(windowsIdentities != null ? windowsIdentities : new List ()); BuildThumbprintDictionary(x509Thumbprints != null ? x509Thumbprints : new List ()); this.protocolVersion = protocolVersion; } protected override bool CheckAccessCore(OperationContext operationContext) { return AccessCheck(operationContext.ServiceSecurityContext.AuthorizationContext, operationContext.IncomingMessageProperties, operationContext.EndpointDispatcher.ChannelDispatcher.BindingName); } public bool AccessCheckReply(Message reply, string binding) { return AccessCheck(reply.Properties.Security.ServiceSecurityContext.AuthorizationContext, reply.Properties, binding); } bool AccessCheck(AuthorizationContext authzContext, MessageProperties messageProperties, string binding) { bool result = false; if (DebugTrace.Verbose) DebugTrace.Trace(TraceLevel.Verbose, "AccessCheck for binding {0}", binding); if (string.Compare(binding, BindingStrings.InteropBindingQName(this.protocolVersion), StringComparison.Ordinal) == 0) { result = AccessCheck(authzContext, messageProperties, ClaimTypes.Thumbprint, this.thumbprints); } else if (string.Compare(binding, BindingStrings.NamedPipeBindingQName, StringComparison.Ordinal) == 0 || string.Compare(binding, BindingStrings.WindowsBindingQName, StringComparison.Ordinal) == 0) { result = AccessCheck(authzContext, messageProperties, ClaimTypes.Sid, this.sids); } else { // Will not run against a binding that the WSAT protocol is unaware of. // This is assumed early on when the ServiceHost and endpoint // is setup for WS-AT. DiagnosticUtility.FailFast("Unknown binding " + binding); } TraceAccessCheckResult(result, messageProperties); return result; } bool AccessCheck(AuthorizationContext authzContext, MessageProperties messageProperties, string claimType, Dictionary dictionary) { if (authzContext != null) { foreach (ClaimSet claimSet in authzContext.ClaimSets) { IEnumerable claims = claimSet.FindClaims(claimType, Rights.PossessProperty); foreach (Claim claim in claims) { if (dictionary.ContainsKey(claim)) return true; } } } else { if (DebugTrace.Info) { DebugTrace.Trace(TraceLevel.Info, "No authzContext was passed into AccessCheck"); } } return false; } void TraceAccessCheckResult(bool result, MessageProperties messageProperties) { if (result) { if (DebugTrace.Info) { if (DebugTrace.Pii) { DebugTrace.TracePii(TraceLevel.Info, "Access granted to {0} by global ACL", CoordinationServiceSecurity.GetSenderName(messageProperties)); } else { DebugTrace.Trace(TraceLevel.Info, "Access granted by global ACL"); } } } else { if (DebugTrace.Warning) { if (DebugTrace.Pii) { DebugTrace.TracePii(TraceLevel.Warning, "Access denied to {0} by global ACL", CoordinationServiceSecurity.GetSenderName(messageProperties)); } else { DebugTrace.Trace(TraceLevel.Warning, "Access denied by global ACL"); } } } } void BuildSidDictionary(List windowsIdentities) { this.sids = new Dictionary (windowsIdentities.Count, Claim.DefaultComparer); foreach (string identity in windowsIdentities) { Exception failed = null; try { NTAccount account = new NTAccount(identity); SecurityIdentifier sid = (SecurityIdentifier)account.Translate(typeof(SecurityIdentifier)); Claim claim = Claim.CreateWindowsSidClaim(sid); if (!this.sids.ContainsKey(claim)) { this.sids.Add(claim, claim); } } catch (ArgumentException e) { DiagnosticUtility.ExceptionUtility.TraceHandledException(e, TraceEventType.Warning); failed = e; } catch (IdentityNotMappedException e) { DiagnosticUtility.ExceptionUtility.TraceHandledException(e, TraceEventType.Warning); failed = e; } catch(SystemException e) { DiagnosticUtility.ExceptionUtility.TraceHandledException(e, TraceEventType.Warning); failed = e; } if (failed != null && DebugTrace.Warning) { if (DebugTrace.Pii) { DebugTrace.Trace(TraceLevel.Warning, "Could not add account {0} to SID table: {1}", identity, failed.Message); } else { DebugTrace.Trace(TraceLevel.Warning, "Could not add account to SID table: {0}", failed.GetType().Name); } } } } void BuildThumbprintDictionary(List x509Thumbprints) { this.thumbprints = new Dictionary (x509Thumbprints.Count, Claim.DefaultComparer); foreach (string thumbprint in x509Thumbprints) { if (!string.IsNullOrEmpty(thumbprint)) { byte[] thumbprintBytes = DecodeThumbprint(thumbprint); if (thumbprintBytes == null) { DebugTrace.Trace(TraceLevel.Warning, "Could not decode thumbprint {0}", thumbprint); } else { Claim claim = Claim.CreateThumbprintClaim(thumbprintBytes); if (!this.thumbprints.ContainsKey(claim)) { this.thumbprints.Add(claim, claim); } } } } } // // The format of thumbprint is hex characters in a string // According to MSDN, X509Certificate2.Thumbprint is generated using SHA-1. // SHA-1 produces a 160-bit message digest. e.g. "697E8279D4E189CB774083C7C7AA22B6916418B5" // static byte[] DecodeThumbprint(string thumbprint) { const int ThumbprintSize = 40; if (string.IsNullOrEmpty(thumbprint) || thumbprint.Length != ThumbprintSize) { return null; } byte[] bytes = new byte[ThumbprintSize / 2]; for (int i = 0; i < bytes.Length; ++i) { if (!byte.TryParse(thumbprint.Substring(i * 2, 2), NumberStyles.HexNumber, CultureInfo.InvariantCulture, out bytes[i])) { return null; } } return bytes; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- FileDetails.cs
- TextModifierScope.cs
- ApplicationCommands.cs
- Drawing.cs
- ProcessInfo.cs
- InputLanguageEventArgs.cs
- QueryOptionExpression.cs
- ListViewContainer.cs
- WindowsFormsLinkLabel.cs
- Message.cs
- GorillaCodec.cs
- Preprocessor.cs
- DataSpaceManager.cs
- TreeViewEvent.cs
- FormViewInsertedEventArgs.cs
- ArraySortHelper.cs
- ParameterToken.cs
- ConnectionInterfaceCollection.cs
- VarInfo.cs
- XmlHierarchyData.cs
- TraceHandlerErrorFormatter.cs
- ListViewItemSelectionChangedEvent.cs
- StandardTransformFactory.cs
- GuidConverter.cs
- SoapWriter.cs
- StickyNoteHelper.cs
- HelpInfo.cs
- UIElementIsland.cs
- CommandID.cs
- WebScriptMetadataMessageEncodingBindingElement.cs
- TextParagraphView.cs
- ContractCodeDomInfo.cs
- EncoderFallback.cs
- CounterCreationDataCollection.cs
- GetReadStreamResult.cs
- MediaElement.cs
- TreeWalker.cs
- OutOfMemoryException.cs
- Mutex.cs
- CqlParser.cs
- safelink.cs
- HitTestFilterBehavior.cs
- GenericUI.cs
- MarkedHighlightComponent.cs
- MorphHelper.cs
- QuerySettings.cs
- Attachment.cs
- SymbolType.cs
- FontCollection.cs
- DefaultHttpHandler.cs
- _ListenerRequestStream.cs
- SafeNativeMethods.cs
- XmlSchemaSequence.cs
- TemplateControl.cs
- PageBreakRecord.cs
- EncryptedKeyHashIdentifierClause.cs
- ProcessingInstructionAction.cs
- SectionRecord.cs
- CompiledIdentityConstraint.cs
- XmlSchemaAttributeGroup.cs
- ToolbarAUtomationPeer.cs
- DataGridViewToolTip.cs
- SafeIUnknown.cs
- RangeValuePatternIdentifiers.cs
- TextBoxDesigner.cs
- EventLogEntryCollection.cs
- CalendarDayButton.cs
- securitycriticaldata.cs
- SecurityTokenReferenceStyle.cs
- SqlDataSourceCache.cs
- FrameworkContextData.cs
- EngineSite.cs
- ProxySimple.cs
- BuildProviderCollection.cs
- HostProtectionException.cs
- PrimitiveSchema.cs
- MetadataItemEmitter.cs
- XPathDocument.cs
- XamlValidatingReader.cs
- ScrollProperties.cs
- Bidi.cs
- SiteMapNode.cs
- AccessedThroughPropertyAttribute.cs
- SiteMapHierarchicalDataSourceView.cs
- FunctionDescription.cs
- OleDbParameter.cs
- EntityConnection.cs
- PanelDesigner.cs
- XomlCompilerError.cs
- MaskedTextProvider.cs
- ActivityMarkupSerializer.cs
- ListBase.cs
- DataSourceControlBuilder.cs
- WriteFileContext.cs
- AnimationLayer.cs
- XamlTypeMapper.cs
- FormatException.cs
- XmlCodeExporter.cs
- UserPreferenceChangedEventArgs.cs
- Compiler.cs