Java Code Examples for org.keycloak.authentication.AuthenticationFlowContext#forceChallenge()
The following examples show how to use
org.keycloak.authentication.AuthenticationFlowContext#forceChallenge() .
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source File: DynamicIdpRedirectAuthenticator.java From keycloak-extension-playground with Apache License 2.0 | 6 votes |
protected void redirect(AuthenticationFlowContext context, String providerId) { IdentityProviderModel identityProviderModel = selectIdp(context, providerId); if (identityProviderModel == null || !identityProviderModel.isEnabled()) { log.warnf("Provider not found or not enabled for realm %s", providerId); context.attempted(); return; } String accessCode = new ClientSessionCode<>(context.getSession(), context.getRealm(), context.getAuthenticationSession()).getOrGenerateCode(); String clientId = context.getAuthenticationSession().getClient().getClientId(); String tabId = context.getAuthenticationSession().getTabId(); URI location = Urls.identityProviderAuthnRequest(context.getUriInfo().getBaseUri(), providerId, context.getRealm().getName(), accessCode, clientId, tabId); if (context.getAuthenticationSession().getClientNote(OAuth2Constants.DISPLAY) != null) { location = UriBuilder.fromUri(location).queryParam(OAuth2Constants.DISPLAY, context.getAuthenticationSession().getClientNote(OAuth2Constants.DISPLAY)).build(); } log.debugf("Redirecting to %s", providerId); Response response = Response.seeOther(location).build(); context.forceChallenge(response); }
Example 2
Source File: IdentityProviderAuthenticator.java From keycloak with Apache License 2.0 | 5 votes |
private void redirect(AuthenticationFlowContext context, String providerId) { List<IdentityProviderModel> identityProviders = context.getRealm().getIdentityProviders(); for (IdentityProviderModel identityProvider : identityProviders) { if (identityProvider.isEnabled() && providerId.equals(identityProvider.getAlias())) { String accessCode = new ClientSessionCode<>(context.getSession(), context.getRealm(), context.getAuthenticationSession()).getOrGenerateCode(); String clientId = context.getAuthenticationSession().getClient().getClientId(); String tabId = context.getAuthenticationSession().getTabId(); URI location = Urls.identityProviderAuthnRequest(context.getUriInfo().getBaseUri(), providerId, context.getRealm().getName(), accessCode, clientId, tabId); if (context.getAuthenticationSession().getClientNote(OAuth2Constants.DISPLAY) != null) { location = UriBuilder.fromUri(location).queryParam(OAuth2Constants.DISPLAY, context.getAuthenticationSession().getClientNote(OAuth2Constants.DISPLAY)).build(); } Response response = Response.seeOther(location) .build(); // will forward the request to the IDP with prompt=none if the IDP accepts forwards with prompt=none. if ("none".equals(context.getAuthenticationSession().getClientNote(OIDCLoginProtocol.PROMPT_PARAM)) && Boolean.valueOf(identityProvider.getConfig().get(ACCEPTS_PROMPT_NONE))) { context.getAuthenticationSession().setAuthNote(AuthenticationProcessor.FORWARDED_PASSIVE_LOGIN, "true"); } LOG.debugf("Redirecting to %s", providerId); context.forceChallenge(response); return; } } LOG.warnf("Provider not found or not enabled for realm %s", providerId); context.attempted(); }
Example 3
Source File: AbstractUsernameFormAuthenticator.java From keycloak with Apache License 2.0 | 5 votes |
public boolean enabledUser(AuthenticationFlowContext context, UserModel user) { if (!user.isEnabled()) { context.getEvent().user(user); context.getEvent().error(Errors.USER_DISABLED); Response challengeResponse = challenge(context, Messages.ACCOUNT_DISABLED); context.forceChallenge(challengeResponse); return false; } if (isTemporarilyDisabledByBruteForce(context, user)) return false; return true; }
Example 4
Source File: AbstractUsernameFormAuthenticator.java From keycloak with Apache License 2.0 | 5 votes |
private boolean badPasswordHandler(AuthenticationFlowContext context, UserModel user, boolean clearUser,boolean isEmptyPassword) { context.getEvent().user(user); context.getEvent().error(Errors.INVALID_USER_CREDENTIALS); Response challengeResponse = challenge(context, getDefaultChallengeMessage(context)); if(isEmptyPassword) { context.forceChallenge(challengeResponse); }else{ context.failureChallenge(AuthenticationFlowError.INVALID_CREDENTIALS, challengeResponse); } if (clearUser) { context.clearUser(); } return false; }
Example 5
Source File: AbstractUsernameFormAuthenticator.java From keycloak with Apache License 2.0 | 5 votes |
protected boolean isTemporarilyDisabledByBruteForce(AuthenticationFlowContext context, UserModel user) { if (context.getRealm().isBruteForceProtected()) { if (context.getProtector().isTemporarilyDisabled(context.getSession(), context.getRealm(), user)) { context.getEvent().user(user); context.getEvent().error(Errors.USER_TEMPORARILY_DISABLED); Response challengeResponse = challenge(context, tempDisabledError()); context.forceChallenge(challengeResponse); return true; } } return false; }
Example 6
Source File: IdpEmailVerificationAuthenticator.java From keycloak with Apache License 2.0 | 5 votes |
protected void showEmailSentPage(AuthenticationFlowContext context, BrokeredIdentityContext brokerContext) { String accessCode = context.generateAccessCode(); URI action = context.getActionUrl(accessCode); Response challenge = context.form() .setStatus(Response.Status.OK) .setAttribute(LoginFormsProvider.IDENTITY_PROVIDER_BROKER_CONTEXT, brokerContext) .setActionUri(action) .setExecution(context.getExecution().getId()) .createIdpLinkEmailPage(); context.forceChallenge(challenge); }