1 |
|
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
7 |
|
|
8 |
|
|
9 |
|
|
10 |
|
|
11 |
|
|
12 |
|
|
13 |
|
|
14 |
|
|
15 |
|
|
16 |
|
|
17 |
|
package org.apache.jetspeed.security.impl; |
18 |
|
|
19 |
|
import java.security.Principal; |
20 |
|
import java.sql.Date; |
21 |
|
import java.util.ArrayList; |
22 |
|
import java.util.Collection; |
23 |
|
import java.util.HashSet; |
24 |
|
import java.util.Iterator; |
25 |
|
import java.util.LinkedList; |
26 |
|
import java.util.List; |
27 |
|
import java.util.Set; |
28 |
|
import java.util.prefs.BackingStoreException; |
29 |
|
import java.util.prefs.Preferences; |
30 |
|
|
31 |
|
import javax.security.auth.Subject; |
32 |
|
|
33 |
|
import org.apache.commons.logging.Log; |
34 |
|
import org.apache.commons.logging.LogFactory; |
35 |
|
import org.apache.jetspeed.security.AuthenticationProviderProxy; |
36 |
|
import org.apache.jetspeed.security.HierarchyResolver; |
37 |
|
import org.apache.jetspeed.security.SecurityException; |
38 |
|
import org.apache.jetspeed.security.SecurityProvider; |
39 |
|
import org.apache.jetspeed.security.User; |
40 |
|
import org.apache.jetspeed.security.UserManager; |
41 |
|
import org.apache.jetspeed.security.UserPrincipal; |
42 |
|
import org.apache.jetspeed.security.spi.SecurityMappingHandler; |
43 |
|
import org.apache.jetspeed.util.ArgUtil; |
44 |
|
|
45 |
|
|
46 |
|
|
47 |
|
|
48 |
|
|
49 |
|
|
50 |
|
|
51 |
|
|
52 |
|
|
53 |
|
public class UserManagerImpl implements UserManager |
54 |
|
{ |
55 |
|
|
56 |
0 |
private static final Log log = LogFactory.getLog(UserManagerImpl.class); |
57 |
|
|
58 |
|
|
59 |
0 |
private AuthenticationProviderProxy atnProviderProxy = null; |
60 |
|
|
61 |
|
|
62 |
0 |
private SecurityMappingHandler securityMappingHandler = null; |
63 |
|
|
64 |
0 |
private String anonymousUser = "guest"; |
65 |
0 |
private User guest = null; |
66 |
|
|
67 |
|
|
68 |
|
|
69 |
|
|
70 |
|
|
71 |
0 |
private boolean rolesInheritableViaGroups = true; |
72 |
|
|
73 |
|
|
74 |
|
|
75 |
|
|
76 |
|
|
77 |
|
public UserManagerImpl(SecurityProvider securityProvider) |
78 |
0 |
{ |
79 |
0 |
this.atnProviderProxy = securityProvider |
80 |
|
.getAuthenticationProviderProxy(); |
81 |
0 |
this.securityMappingHandler = securityProvider |
82 |
|
.getSecurityMappingHandler(); |
83 |
0 |
} |
84 |
|
|
85 |
|
|
86 |
|
|
87 |
|
|
88 |
|
|
89 |
|
|
90 |
|
|
91 |
|
public UserManagerImpl(SecurityProvider securityProvider, |
92 |
|
String anonymousUser) |
93 |
0 |
{ |
94 |
0 |
this.atnProviderProxy = securityProvider |
95 |
|
.getAuthenticationProviderProxy(); |
96 |
0 |
this.securityMappingHandler = securityProvider |
97 |
|
.getSecurityMappingHandler(); |
98 |
0 |
if (anonymousUser != null) |
99 |
|
{ |
100 |
0 |
this.anonymousUser = anonymousUser; |
101 |
|
} |
102 |
0 |
} |
103 |
|
|
104 |
|
|
105 |
|
|
106 |
|
|
107 |
|
|
108 |
|
|
109 |
|
|
110 |
|
|
111 |
|
|
112 |
|
public UserManagerImpl(SecurityProvider securityProvider, |
113 |
|
HierarchyResolver roleHierarchyResolver, |
114 |
|
HierarchyResolver groupHierarchyResolver) |
115 |
0 |
{ |
116 |
0 |
securityProvider.getSecurityMappingHandler().setRoleHierarchyResolver( |
117 |
|
roleHierarchyResolver); |
118 |
0 |
securityProvider.getSecurityMappingHandler().setGroupHierarchyResolver( |
119 |
|
groupHierarchyResolver); |
120 |
0 |
this.atnProviderProxy = securityProvider |
121 |
|
.getAuthenticationProviderProxy(); |
122 |
0 |
this.securityMappingHandler = securityProvider |
123 |
|
.getSecurityMappingHandler(); |
124 |
0 |
} |
125 |
|
|
126 |
|
|
127 |
|
|
128 |
|
|
129 |
|
|
130 |
|
|
131 |
|
|
132 |
|
|
133 |
|
|
134 |
|
|
135 |
|
|
136 |
|
public UserManagerImpl(SecurityProvider securityProvider, |
137 |
|
HierarchyResolver roleHierarchyResolver, |
138 |
|
HierarchyResolver groupHierarchyResolver, String anonymousUser) |
139 |
0 |
{ |
140 |
0 |
securityProvider.getSecurityMappingHandler().setRoleHierarchyResolver( |
141 |
|
roleHierarchyResolver); |
142 |
0 |
securityProvider.getSecurityMappingHandler().setGroupHierarchyResolver( |
143 |
|
groupHierarchyResolver); |
144 |
0 |
this.atnProviderProxy = securityProvider |
145 |
|
.getAuthenticationProviderProxy(); |
146 |
0 |
this.securityMappingHandler = securityProvider |
147 |
|
.getSecurityMappingHandler(); |
148 |
0 |
if (anonymousUser != null) |
149 |
|
{ |
150 |
0 |
this.anonymousUser = anonymousUser; |
151 |
|
} |
152 |
0 |
} |
153 |
|
|
154 |
|
|
155 |
|
|
156 |
|
|
157 |
|
|
158 |
|
|
159 |
|
public String getAnonymousUser() |
160 |
|
{ |
161 |
0 |
return this.anonymousUser; |
162 |
|
} |
163 |
|
|
164 |
|
public void setRolesInheritableViaGroups(boolean rolesInheritableViaGroups) |
165 |
|
{ |
166 |
0 |
this.rolesInheritableViaGroups = rolesInheritableViaGroups; |
167 |
0 |
} |
168 |
|
|
169 |
|
|
170 |
|
|
171 |
|
|
172 |
|
|
173 |
|
public boolean authenticate(String username, String password) |
174 |
|
{ |
175 |
0 |
ArgUtil.notNull(new Object[] |
176 |
|
{ username, password}, new String[] |
177 |
|
{ "username", "password"}, |
178 |
|
"authenticate(java.lang.String, java.lang.String)"); |
179 |
|
|
180 |
0 |
boolean authenticated = false; |
181 |
|
try |
182 |
|
{ |
183 |
0 |
if (!getAnonymousUser().equals(username)) |
184 |
|
{ |
185 |
0 |
authenticated = atnProviderProxy.authenticate(username, |
186 |
|
password); |
187 |
0 |
if (authenticated && log.isDebugEnabled()) |
188 |
|
{ |
189 |
0 |
log.debug("Authenticated user: " + username); |
190 |
|
} |
191 |
|
} |
192 |
0 |
} catch (SecurityException e) |
193 |
|
{ |
194 |
|
|
195 |
0 |
} |
196 |
0 |
return authenticated; |
197 |
|
} |
198 |
|
|
199 |
|
|
200 |
|
|
201 |
|
|
202 |
|
|
203 |
|
public void addUser(String username, String password) |
204 |
|
throws SecurityException |
205 |
|
{ |
206 |
0 |
ArgUtil.notNull(new Object[] |
207 |
|
{ username}, new String[] |
208 |
|
{ "username"}, "addUser(java.lang.String, java.lang.String)"); |
209 |
|
|
210 |
0 |
createUser(username, password, atnProviderProxy |
211 |
|
.getDefaultAuthenticationProvider(),false); |
212 |
0 |
} |
213 |
|
|
214 |
|
|
215 |
|
|
216 |
|
|
217 |
|
|
218 |
|
|
219 |
|
|
220 |
|
public void addUser(String username, String password, String atnProviderName) |
221 |
|
throws SecurityException |
222 |
|
{ |
223 |
0 |
ArgUtil.notNull(new Object[] |
224 |
|
{ username}, new String[] |
225 |
|
{ "username"}, "addUser(java.lang.String, java.lang.String)"); |
226 |
|
|
227 |
0 |
createUser(username, password, atnProviderName, false); |
228 |
0 |
} |
229 |
|
|
230 |
|
|
231 |
|
|
232 |
|
|
233 |
|
|
234 |
|
public void importUser(String username, String password, boolean passThrough) |
235 |
|
throws SecurityException |
236 |
|
{ |
237 |
0 |
ArgUtil.notNull(new Object[] |
238 |
|
{ username}, new String[] |
239 |
|
{ "username"}, "addUser(java.lang.String, java.lang.String)"); |
240 |
|
|
241 |
0 |
createUser(username, password, atnProviderProxy |
242 |
|
.getDefaultAuthenticationProvider(),passThrough); |
243 |
0 |
} |
244 |
|
|
245 |
|
|
246 |
|
|
247 |
|
|
248 |
|
|
249 |
|
public void importUser(String username, String password, String atnProviderName, boolean passThrough) |
250 |
|
throws SecurityException |
251 |
|
{ |
252 |
0 |
ArgUtil.notNull(new Object[] |
253 |
|
{ username}, new String[] |
254 |
|
{ "username"}, "addUser(java.lang.String, java.lang.String)"); |
255 |
|
|
256 |
0 |
createUser(username, password, atnProviderName,passThrough); |
257 |
0 |
} |
258 |
|
|
259 |
|
|
260 |
|
|
261 |
|
|
262 |
|
protected void createUser(String username, String password, String atnProviderName, boolean raw) |
263 |
|
throws SecurityException |
264 |
|
{ |
265 |
0 |
ArgUtil |
266 |
|
.notNull(new Object[] |
267 |
|
{ username, atnProviderName}, new String[] |
268 |
|
{ "username", "atnProviderName"}, |
269 |
|
"addUser(java.lang.String, java.lang.String, java.lang.String)"); |
270 |
|
|
271 |
|
|
272 |
|
|
273 |
|
|
274 |
|
|
275 |
0 |
if (userExists(username)) { |
276 |
0 |
throw new SecurityException(SecurityException.USER_ALREADY_EXISTS.create(username)); |
277 |
|
} |
278 |
|
|
279 |
0 |
UserPrincipal userPrincipal = new UserPrincipalImpl(username); |
280 |
0 |
String fullPath = userPrincipal.getFullPath(); |
281 |
|
|
282 |
0 |
Preferences preferences = Preferences.userRoot().node(fullPath); |
283 |
0 |
if (log.isDebugEnabled()) |
284 |
|
{ |
285 |
0 |
log.debug("Added user preferences node: " + fullPath); |
286 |
|
} |
287 |
|
try |
288 |
|
{ |
289 |
0 |
if ((null != preferences) |
290 |
|
&& preferences.absolutePath().equals(fullPath)) |
291 |
|
{ |
292 |
|
|
293 |
0 |
atnProviderProxy.addUserPrincipal(userPrincipal); |
294 |
0 |
if (password != null) |
295 |
|
{ |
296 |
|
try |
297 |
|
{ |
298 |
|
|
299 |
0 |
if (raw) |
300 |
0 |
atnProviderProxy.importPassword(username, password,atnProviderName); |
301 |
|
else |
302 |
0 |
atnProviderProxy.setPassword(username, null, password,atnProviderName); |
303 |
|
} |
304 |
0 |
catch (SecurityException se1) |
305 |
|
{ |
306 |
|
try |
307 |
|
{ |
308 |
|
|
309 |
0 |
atnProviderProxy.removeUserPrincipal(userPrincipal); |
310 |
|
} |
311 |
0 |
catch (SecurityException se2) |
312 |
|
{ |
313 |
0 |
log.error("Failed to rollback created user after its password turned out to be invalid", se2); |
314 |
0 |
} |
315 |
0 |
throw se1; |
316 |
0 |
} |
317 |
|
} |
318 |
0 |
if (log.isDebugEnabled()) |
319 |
|
{ |
320 |
0 |
log.debug("Added user: " + fullPath); |
321 |
|
} |
322 |
|
} |
323 |
0 |
} catch (SecurityException se) |
324 |
|
{ |
325 |
0 |
log.error(se.getMessage(), se); |
326 |
|
|
327 |
|
|
328 |
|
try |
329 |
|
{ |
330 |
0 |
preferences.removeNode(); |
331 |
0 |
} catch (BackingStoreException bse) |
332 |
|
{ |
333 |
0 |
bse.printStackTrace(); |
334 |
0 |
} |
335 |
0 |
throw se; |
336 |
0 |
} |
337 |
0 |
} |
338 |
|
|
339 |
|
|
340 |
|
|
341 |
|
|
342 |
|
|
343 |
|
|
344 |
|
|
345 |
|
|
346 |
|
public void removeUser(String username) throws SecurityException |
347 |
|
{ |
348 |
0 |
ArgUtil.notNull(new Object[] |
349 |
|
{ username}, new String[] |
350 |
|
{ "username"}, "removeUser(java.lang.String)"); |
351 |
|
|
352 |
0 |
if (getAnonymousUser().equals(username)) { throw new SecurityException( |
353 |
|
SecurityException.ANONYMOUS_USER_PROTECTED.create(username)); } |
354 |
0 |
UserPrincipal userPrincipal = new UserPrincipalImpl(username); |
355 |
0 |
String fullPath = userPrincipal.getFullPath(); |
356 |
0 |
atnProviderProxy.removeUserPrincipal(userPrincipal); |
357 |
|
|
358 |
0 |
Preferences preferences = Preferences.userRoot().node(fullPath); |
359 |
|
try |
360 |
|
{ |
361 |
0 |
preferences.removeNode(); |
362 |
0 |
} catch (BackingStoreException bse) |
363 |
|
{ |
364 |
0 |
bse.printStackTrace(); |
365 |
0 |
} |
366 |
0 |
} |
367 |
|
|
368 |
|
|
369 |
|
|
370 |
|
|
371 |
|
public boolean userExists(String username) |
372 |
|
{ |
373 |
0 |
ArgUtil.notNull(new Object[] |
374 |
|
{ username}, new String[] |
375 |
|
{ "username"}, "userExists(java.lang.String)"); |
376 |
|
|
377 |
0 |
return atnProviderProxy.getUserPrincipal(username) != null; |
378 |
|
} |
379 |
|
|
380 |
|
|
381 |
|
|
382 |
|
|
383 |
|
public User getUser(String username) throws SecurityException |
384 |
|
{ |
385 |
0 |
ArgUtil.notNull(new Object[] |
386 |
|
{ username}, new String[] |
387 |
|
{ "username"}, "getUser(java.lang.String)"); |
388 |
|
|
389 |
|
|
390 |
0 |
if (guest != null && getAnonymousUser().equals(username)) |
391 |
|
{ |
392 |
|
|
393 |
0 |
return guest; |
394 |
|
} |
395 |
|
|
396 |
0 |
Set principals = new PrincipalsSet(); |
397 |
0 |
String fullPath = (new UserPrincipalImpl(username)).getFullPath(); |
398 |
|
|
399 |
0 |
Principal userPrincipal = atnProviderProxy.getUserPrincipal(username); |
400 |
0 |
if (null == userPrincipal) { |
401 |
0 |
throw new SecurityException(SecurityException.USER_DOES_NOT_EXIST.create(username)); |
402 |
|
} |
403 |
|
|
404 |
0 |
principals.add(userPrincipal); |
405 |
0 |
principals.addAll(securityMappingHandler.getRolePrincipals(username)); |
406 |
0 |
Set groupPrincipals = securityMappingHandler.getGroupPrincipals(username); |
407 |
0 |
principals.addAll(groupPrincipals); |
408 |
|
|
409 |
0 |
if (this.rolesInheritableViaGroups) |
410 |
|
{ |
411 |
0 |
for (Iterator it = groupPrincipals.iterator(); it.hasNext(); ) |
412 |
|
{ |
413 |
0 |
Principal groupPrincipal = (Principal) it.next(); |
414 |
0 |
Set rolePrincipalsInGroup = securityMappingHandler.getRolePrincipalsInGroup(groupPrincipal.getName()); |
415 |
0 |
principals.addAll(rolePrincipalsInGroup); |
416 |
0 |
} |
417 |
|
} |
418 |
|
|
419 |
0 |
Subject subject = null; |
420 |
0 |
if (getAnonymousUser().equals(username)) |
421 |
|
{ |
422 |
0 |
subject = new Subject(true, principals, class="keyword">new HashSet(), |
423 |
|
new HashSet()); |
424 |
|
} else |
425 |
|
{ |
426 |
0 |
subject = new Subject(true, principals, atnProviderProxy |
427 |
|
.getPublicCredentials(username), atnProviderProxy |
428 |
|
.getPrivateCredentials(username)); |
429 |
|
} |
430 |
0 |
Preferences preferences = Preferences.userRoot().node(fullPath); |
431 |
0 |
User user = new UserImpl(subject, preferences); |
432 |
0 |
if (getAnonymousUser().equals(username)) |
433 |
|
{ |
434 |
0 |
guest = user; |
435 |
|
} |
436 |
0 |
return user; |
437 |
|
} |
438 |
|
|
439 |
|
|
440 |
|
|
441 |
|
|
442 |
|
public Iterator getUsers(String filter) throws SecurityException |
443 |
|
{ |
444 |
0 |
List users = new LinkedList(); |
445 |
0 |
Iterator userPrincipals = atnProviderProxy.getUserPrincipals(filter) |
446 |
|
.iterator(); |
447 |
0 |
while (userPrincipals.hasNext()) |
448 |
|
{ |
449 |
0 |
String username = ((Principal) userPrincipals.next()).getName(); |
450 |
0 |
User user = getUser(username); |
451 |
0 |
users.add(user); |
452 |
0 |
} |
453 |
0 |
return users.iterator(); |
454 |
|
} |
455 |
|
|
456 |
|
|
457 |
|
|
458 |
|
|
459 |
|
public Iterator getUserNames(String filter) throws SecurityException |
460 |
|
{ |
461 |
0 |
List usernames = new LinkedList(); |
462 |
0 |
Iterator userPrincipals = atnProviderProxy.getUserPrincipals(filter).iterator(); |
463 |
0 |
while (userPrincipals.hasNext()) |
464 |
|
{ |
465 |
0 |
usernames.add(((Principal) userPrincipals.next()).getName()); |
466 |
|
} |
467 |
0 |
return usernames.iterator(); |
468 |
|
} |
469 |
|
|
470 |
|
|
471 |
|
|
472 |
|
|
473 |
|
public Collection getUsersInRole(String roleFullPathName) |
474 |
|
throws SecurityException |
475 |
|
{ |
476 |
0 |
ArgUtil.notNull(new Object[] |
477 |
|
{ roleFullPathName}, new String[] |
478 |
|
{ "roleFullPathName"}, "getUsersInRole(java.lang.String)"); |
479 |
|
|
480 |
0 |
Collection users = new ArrayList(); |
481 |
|
|
482 |
0 |
Set userPrincipals = securityMappingHandler |
483 |
|
.getUserPrincipalsInRole(roleFullPathName); |
484 |
0 |
Iterator userPrincipalsIter = userPrincipals.iterator(); |
485 |
0 |
while (userPrincipalsIter.hasNext()) |
486 |
|
{ |
487 |
0 |
Principal userPrincipal = (Principal) userPrincipalsIter.next(); |
488 |
0 |
users.add(getUser(userPrincipal.getName())); |
489 |
0 |
} |
490 |
0 |
return users; |
491 |
|
} |
492 |
|
|
493 |
|
|
494 |
|
|
495 |
|
|
496 |
|
public Collection getUsersInGroup(String groupFullPathName) |
497 |
|
throws SecurityException |
498 |
|
{ |
499 |
0 |
ArgUtil.notNull(new Object[] |
500 |
|
{ groupFullPathName}, new String[] |
501 |
|
{ "groupFullPathName"}, "getUsersInGroup(java.lang.String)"); |
502 |
|
|
503 |
0 |
Collection users = new ArrayList(); |
504 |
|
|
505 |
0 |
Set userPrincipals = securityMappingHandler |
506 |
|
.getUserPrincipalsInGroup(groupFullPathName); |
507 |
0 |
Iterator userPrincipalsIter = userPrincipals.iterator(); |
508 |
0 |
while (userPrincipalsIter.hasNext()) |
509 |
|
{ |
510 |
0 |
Principal userPrincipal = (Principal) userPrincipalsIter.next(); |
511 |
0 |
users.add(getUser(userPrincipal.getName())); |
512 |
0 |
} |
513 |
0 |
return users; |
514 |
|
} |
515 |
|
|
516 |
|
|
517 |
|
|
518 |
|
|
519 |
|
|
520 |
|
|
521 |
|
|
522 |
|
public void setPassword(String username, String oldPassword, |
523 |
|
String newPassword) throws SecurityException |
524 |
|
{ |
525 |
0 |
ArgUtil |
526 |
|
.notNull(new Object[] |
527 |
|
{ username, newPassword}, new String[] |
528 |
|
{ "username", "newPassword"}, |
529 |
|
"setPassword(java.lang.String, java.lang.String, java.lang.String)"); |
530 |
|
|
531 |
0 |
if (getAnonymousUser().equals(username)) { throw new SecurityException( |
532 |
|
SecurityException.ANONYMOUS_USER_PROTECTED.create(username)); } |
533 |
0 |
atnProviderProxy.setPassword(username, oldPassword, newPassword); |
534 |
0 |
} |
535 |
|
|
536 |
|
|
537 |
|
|
538 |
|
|
539 |
|
|
540 |
|
public void setPasswordEnabled(String userName, boolean enabled) |
541 |
|
throws SecurityException |
542 |
|
{ |
543 |
0 |
ArgUtil.notNull(new Object[] |
544 |
|
{ userName,}, new String[] |
545 |
|
{ "userName"}, "setPasswordEnabled(java.lang.String, boolean)"); |
546 |
|
|
547 |
0 |
if (getAnonymousUser().equals(userName)) { throw new SecurityException( |
548 |
|
SecurityException.ANONYMOUS_USER_PROTECTED.create(userName)); } |
549 |
0 |
atnProviderProxy.setPasswordEnabled(userName, enabled); |
550 |
0 |
} |
551 |
|
|
552 |
|
|
553 |
|
|
554 |
|
|
555 |
|
|
556 |
|
public void setPasswordUpdateRequired(String userName, |
557 |
|
boolean updateRequired) throws SecurityException |
558 |
|
{ |
559 |
0 |
ArgUtil.notNull(new Object[] |
560 |
|
{ userName,}, new String[] |
561 |
|
{ "userName"}, "setPasswordUpdateRequired(java.lang.String, boolean)"); |
562 |
|
|
563 |
0 |
if (getAnonymousUser().equals(userName)) { throw new SecurityException( |
564 |
|
SecurityException.ANONYMOUS_USER_PROTECTED.create(userName)); } |
565 |
0 |
atnProviderProxy.setPasswordUpdateRequired(userName, updateRequired); |
566 |
0 |
} |
567 |
|
|
568 |
|
|
569 |
|
|
570 |
|
|
571 |
|
|
572 |
|
public void setUserEnabled(String userName, boolean enabled) throws SecurityException |
573 |
|
{ |
574 |
0 |
ArgUtil.notNull(new Object[] { userName, }, class="keyword">new String[] { "userName" }, |
575 |
|
"setUserEnabled(java.lang.String, boolean)"); |
576 |
|
|
577 |
0 |
if (getAnonymousUser().equals(userName)) |
578 |
|
{ |
579 |
0 |
throw new SecurityException(SecurityException.ANONYMOUS_USER_PROTECTED.create(userName)); |
580 |
|
} |
581 |
|
|
582 |
0 |
UserPrincipalImpl userPrincipal = (UserPrincipalImpl)atnProviderProxy.getUserPrincipal(userName); |
583 |
0 |
if (null == userPrincipal) |
584 |
|
{ |
585 |
0 |
throw new SecurityException(SecurityException.USER_DOES_NOT_EXIST.create(userName)); |
586 |
|
} |
587 |
0 |
if ( enabled != userPrincipal.isEnabled() ) |
588 |
|
{ |
589 |
0 |
userPrincipal.setEnabled(enabled); |
590 |
0 |
atnProviderProxy.updateUserPrincipal(userPrincipal); |
591 |
|
} |
592 |
0 |
} |
593 |
|
|
594 |
|
|
595 |
|
|
596 |
|
|
597 |
|
public void setPasswordExpiration(String userName, Date expirationDate) throws SecurityException |
598 |
|
{ |
599 |
0 |
ArgUtil.notNull(new Object[] |
600 |
|
{ userName,}, new String[] |
601 |
|
{ "userName"}, "setPasswordExpiration(java.lang.String, java.sql.Date)"); |
602 |
|
|
603 |
0 |
if (getAnonymousUser().equals(userName)) |
604 |
|
{ |
605 |
0 |
throw new SecurityException(SecurityException.ANONYMOUS_USER_PROTECTED.create(userName)); |
606 |
|
} |
607 |
0 |
atnProviderProxy.setPasswordExpiration(userName, expirationDate); |
608 |
0 |
} |
609 |
|
} |