Coverage Report - org.apache.shiro.authc.AuthenticationToken
 
Classes in this File Line Coverage Branch Coverage Complexity
AuthenticationToken
N/A
N/A
1
 
 1  
 /*
 2  
  * Licensed to the Apache Software Foundation (ASF) under one
 3  
  * or more contributor license agreements.  See the NOTICE file
 4  
  * distributed with this work for additional information
 5  
  * regarding copyright ownership.  The ASF licenses this file
 6  
  * to you under the Apache License, Version 2.0 (the
 7  
  * "License"); you may not use this file except in compliance
 8  
  * with the License.  You may obtain a copy of the License at
 9  
  *
 10  
  *     http://www.apache.org/licenses/LICENSE-2.0
 11  
  *
 12  
  * Unless required by applicable law or agreed to in writing,
 13  
  * software distributed under the License is distributed on an
 14  
  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 15  
  * KIND, either express or implied.  See the License for the
 16  
  * specific language governing permissions and limitations
 17  
  * under the License.
 18  
  */
 19  
 package org.apache.shiro.authc;
 20  
 
 21  
 import java.io.Serializable;
 22  
 
 23  
 /**
 24  
  * <p>An <tt>AuthenticationToken</tt> is a consolidation of an account's principals and supporting
 25  
  * credentials submitted by a user during an authentication attempt.
 26  
  * <p/>
 27  
  * <p>The token is submitted to an {@link Authenticator Authenticator} via the
 28  
  * {@link Authenticator#authenticate(AuthenticationToken) authenticate(token)} method.  The
 29  
  * Authenticator then executes the authentication/log-in process.
 30  
  * <p/>
 31  
  * <p>Common implementations of an <tt>AuthenticationToken</tt> would have username/password
 32  
  * pairs, X.509 Certificate, PGP key, or anything else you can think of.  The token can be
 33  
  * anything needed by an {@link Authenticator} to authenticate properly.
 34  
  * <p/>
 35  
  * <p>Because applications represent user data and credentials in different ways, implementations
 36  
  * of this interface are application-specific.  You are free to acquire a user's principals and
 37  
  * credentials however you wish (e.g. web form, Swing form, fingerprint identification, etc) and
 38  
  * then submit them to the Shiro framework in the form of an implementation of this
 39  
  * interface.
 40  
  * <p/>
 41  
  * <p>If your application's authentication process is  username/password based
 42  
  * (like most), instead of implementing this interface yourself, take a look at the
 43  
  * {@link UsernamePasswordToken UsernamePasswordToken} class, as it is probably sufficient for your needs.
 44  
  * <p/>
 45  
  * <p>RememberMe services are enabled for a token if they implement a sub-interface of this one, called
 46  
  * {@link RememberMeAuthenticationToken RememberMeAuthenticationToken}.  Implement that interfac if you need
 47  
  * RememberMe services (the <tt>UsernamePasswordToken</tt> already implements this interface).
 48  
  * <p/>
 49  
  * <p>If you are familiar with JAAS, an <tt>AuthenticationToken</tt> replaces the concept of a
 50  
  * {@link javax.security.auth.callback.Callback}, and  defines meaningful behavior
 51  
  * (<tt>Callback</tt> is just a marker interface, and of little use).  We
 52  
  * also think the name <em>AuthenticationToken</em> more accurately reflects its true purpose
 53  
  * in a login framework, whereas <em>Callback</em> is less obvious.
 54  
  *
 55  
  * @see RememberMeAuthenticationToken
 56  
  * @see HostAuthenticationToken
 57  
  * @see UsernamePasswordToken
 58  
  * @since 0.1
 59  
  */
 60  
 public interface AuthenticationToken extends Serializable {
 61  
 
 62  
     /**
 63  
      * Returns the account identity submitted during the authentication process.
 64  
      * <p/>
 65  
      * <p>Most application authentications are username/password based and have this
 66  
      * object represent a username.  If this is the case for your application,
 67  
      * take a look at the {@link UsernamePasswordToken UsernamePasswordToken}, as it is probably
 68  
      * sufficient for your use.
 69  
      * <p/>
 70  
      * <p>Ultimately, the object returned is application specific and can represent
 71  
      * any account identity (user id, X.509 certificate, etc).
 72  
      *
 73  
      * @return the account identity submitted during the authentication process.
 74  
      * @see UsernamePasswordToken
 75  
      */
 76  
     Object getPrincipal();
 77  
 
 78  
     /**
 79  
      * Returns the credentials submitted by the user during the authentication process that verifies
 80  
      * the submitted {@link #getPrincipal() account identity}.
 81  
      * <p/>
 82  
      * <p>Most application authentications are username/password based and have this object
 83  
      * represent a submitted password.  If this is the case for your application,
 84  
      * take a look at the {@link UsernamePasswordToken UsernamePasswordToken}, as it is probably
 85  
      * sufficient for your use.
 86  
      * <p/>
 87  
      * <p>Ultimately, the credentials Object returned is application specific and can represent
 88  
      * any credential mechanism.
 89  
      *
 90  
      * @return the credential submitted by the user during the authentication process.
 91  
      */
 92  
     Object getCredentials();
 93  
 
 94  
 }