Code:
/ DotNET / DotNET / 8.0 / untmp / whidbey / REDBITS / ndp / fx / src / xsp / System / Web / Security / WindowsTokenRoleProvider.cs / 1 / WindowsTokenRoleProvider.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Web.Security { using System.Web; using System.Web.Configuration; using System.Security.Principal; using System.Security.Permissions; using System.Globalization; using System.Runtime.Serialization; using System.Collections; using System.Collections.Specialized; using System.Data; using System.Data.SqlClient; using System.Data.SqlTypes; using System.Text; using System.Configuration.Provider; using System.Web.Hosting; using System.Threading; using System.Web.Util; [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] [AspNetHostingPermission(SecurityAction.InheritanceDemand, Level=AspNetHostingPermissionLevel.Minimal)] public class WindowsTokenRoleProvider : RoleProvider { private static string _MachineName = null; private string _AppName; public override string ApplicationName { get { return _AppName; } set { _AppName = value; if ( _AppName.Length > 256 ) { throw new ProviderException( SR.GetString( SR.Provider_application_name_too_long ) ); } } } public override void Initialize(string name, NameValueCollection config){ if (String.IsNullOrEmpty(name)) name = "WindowsTokenProvider"; if (string.IsNullOrEmpty(config["description"])) { config.Remove("description"); config.Add("description", SR.GetString(SR.RoleWindowsTokenProvider_description)); } base.Initialize(name, config); if (config == null) throw new ArgumentNullException("config"); _AppName = config["applicationName"]; if (string.IsNullOrEmpty(_AppName)) _AppName = SecUtility.GetDefaultAppName(); if( _AppName.Length > 256 ) { throw new ProviderException(SR.GetString(SR.Provider_application_name_too_long)); } config.Remove("applicationName"); if (config.Count > 0) { string attribUnrecognized = config.GetKey(0); if (!String.IsNullOrEmpty(attribUnrecognized)) throw new ProviderException(SR.GetString(SR.Provider_unrecognized_attribute, attribUnrecognized)); } } public bool IsUserInRole(string username, System.Security.Principal.WindowsBuiltInRole role){ if (username == null) throw new ArgumentNullException("username"); username = username.Trim(); WindowsIdentity wi = GetCurrentWindowsIdentityAndCheckName(username); if (username.Length < 1) return false; WindowsPrincipal wp = new WindowsPrincipal(wi); return wp.IsInRole(role); } public override bool IsUserInRole(string username, string roleName){ if (username == null) throw new ArgumentNullException("username"); username = username.Trim(); if (roleName == null) throw new ArgumentNullException("roleName"); roleName = roleName.Trim(); if (username.Length < 1) return false; StringBuilder error = new StringBuilder(1024); IntPtr token = GetCurrentTokenAndCheckName(username); switch (UnsafeNativeMethods.IsUserInRole(token, roleName, error, 1024)) { case 1: return true; case 0: return false; } throw new ProviderException(SR.GetString(SR.API_failed_due_to_error, error.ToString())); } public override string [] GetRolesForUser(string username){ HttpRuntime.CheckAspNetHostingPermission(AspNetHostingPermissionLevel.Low, SR.API_not_supported_at_this_level); if (username == null) throw new ArgumentNullException("username"); username = username.Trim(); IntPtr token = GetCurrentTokenAndCheckName(username); if (username.Length < 1) return new string[0]; StringBuilder allRoles = new StringBuilder(1024); StringBuilder error = new StringBuilder(1024); int status = UnsafeNativeMethods.GetGroupsForUser(token, allRoles, 1024, error, 1024); if (status < 0) { allRoles = new StringBuilder(-status); status = UnsafeNativeMethods.GetGroupsForUser(token, allRoles, -status, error, 1024); } if (status <= 0) throw new ProviderException(SR.GetString(SR.API_failed_due_to_error, error.ToString())); string [] roles = allRoles.ToString().Split('\t'); return AddLocalGroupsWithoutDomainNames(roles); } private static string [] AddLocalGroupsWithoutDomainNames(string [] roles) { string computerName = GetMachineName(); int len = computerName.Length; for (int iter = 0; iter < roles.Length; iter++) { roles[iter] = roles[iter].Trim(); if (roles[iter].ToLower(CultureInfo.InvariantCulture).StartsWith(computerName, StringComparison.Ordinal)) // Is it a local group? roles[iter] = roles[iter].Substring(len); } return roles; } public override void CreateRole(string roleName) { throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } public override bool DeleteRole(string roleName, bool throwOnPopulatedRole){ throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } public override bool RoleExists(string roleName){ throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } public override void AddUsersToRoles(string [] usernames, string [] roleNames) { throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } public override void RemoveUsersFromRoles(string [] usernames, string [] roleNames) { throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } public override string [] GetUsersInRole(string roleName){ throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } public override string [] GetAllRoles(){ throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } ////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////// public override string[] FindUsersInRole(string roleName, string usernameToMatch) { throw new ProviderException(SR.GetString(SR.Windows_Token_API_not_supported)); } [PermissionSet(SecurityAction.Assert, Unrestricted=true)] private IntPtr GetCurrentTokenAndCheckName(string userName) { return GetCurrentWindowsIdentityAndCheckName(userName).Token; } [PermissionSet(SecurityAction.Assert, Unrestricted = true)] private static string GetMachineName() { if (_MachineName == null) _MachineName = (System.Environment.MachineName + "\\").ToLower(CultureInfo.InvariantCulture); return _MachineName; } private WindowsIdentity GetCurrentWindowsIdentityAndCheckName(string userName) { if (HostingEnvironment.IsHosted) { HttpContext context = HttpContext.Current; if (context == null || context.User == null) throw new ProviderException(SR.GetString(SR.API_supported_for_current_user_only)); if (!(context.User.Identity is WindowsIdentity)) throw new ProviderException(SR.GetString(SR.API_supported_for_current_user_only)); if (!StringUtil.EqualsIgnoreCase(userName, context.User.Identity.Name)) throw new ProviderException(SR.GetString(SR.API_supported_for_current_user_only)); return (WindowsIdentity)context.User.Identity; } else { IPrincipal user = Thread.CurrentPrincipal; if (user == null || user.Identity == null || !(user.Identity is WindowsIdentity)) throw new ProviderException(SR.GetString(SR.API_supported_for_current_user_only)); if (!StringUtil.EqualsIgnoreCase(userName, user.Identity.Name)) throw new ProviderException(SR.GetString(SR.API_supported_for_current_user_only)); return (WindowsIdentity)user.Identity; } } } }
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- TraceListener.cs
- ConfigXmlElement.cs
- UdpDiscoveryEndpoint.cs
- HwndProxyElementProvider.cs
- DESCryptoServiceProvider.cs
- ProfileModule.cs
- TextInfo.cs
- PackagePartCollection.cs
- XamlTemplateSerializer.cs
- ServiceProviders.cs
- ManagementBaseObject.cs
- TreeChangeInfo.cs
- NavigationProperty.cs
- GetCryptoTransformRequest.cs
- MsmqIntegrationInputMessage.cs
- securitycriticaldata.cs
- RangeValidator.cs
- AlphaSortedEnumConverter.cs
- FormViewActionList.cs
- UDPClient.cs
- ITextView.cs
- TextModifierScope.cs
- X509SubjectKeyIdentifierClause.cs
- WebEvents.cs
- X509SecurityToken.cs
- HttpWrapper.cs
- ExtendedProtectionPolicy.cs
- DynamicDiscoveryDocument.cs
- SystemException.cs
- InkCanvasAutomationPeer.cs
- ChildTable.cs
- IconEditor.cs
- basevalidator.cs
- LinearGradientBrush.cs
- Int16Storage.cs
- FrameSecurityDescriptor.cs
- TextDecorationCollectionConverter.cs
- GroupAggregateExpr.cs
- ClusterSafeNativeMethods.cs
- SmtpAuthenticationManager.cs
- StyleSheetRefUrlEditor.cs
- DynamicResourceExtension.cs
- CharAnimationBase.cs
- ZipIOLocalFileHeader.cs
- WebSysDisplayNameAttribute.cs
- XmlSerializerNamespaces.cs
- DocobjHost.cs
- CacheAxisQuery.cs
- X509Certificate.cs
- RegexMatchCollection.cs
- MenuStrip.cs
- Accessible.cs
- ClientBuildManager.cs
- GradientStop.cs
- XmlNodeChangedEventArgs.cs
- MsmqHostedTransportConfiguration.cs
- MimeBasePart.cs
- EDesignUtil.cs
- XamlReader.cs
- UniqueTransportManagerRegistration.cs
- Metadata.cs
- SafeHandle.cs
- EntityCodeGenerator.cs
- StrokeFIndices.cs
- AnnotationHelper.cs
- AutomationPeer.cs
- ListBindableAttribute.cs
- MarshalByRefObject.cs
- processwaithandle.cs
- RelationHandler.cs
- FederatedMessageSecurityOverHttpElement.cs
- QuestionEventArgs.cs
- ConnectionStringsSection.cs
- LayoutTableCell.cs
- XmlStreamStore.cs
- XmlElementCollection.cs
- DataGridRow.cs
- GeometryGroup.cs
- TraceFilter.cs
- DynamicScriptObject.cs
- RegistryPermission.cs
- OdbcParameter.cs
- Types.cs
- ComponentSerializationService.cs
- CategoryNameCollection.cs
- DateTimePickerDesigner.cs
- EventLogTraceListener.cs
- ListControlConvertEventArgs.cs
- MouseGesture.cs
- CharacterHit.cs
- InputManager.cs
- HtmlElementCollection.cs
- ZipIOZip64EndOfCentralDirectoryLocatorBlock.cs
- X509CertificateRecipientClientCredential.cs
- ControlIdConverter.cs
- StylusPointPropertyId.cs
- MetadataException.cs
- CompoundFileStorageReference.cs
- RequestQueryParser.cs
- TypedReference.cs