This library provides the capability to create OpenSAML 3 credentials where the private key is stored and operated inside a PKCS#11 token/HSM.
The process to create a PKCS#11 credential involves 2 steps:
- Create PKCS#11 providers for HSM operated keys
- Create OpenSAML credentials based on these providers.
NOTE: The opensaml-pkcs11 library will not be ported to support OpenSAML 4. Instead use the credentials-support library.
You can either build the library yourself, or include the following in your POM-file:
<dependency>
<groupId>se.swedenconnect.opensaml</groupId>
<artifactId>opensaml-pkcs11-support</artifactId>
<version>${pkcs11-support.version}</version>
</dependency>
- API documentation for the latest version of opensaml-pkcs11 library - http://docs.swedenconnect.se/opensaml-pkcs11/javadoc.
- Project information - http://docs.swedenconnect.se/opensaml-pkcs11/site/.
PKCS#11 Providers are created based on PKCS#11 provider configurations. Three different types of configuration options are supported:
- Providing a list of external configuration files
- Specifying the parameters of configuration data
- Providing configuration data for SoftHSM usage for test
The PKCS#11 providers that are created are instances of sun.security.pkcs11.SunPKCS11
as described in the Java PKCS#11 Reference Guide for Java 8 or Java PKCS#11 Reference Guide for Java 11, depending on your Java version.
Each private key may be represented by multiple instances of the same key stored in separate HSM modules for redundancy and load balancing.
The basic structure allows configuration of multiple HSM slots, where each slot holds an identical set of private keys, where each key is identified by its alias. The configuration options provided below is intended to initiate all HSM slots for all available private keys for a service.
The external config provider is created by an instance of the PKCS11ProvidedCfgConfiguration
class
Example:
PKCS11ProviderConfiguration configuration =
new PKCS11ProvidedCfgConfiguration(Arrays.asList(
"/path-to-first-hsm-configuration-file",
"/path-to-second-hsm-configuration-file"
));
Each provided configuration file is formatted according to the Java SunPKCS11 Reference Guide.
Configuration can be provided by providing parameters in an instance of the PKCS11ProviderConfiguration
class.
Example:
PKCS11ProviderConfiguration configuration
= new PKCS11ProviderConfiguration();
configuration.setName("provider-name");
configuration.setLibrary("/path-to-pkcs11-library");
configuration.setSlot("0");
configuration.setSlotListIndexMaxRange(4);
All parameters are as specified in the SunPKCS11 reference guide except for the additional parameter SlotListIndexMaxRange. If this parameter is set to a number greater than 0, then all slots ranging from the specified slot up to the slot + maxRange will be tested and instantiated with an individual provider. All slots in this range will be instantiated until either the maxRange is reached or an empty slot is encountered.
SoftHSM is configured by an instance of the PKCS11SoftHsmProviderConfiguration
class.
Soft HSM implementations do require that the host have 2 components installed:
- SoftHSM version 2
- The command line tool pkcs-11-tool
For installation of SoftHSM refer to SoftHSM on Open DNSSEC
Installation of pkcs-11-tool can be achieved on linux using the following script:
apt-get update
apt-get install -y pcscd libccid libpcsclite-dev libssl-dev libreadline-dev autoconf automake build-essential docbook-xsl xsltproc libtool pkg-config
wget https://github.com/OpenSC/OpenSC/releases/download/0.19.0/opensc-0.19.0.tar.gz
tar xfvz opensc-*.tar.gz
cd opensc-0.19.0
./bootstrap && ./configure --prefix=/usr --sysconfdir=/etc/opensc
make && make install
cd .. && rm -rf opensc*
Example configuration setup for SoftHSM:
PKCS11ProviderConfiguration configuration
= new PKCS11SoftHsmProviderConfiguration();
configuration.setCredentialConfigurationList(
Arrays.asList(
new SoftHsmCredentialConfiguration(
"samlsign",
"/path-to-key.key",
"/path-to-cert.crt")));
configuration.setPin("1234");
configuration.setLibrary("/usr/lib/softhsm/libsofthsm2.so");
The SoftHsmCredentialConfiguration
object holds information about the key that is being loaded into the SoftHSM module on the host.
Providers are instantiated by an instance of PKCS11ProviderFactory
.
Java 8 and Java 9+ have different and incompatible ways to create an instance of SunPKCS11 provider. In order to provide backwards compatibility, the old constructor that is only compatible with Java 8 is maintained but deprecated.
Example with deprecated legacy constructor (Only with Java 8 applications):
PKCS11ProviderFactory factory = new PKCS11ProviderFactory(configuration);
PKCS11Provider pkcs11Provider = factory.createInstance();
It is recommended to use the new constructor which also requires an implementation of the PKCS11ProviderInstance
interface. An implementation of the PKCS11ProviderInstance
implements a function for creating an instance of the SunPKCS11 provider class based on a provided configuration data string (configString
).
Example for use with Java 8 applications:
PKCS11ProviderFactory factory = new PKCS11ProviderFactory(configuration,
new PKCS11ProviderInstance() {
@Override
public Provider getProviderInstance(String configString) {
Provider sunPKCS11 = new SunPKCS11(
new ByteArrayInputStream(
configString.getBytes(StandardCharsets.UTF_8)));
return sunPKCS11;
}
});
PKCS11Provider pkcs11Provider = factory.createInstance();
Example for Java 9+ applications:
PKCS11ProviderFactory factory = new PKCS11ProviderFactory(configuration,
new PKCS11ProviderInstance() {
@Override
public Provider getProviderInstance(String configString) {
Provider sunPKCS11 = Security.getProvider("SunPKCS11");
// In Java 9+ in-line config data preceded with "--" (or else treated as file path).
sunPKCS11 = sunPKCS11.configure("--" + configString);
return sunPKCS11;
}
});
PKCS11Provider pkcs11Provider = factory.createInstance();
Two credential classes are available
- PKCS11Credential
- PKCS11NoTestCredential
Both credential types provide an instance of the requested key by randomly selecting of one of the available keys under the specified alias.
The PKCS11Credential object performs a pre-sign test before using the key. If the connection to the key is lost, the key is reloaded. This credential type is intended for low transaction volume implementations with a high demand for availability. This option means a certain loss of performance capacity due to the key testing activity.
The PKCS11NoTestCredential does not perform any test on the key and does not attempt reloading. This is intended for high volume deployment with redundancy built into the system.
Example:
PKCS11Provider pkcs11Provider = getProvider();
Credential credential = new PKCS11Credential(
x509Cert,
pkcs11Provider.getProviderNameList(),
"alias","1234");
Following this example, the default procedure for extracting the private key object from the HSM provider is used. For some implementations of HSM it may be necessary to provide custom code for extracting the private key handler object from the HSM by providing an implementation of the interface CustomKeyExtractor
.
Example:
samlMessageSigningCredential = new PKCS11Credential(
x509Cert,
pkcs11Provider.getProviderNameList(),
"alias",
new CustomKeyExtractor() {
@Override
public PrivateKey getPrivateKey(String providerName, String alias) throws Exception {
KeyStore keyStore = KeyStore.getInstance("PKCS11", providerName);
keyStore.load(null, "1234".toCharArray());
return (PrivateKey) keyStore.getKey(alias, "1234".toCharArray());
}
}
);
Copyright © 2018, Sweden Connect. Licensed under version 2.0 of the Apache License.