10 Proxy Authentication

Oracle Java Database Connectivity (JDBC) provides proxy authentication, also called N-tier authentication. This feature is supported through both the JDBC Oracle Call Interface (OCI) driver and the JDBC Thin driver. This chapter contains the following sections:

Note:

Oracle Database supports proxy authentication functionality in three tiers only. It does not support it across multiple middle tiers.

About Proxy Authentication

Proxy authentication is the process of using a middle-tier for user authentication. You can design a middle-tier server to proxy clients in a secure fashion by using the following three forms of proxy authentication:

  • The middle-tier server authenticates itself with the database server and a client. In this case, an application user or another application, authenticates itself with the middle-tier server. Client identities can be maintained all the way through to the database.

  • The client, that is, a database user, is not authenticated by the middle-tier server. The client's identity and database password are passed through the middle-tier server to the database server for authentication.

  • The client, that is, a global user, is authenticated by the middle-tier server, and passes either a Distinguished name (DN) or a Certificate through the middle tier for retrieving the client's user name.

In all cases, an administrator must authorize the middle-tier server to proxy a client, that is, to act on behalf of the client. Operations done on behalf of a client by a middle-tier server can be audited. Issue the following command to authorize the middle-tier server to proxy a client:

ALTER USER jeff GRANT CONNECT THROUGH scott;

where, scott is the name of the proxy user.

You can also:

  • Specify roles that the middle tier is permitted to activate when connecting as the client. For example,

    CREATE ROLE role1; 
    GRANT SELECT ON emp TO role1;
    

    The role clause limits the access only to those database objects that are mentioned in the list of the roles. The list of roles can be empty.

  • Find the users who are currently authorized to connect through a middle tier by querying the PROXY_USERS data dictionary view.

  • Disallow a proxy connection by using the REVOKE CONNECT THROUGH clause of ALTER USER command.

Note:

In this chapter, a JDBC connection to a database is a user session in the database and vice versa.

You need to use the different fields and methods present in the oracle.jdbc.OracleConnection interface to set up the different types of proxy connections.

Types of Proxy Connections

You can create proxy connections using any one of the following options:

  • USER NAME

    This is done by supplying the user name or the password or both. The SQL statement for specifying authentication using password is:

    ALTER USER jeff GRANT CONNECT THROUGH scott AUTHENTICATED USING password;
    

    In this case, jeff is the user name and scott is the proxy for jeff.

    The password option exists for additional security. Having no authenticated clause implies default authentication, which is using only the user name without the password. The SQL statement for specifying default authentication is:

    ALTER USER jeff GRANT CONNECT THROUGH scott
    
  • DISTINGUISHED NAME

    This is a global name in lieu of the password of the user being proxied for. An example of the corresponding SQL statement using a distinguished name is:

    CREATE USER jeff IDENTIFIED GLOBALLY AS 'CN=jeff,OU=americas,O=oracle,L=redwoodshores,ST=ca,C=us';
    

    The string that follows the identified globally as clause is the distinguished name. It is then necessary to authenticate using this distinguished name. The corresponding SQL statement to specify authentication using distinguished name is:

    ALTER USER jeff GRANT CONNECT THROUGH scott AUTHENTICATED USING DISTINGUISHED NAME;
    
  • CERTIFICATE

    This is a more encrypted way of passing the credentials of the user, who is to be proxied, to the database. The certificate contains the distinguished name encoded in it. One way of generating the certificate is by creating a wallet and then decoding the wallet to get the certificate. The wallet can be created using runutl mkwallet. It is then necessary to authenticate using the generated certificate. The SQL statement for specifying authentication using certificate is:

    ALTER USER jeff GRANT CONNECT THROUGH scott AUTHENTICATED USING CERTIFICATE;
    .
    

    Note:

    The use of certificates for proxy authentication will be desupported in future Oracle Database releases.

Note:

  • All the options can be associated with roles.

  • When opening a new proxied connection, a new session is started on the database server. Along with this session a new local transaction is created.

Creating Proxy Connections

A user, say jeff, has to connect to the database through another user, say scott. The proxy user, scott, should have an active authenticated connection. A proxy session is then created on this active connection, with the driver issuing a command to the server to create a session for the user, jeff. The server returns the new session id, and the driver sends a session switch command to switch to this new session.

The JDBC OCI and Thin driver switch sessions in the same manner. The drivers permanently switch to the new session, jeff. As a result, the proxy session, scott, is not available until the new session, jeff, is closed.

Note:

You can use the isProxySession method from the oracle.jdbc.OracleConnection interface to check if the current session associated with your connection is a proxy session. This method returns true if the current session associated with the connection is a proxy session.

A new proxy session is opened by using the following method from the oracle.jdbc.OracleConnection interface:

void openProxySession(int type, java.util.Properties prop) throws SQLExceptionOpens

Where,

type is the type of the proxy session and can have the following values:

  • OracleConnection.PROXYTYPE_USER_NAME

    This type is used for specifying the user name.

  • OracleConnection.PROXYTYPE_DISTINGUISHED_NAME

    This type is used for specifying the distinguished name of the user.

  • OracleConnection.PROXYTYPE_CERTIFICATE

    This type is used for specifying the proxy certificate.

prop is the property value of the proxy session and can have the following values:

  • PROXY_USER_NAME

    This property value should be used with the type OracleConnection.PROXYTYPE_USER_NAME. The value should be a java.lang.String.

  • PROXY_DISTINGUISHED_NAME

    This property value should be used with the type OracleConnection.PROXYTYPE_DISTINGUISHED_NAME. The value should be a java.lang.String.

  • PROXY_CERTIFICATE

    This property value should be used with the type OracleConnection.PROXYTYPE_CERTIFICATE. The value is a bytep[] array that contains the certificate.

  • PROXY_ROLES

    This property value can be used with the following types:

    • OracleConnection.PROXYTYPE_USER_NAME

    • OracleConnection.PROXYTYPE_DISTINGUISHED_NAME

    • OracleConnection.PROXYTYPE_CERTIFICATE

    The value should be a java.lang.String.

  • PROXY_SESSION

    This property value is used with the close method to close the proxy session.

  • PROXY_USER_PASSWORD

    This property value should be used with the type OracleConnection.PROXYTYPE_USER_NAME. The value should be a java.lang.String.

The following code snippet shows the use of the openProxySession method:

    java.util.Properties prop = new java.util.Properties();
    prop.put(OracleConnection.PROXY_USER_NAME, "jeff");
    String[] roles = {"role1", "role2"};
    prop.put(OracleConnection.PROXY_ROLES, roles);
    conn.openProxySession(OracleConnection.PROXYTYPE_USER_NAME, prop);
    

Closing a Proxy Session

You can close the proxy session opened with the OracleConnection.openProxySession method by passing the OracleConnection.PROXY_SESSION parameter to the OracleConnection.close method in the following way:

OracleConnection.close(OracleConnection.PROXY_SESSION);

This is similar to closing a proxy session on a non-cached connection. The standard close method must be called explicitly to close the connection itself. If the close method is called directly, without closing the proxy session, then both the proxy session and the connection are closed. This can be achieved in the following way:

OracleConnection.close(OracleConnection.INVALID_CONNECTION);

Caching Proxy Connections

Proxy connections, like standard connections, can be cached. Caching proxy connections enhances the performance. To cache a proxy connection, you need to create a connection using one of the getConnection methods on a cache enabled OracleDataSource object.

A proxy connection may be cached in the connection cache using the connection attributes feature of the connection cache. Connection attributes are name/value pairs that are user-defined and help tag a connection before returning it to the connection cache for reuse. When the tagged connection is retrieved, it can be directly used without having to do a round-trip to create or close a proxy session. Implicit connection cache supports caching of any user/password authenticated connection. Therefore, any user authenticated proxy connection can be cached and retrieved.

It is recommended that proxy connections should not be closed without applying the connection attributes. If a proxy connection is closed without applying the connection attributes, the connection is returned to the connection cache for reuse, but cannot be retrieved. The connection caching mechanism does not remember or reset session state.

A proxy connection can be removed from the connection cache by closing the connection directly.