Added max length password policy. Added boolean value to force users update their not valid password.
This commit is contained in:
		
							parent
							
								
									6c191fd97a
								
							
						
					
					
						commit
						82f89de365
					
				@ -178,7 +178,7 @@ public class ThingsboardErrorResponseHandler extends ResponseEntityExceptionHand
 | 
			
		||||
    private void handleAuthenticationException(AuthenticationException authenticationException, HttpServletResponse response) throws IOException {
 | 
			
		||||
        response.setStatus(HttpStatus.UNAUTHORIZED.value());
 | 
			
		||||
        if (authenticationException instanceof BadCredentialsException || authenticationException instanceof UsernameNotFoundException) {
 | 
			
		||||
            JacksonUtil.writeValue(response.getWriter(), ThingsboardErrorResponse.of("Invalid username or password", ThingsboardErrorCode.AUTHENTICATION, HttpStatus.UNAUTHORIZED));
 | 
			
		||||
            JacksonUtil.writeValue(response.getWriter(), ThingsboardErrorResponse.of(authenticationException.getMessage().isEmpty() ? "Invalid username or password" : authenticationException.getMessage(), ThingsboardErrorCode.AUTHENTICATION, HttpStatus.UNAUTHORIZED));
 | 
			
		||||
        } else if (authenticationException instanceof DisabledException) {
 | 
			
		||||
            JacksonUtil.writeValue(response.getWriter(), ThingsboardErrorResponse.of("User account is not active", ThingsboardErrorCode.AUTHENTICATION, HttpStatus.UNAUTHORIZED));
 | 
			
		||||
        } else if (authenticationException instanceof LockedException) {
 | 
			
		||||
 | 
			
		||||
@ -107,6 +107,7 @@ public class DefaultSystemSecurityService implements SystemSecurityService {
 | 
			
		||||
            securitySettings = new SecuritySettings();
 | 
			
		||||
            securitySettings.setPasswordPolicy(new UserPasswordPolicy());
 | 
			
		||||
            securitySettings.getPasswordPolicy().setMinimumLength(6);
 | 
			
		||||
            securitySettings.getPasswordPolicy().setMaximumLength(72);
 | 
			
		||||
        }
 | 
			
		||||
        return securitySettings;
 | 
			
		||||
    }
 | 
			
		||||
@ -131,9 +132,18 @@ public class DefaultSystemSecurityService implements SystemSecurityService {
 | 
			
		||||
 | 
			
		||||
    @Override
 | 
			
		||||
    public void validateUserCredentials(TenantId tenantId, UserCredentials userCredentials, String username, String password) throws AuthenticationException {
 | 
			
		||||
        SecuritySettings securitySettings = self.getSecuritySettings(tenantId);
 | 
			
		||||
        UserPasswordPolicy passwordPolicy = securitySettings.getPasswordPolicy();
 | 
			
		||||
 | 
			
		||||
        if (passwordPolicy.getForceUserToResetPasswordIfNotValid()) {
 | 
			
		||||
            try {
 | 
			
		||||
                validatePasswordByPolicy(password, passwordPolicy);
 | 
			
		||||
            } catch (DataValidationException e) {
 | 
			
		||||
                throw new BadCredentialsException("Password does not pass validation. Please try again or reset password to valid one.");
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        if (!encoder.matches(password, userCredentials.getPassword())) {
 | 
			
		||||
            int failedLoginAttempts = userService.increaseFailedLoginAttempts(tenantId, userCredentials.getUserId());
 | 
			
		||||
            SecuritySettings securitySettings = self.getSecuritySettings(tenantId);
 | 
			
		||||
            if (securitySettings.getMaxFailedLoginAttempts() != null && securitySettings.getMaxFailedLoginAttempts() > 0) {
 | 
			
		||||
                if (failedLoginAttempts > securitySettings.getMaxFailedLoginAttempts() && userCredentials.isEnabled()) {
 | 
			
		||||
                    lockAccount(userCredentials.getUserId(), username, securitySettings.getUserLockoutNotificationEmail(), securitySettings.getMaxFailedLoginAttempts());
 | 
			
		||||
@ -149,7 +159,6 @@ public class DefaultSystemSecurityService implements SystemSecurityService {
 | 
			
		||||
 | 
			
		||||
        userService.resetFailedLoginAttempts(tenantId, userCredentials.getUserId());
 | 
			
		||||
 | 
			
		||||
        SecuritySettings securitySettings = self.getSecuritySettings(tenantId);
 | 
			
		||||
        if (isPositiveInteger(securitySettings.getPasswordPolicy().getPasswordExpirationPeriodDays())) {
 | 
			
		||||
            if ((userCredentials.getCreatedTime()
 | 
			
		||||
                    + TimeUnit.DAYS.toMillis(securitySettings.getPasswordPolicy().getPasswordExpirationPeriodDays()))
 | 
			
		||||
@ -199,8 +208,26 @@ public class DefaultSystemSecurityService implements SystemSecurityService {
 | 
			
		||||
        SecuritySettings securitySettings = self.getSecuritySettings(tenantId);
 | 
			
		||||
        UserPasswordPolicy passwordPolicy = securitySettings.getPasswordPolicy();
 | 
			
		||||
 | 
			
		||||
        validatePasswordByPolicy(password, passwordPolicy);
 | 
			
		||||
 | 
			
		||||
        if (userCredentials != null && isPositiveInteger(passwordPolicy.getPasswordReuseFrequencyDays())) {
 | 
			
		||||
            long passwordReuseFrequencyTs = System.currentTimeMillis() - TimeUnit.DAYS.toMillis(passwordPolicy.getPasswordReuseFrequencyDays());
 | 
			
		||||
            JsonNode additionalInfo = userCredentials.getAdditionalInfo();
 | 
			
		||||
            if (additionalInfo instanceof ObjectNode && additionalInfo.has(UserServiceImpl.USER_PASSWORD_HISTORY)) {
 | 
			
		||||
                JsonNode userPasswordHistoryJson = additionalInfo.get(UserServiceImpl.USER_PASSWORD_HISTORY);
 | 
			
		||||
                Map<String, String> userPasswordHistoryMap = JacksonUtil.convertValue(userPasswordHistoryJson, new TypeReference<>() {});
 | 
			
		||||
                for (Map.Entry<String, String> entry : userPasswordHistoryMap.entrySet()) {
 | 
			
		||||
                    if (encoder.matches(password, entry.getValue()) && Long.parseLong(entry.getKey()) > passwordReuseFrequencyTs) {
 | 
			
		||||
                        throw new DataValidationException("Password was already used for the last " + passwordPolicy.getPasswordReuseFrequencyDays() + " days");
 | 
			
		||||
                    }
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    private void validatePasswordByPolicy(String password, UserPasswordPolicy passwordPolicy) {
 | 
			
		||||
        List<Rule> passwordRules = new ArrayList<>();
 | 
			
		||||
        passwordRules.add(new LengthRule(passwordPolicy.getMinimumLength(), Integer.MAX_VALUE));
 | 
			
		||||
        passwordRules.add(new LengthRule(passwordPolicy.getMinimumLength(), passwordPolicy.getMaximumLength()));
 | 
			
		||||
        if (isPositiveInteger(passwordPolicy.getMinimumUppercaseLetters())) {
 | 
			
		||||
            passwordRules.add(new CharacterRule(EnglishCharacterData.UpperCase, passwordPolicy.getMinimumUppercaseLetters()));
 | 
			
		||||
        }
 | 
			
		||||
@ -223,21 +250,6 @@ public class DefaultSystemSecurityService implements SystemSecurityService {
 | 
			
		||||
            String message = String.join("\n", validator.getMessages(result));
 | 
			
		||||
            throw new DataValidationException(message);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (userCredentials != null && isPositiveInteger(passwordPolicy.getPasswordReuseFrequencyDays())) {
 | 
			
		||||
            long passwordReuseFrequencyTs = System.currentTimeMillis() - TimeUnit.DAYS.toMillis(passwordPolicy.getPasswordReuseFrequencyDays());
 | 
			
		||||
            JsonNode additionalInfo = userCredentials.getAdditionalInfo();
 | 
			
		||||
            if (additionalInfo instanceof ObjectNode && additionalInfo.has(UserServiceImpl.USER_PASSWORD_HISTORY)) {
 | 
			
		||||
                JsonNode userPasswordHistoryJson = additionalInfo.get(UserServiceImpl.USER_PASSWORD_HISTORY);
 | 
			
		||||
                Map<String, String> userPasswordHistoryMap = JacksonUtil.convertValue(userPasswordHistoryJson, new TypeReference<>() {});
 | 
			
		||||
                for (Map.Entry<String, String> entry : userPasswordHistoryMap.entrySet()) {
 | 
			
		||||
                    if (encoder.matches(password, entry.getValue()) && Long.parseLong(entry.getKey()) > passwordReuseFrequencyTs) {
 | 
			
		||||
                        throw new DataValidationException("Password was already used for the last " + passwordPolicy.getPasswordReuseFrequencyDays() + " days");
 | 
			
		||||
                    }
 | 
			
		||||
                }
 | 
			
		||||
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    @Override
 | 
			
		||||
 | 
			
		||||
@ -15,19 +15,41 @@
 | 
			
		||||
 */
 | 
			
		||||
package org.thingsboard.server.controller;
 | 
			
		||||
 | 
			
		||||
import com.fasterxml.jackson.databind.JsonNode;
 | 
			
		||||
import org.junit.After;
 | 
			
		||||
import org.junit.Test;
 | 
			
		||||
import org.mockito.Mockito;
 | 
			
		||||
import org.springframework.http.HttpHeaders;
 | 
			
		||||
import org.testcontainers.shaded.org.apache.commons.lang3.RandomStringUtils;
 | 
			
		||||
import org.thingsboard.common.util.JacksonUtil;
 | 
			
		||||
import org.thingsboard.server.common.data.security.Authority;
 | 
			
		||||
import org.thingsboard.server.common.data.security.model.SecuritySettings;
 | 
			
		||||
import org.thingsboard.server.dao.service.DaoSqlTest;
 | 
			
		||||
import org.thingsboard.server.service.security.auth.rest.LoginRequest;
 | 
			
		||||
import org.thingsboard.server.service.security.model.ChangePasswordRequest;
 | 
			
		||||
 | 
			
		||||
import java.util.concurrent.TimeUnit;
 | 
			
		||||
 | 
			
		||||
import static org.hamcrest.Matchers.is;
 | 
			
		||||
import static org.mockito.ArgumentMatchers.anyString;
 | 
			
		||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.header;
 | 
			
		||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.jsonPath;
 | 
			
		||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
 | 
			
		||||
 | 
			
		||||
@DaoSqlTest
 | 
			
		||||
public class AuthControllerTest extends AbstractControllerTest {
 | 
			
		||||
 | 
			
		||||
    @After
 | 
			
		||||
    public void tearDown() throws Exception {
 | 
			
		||||
        loginSysAdmin();
 | 
			
		||||
        SecuritySettings securitySettings = doGet("/api/admin/securitySettings", SecuritySettings.class);
 | 
			
		||||
 | 
			
		||||
        securitySettings.getPasswordPolicy().setMaximumLength(72);
 | 
			
		||||
        securitySettings.getPasswordPolicy().setForceUserToResetPasswordIfNotValid(false);
 | 
			
		||||
 | 
			
		||||
        doPost("/api/admin/securitySettings", securitySettings).andExpect(status().isOk());
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    @Test
 | 
			
		||||
    public void testGetUser() throws Exception {
 | 
			
		||||
        
 | 
			
		||||
@ -84,4 +106,65 @@ public class AuthControllerTest extends AbstractControllerTest {
 | 
			
		||||
                .andExpect(jsonPath("$.authority",is(Authority.SYS_ADMIN.name())))
 | 
			
		||||
                .andExpect(jsonPath("$.email",is(SYS_ADMIN_EMAIL)));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    @Test
 | 
			
		||||
    public void testShouldNotUpdatePasswordWithValueLongerThanDefaultLimit() throws Exception {
 | 
			
		||||
        loginTenantAdmin();
 | 
			
		||||
        ChangePasswordRequest changePasswordRequest = new ChangePasswordRequest();
 | 
			
		||||
        changePasswordRequest.setCurrentPassword("tenant");
 | 
			
		||||
        changePasswordRequest.setNewPassword(RandomStringUtils.randomAlphanumeric(73));
 | 
			
		||||
        doPost("/api/auth/changePassword", changePasswordRequest)
 | 
			
		||||
                .andExpect(status().isBadRequest())
 | 
			
		||||
                .andExpect(jsonPath("$.message", is("Password must be no more than 72 characters in length.")));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    @Test
 | 
			
		||||
    public void testShouldNotAuthorizeUserIfHisPasswordBecameTooLong() throws Exception {
 | 
			
		||||
        loginTenantAdmin();
 | 
			
		||||
 | 
			
		||||
        ChangePasswordRequest changePasswordRequest = new ChangePasswordRequest();
 | 
			
		||||
        changePasswordRequest.setCurrentPassword("tenant");
 | 
			
		||||
        String newPassword = RandomStringUtils.randomAlphanumeric(16);
 | 
			
		||||
        changePasswordRequest.setNewPassword(newPassword);
 | 
			
		||||
        doPost("/api/auth/changePassword", changePasswordRequest)
 | 
			
		||||
                .andExpect(status().isOk());
 | 
			
		||||
        loginUser(TENANT_ADMIN_EMAIL, newPassword);
 | 
			
		||||
 | 
			
		||||
        loginSysAdmin();
 | 
			
		||||
        SecuritySettings securitySettings = doGet("/api/admin/securitySettings", SecuritySettings.class);
 | 
			
		||||
        securitySettings.getPasswordPolicy().setMaximumLength(15);
 | 
			
		||||
        securitySettings.getPasswordPolicy().setForceUserToResetPasswordIfNotValid(true);
 | 
			
		||||
        doPost("/api/admin/securitySettings", securitySettings).andExpect(status().isOk());
 | 
			
		||||
 | 
			
		||||
        //try to login with user password that is not valid after security settings was updated
 | 
			
		||||
        doPost("/api/auth/login", new LoginRequest(TENANT_ADMIN_EMAIL, newPassword))
 | 
			
		||||
                .andExpect(status().isUnauthorized())
 | 
			
		||||
                .andExpect(jsonPath("$.message", is("Password does not pass validation. Please try again or reset password to valid one.")));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    @Test
 | 
			
		||||
    public void testShouldNotResetPasswordToTooLongValue() throws Exception {
 | 
			
		||||
        loginTenantAdmin();
 | 
			
		||||
 | 
			
		||||
        JsonNode resetPasswordByEmailRequest = JacksonUtil.newObjectNode()
 | 
			
		||||
                .put("email", TENANT_ADMIN_EMAIL);
 | 
			
		||||
 | 
			
		||||
        doPost("/api/noauth/resetPasswordByEmail", resetPasswordByEmailRequest)
 | 
			
		||||
                .andExpect(status().isOk());
 | 
			
		||||
        Thread.sleep(1000);
 | 
			
		||||
        doGet("/api/noauth/resetPassword?resetToken={resetToken}", this.currentResetPasswordToken)
 | 
			
		||||
                .andExpect(status().isSeeOther())
 | 
			
		||||
                .andExpect(header().string(HttpHeaders.LOCATION, "/login/resetPassword?resetToken=" + this.currentResetPasswordToken));
 | 
			
		||||
 | 
			
		||||
        String newPassword = RandomStringUtils.randomAlphanumeric(73);
 | 
			
		||||
        JsonNode resetPasswordRequest = JacksonUtil.newObjectNode()
 | 
			
		||||
                .put("resetToken", this.currentResetPasswordToken)
 | 
			
		||||
                .put("password", newPassword);
 | 
			
		||||
 | 
			
		||||
        Mockito.doNothing().when(mailService).sendPasswordWasResetEmail(anyString(), anyString());
 | 
			
		||||
        doPost("/api/noauth/resetPassword", resetPasswordRequest)
 | 
			
		||||
                        .andExpect(status().isBadRequest())
 | 
			
		||||
                        .andExpect(jsonPath("$.message",
 | 
			
		||||
                                is("Password must be no more than 72 characters in length.")));
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -27,6 +27,8 @@ public class UserPasswordPolicy implements Serializable {
 | 
			
		||||
 | 
			
		||||
    @ApiModelProperty(position = 1, value = "Minimum number of symbols in the password." )
 | 
			
		||||
    private Integer minimumLength;
 | 
			
		||||
    @ApiModelProperty(position = 1, value = "Maximum number of symbols in the password." )
 | 
			
		||||
    private Integer maximumLength;
 | 
			
		||||
    @ApiModelProperty(position = 1, value = "Minimum number of uppercase letters in the password." )
 | 
			
		||||
    private Integer minimumUppercaseLetters;
 | 
			
		||||
    @ApiModelProperty(position = 1, value = "Minimum number of lowercase letters in the password." )
 | 
			
		||||
@ -37,6 +39,8 @@ public class UserPasswordPolicy implements Serializable {
 | 
			
		||||
    private Integer minimumSpecialCharacters;
 | 
			
		||||
    @ApiModelProperty(position = 1, value = "Allow whitespaces")
 | 
			
		||||
    private Boolean allowWhitespaces = true;
 | 
			
		||||
    @ApiModelProperty(position = 1, value = "Force user to update password if existing one does not pass validation")
 | 
			
		||||
    private Boolean forceUserToResetPasswordIfNotValid = false;
 | 
			
		||||
 | 
			
		||||
    @ApiModelProperty(position = 1, value = "Password expiration period (days). Force expiration of the password." )
 | 
			
		||||
    private Integer passwordExpirationPeriodDays;
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user