Searched defs:adminUserSSOToken (Results 1 - 2 of 2) sorted by relevance
/forgerock/openam-v13/openam-federation/OpenFM/src/test/java/com/sun/identity/policy/ |
H A D | PolicyWildcardTest.java | 81 private SSOToken adminUserSSOToken; field in class:PolicyWildcardTest 96 adminUserSSOToken = Util.datastoreLogin(TEST_ADMIN_USER_NAME, TEST_ADMIN_USER_NAME, REALM); 122 SSOTokenManager.getInstance().destroyToken(adminUserSSOToken); 161 Assert.assertTrue(pe.isAllowed(adminUserSSOToken, URL_ADMIN_USER_TEST1, Util.GET_ACTION), "Expecting " + URL_ADMIN_USER_TEST1 + " to be allowed."); 168 Assert.assertTrue(pe.isAllowed(adminUserSSOToken, URL_ADMIN_USER_TEST2, Util.GET_ACTION), "Expecting " + URL_ADMIN_USER_TEST2 + " to be allowed."); 175 Assert.assertTrue(pe.isAllowed(adminUserSSOToken, URL_ADMIN_USER_TEST3, Util.GET_ACTION), "Expecting " + URL_ADMIN_USER_TEST3 + " to be allowed.");
|
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/policy/ |
H A D | PolicyWildcardTest.java | 81 private SSOToken adminUserSSOToken; field in class:PolicyWildcardTest 96 adminUserSSOToken = Util.datastoreLogin(TEST_ADMIN_USER_NAME, TEST_ADMIN_USER_NAME, REALM); 122 SSOTokenManager.getInstance().destroyToken(adminUserSSOToken); 161 Assert.assertTrue(pe.isAllowed(adminUserSSOToken, URL_ADMIN_USER_TEST1, Util.GET_ACTION), "Expecting " + URL_ADMIN_USER_TEST1 + " to be allowed."); 168 Assert.assertTrue(pe.isAllowed(adminUserSSOToken, URL_ADMIN_USER_TEST2, Util.GET_ACTION), "Expecting " + URL_ADMIN_USER_TEST2 + " to be allowed."); 175 Assert.assertTrue(pe.isAllowed(adminUserSSOToken, URL_ADMIN_USER_TEST3, Util.GET_ACTION), "Expecting " + URL_ADMIN_USER_TEST3 + " to be allowed.");
|
Completed in 28 milliseconds