/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/meta/ |
H A D | IDFFMetaCache.java | 63 * @param entityID the entity descriptor identifier. 68 String realm, String entityID) 71 String cacheKey = buildCacheKey(realm, entityID); 90 * @param entityID entity descriptor identifier. 94 public static void setEntityDescriptor(String realm, String entityID, argument 96 String cacheKey = buildCacheKey(realm, entityID); 109 * @param entityID the entity config identifier. 114 String realm, String entityID) { 116 String cacheKey = buildCacheKey(realm, entityID); 134 * @param entityID I 67 getEntityDescriptor( String realm, String entityID) argument 113 getEntityConfig( String realm, String entityID) argument 137 setEntityConfig(String realm, String entityID, EntityConfigElement entityConfig) argument 162 setMetaAliasEntityMapping(String metaAlias, String entityID) argument [all...] |
H A D | IDFFMetaSecurityUtils.java | 137 * @param entityID ID of the entity to be updated. 152 String entityID, String certAlias, boolean isSigning, boolean isIDP, 156 metaManager.getEntityConfig(realm, entityID); 158 String[] args = {entityID, realm}; 162 realm, entityID); 169 String[] args = {entityID, realm}; 207 String[] args = {entityID, realm}; 151 updateProviderKeyInfo(String realm, String entityID, String certAlias, boolean isSigning, boolean isIDP, String encAlgo, int keySize) argument
|
H A D | IDFFMetaManager.java | 234 * @param entityID identifier of the entity to be retrieved. 240 String realm, String entityID) 247 if (entityID != null) { 251 String[] args = { entityID, realm }; 255 realm, entityID); 260 realm, entityID); 273 realm, entityID, entityDescriptor); 276 + " meta value for : " + entityID); 320 String entityID = entityDescriptor.getProviderID(); 324 String[] args = { entityID, real 239 getEntityDescriptor( String realm, String entityID) argument 363 deleteEntityDescriptor(String realm, String entityID) argument 464 getSPDescriptor(String realm, String entityID) argument 482 getIDPDescriptor(String realm, String entityID) argument 502 getAffiliationDescriptor( String realm, String entityID) argument 606 getEntityConfig(String realm, String entityID) argument 733 getSPDescriptorConfig( String realm, String entityID) argument 756 getIDPDescriptorConfig( String realm, String entityID) argument 779 getAffiliationDescriptorConfig(String realm, String entityID) argument 992 isTrustedProvider( String realm, String hostedEntityID, String entityID) argument 1352 isSameCircleOfTrust( BaseConfigType config, String realm, String entityID) argument 1457 addEntityToCOT(String realm, String entityID) argument 1479 removeEntityFromCOT(String realm, String entityID) argument [all...] |
/forgerock/openam/openam-cli/openam-cli-impl/src/main/java/com/sun/identity/federation/cli/ |
H A D | UpdateMetadataKeyInfo.java | 68 private String entityID; field in class:UpdateMetadataKeyInfo 105 entityID = getStringOptionValue(FedCLIConstants.ARGUMENT_ENTITY_ID); 140 String[] params = {realm, entityID, Objects.toString(spSigningAliases), Objects.toString(idpSigningAliases), 165 String[] args = {realm, entityID, Objects.toString(spSigningAliases), Objects.toString(idpSigningAliases), 185 metaManager.getEntityDescriptor(realm, entityID); 187 Object[] objs2 = {entityID, realm}; 195 realm, entityID, null, true, false, null, 0); 198 realm, entityID, new LinkedHashSet<>(spSigningAliases), true, false, null, 0); 204 realm, entityID, null, true, true, null, 0); 207 realm, entityID, ne [all...] |
H A D | CreateMetaDataTemplate.java | 70 private String entityID; field in class:CreateMetaDataTemplate 122 String[] params = {entityID, metadata,extendedData, 146 String[] args = {entityID, spec, e.getMessage()}; 197 entityID = getStringOptionValue(FedCLIConstants.ARGUMENT_ENTITY_ID); 321 if (entityID == null) { 322 entityID = host; 564 entityID, getWorkflowParamMap(), 611 entityID, getWorkflowParamMap(), 651 entityID, getWorkflowParamMap()); 690 entityID, getWorkflowParamMa [all...] |
/forgerock/openam/openam-federation/OpenFM/src/main/java/com/sun/identity/workflow/ |
H A D | CreateSAML2HostedProviderTemplate.java | 62 String entityID, 66 return createExtendedDataTemplate(entityID, mapParams, url, true); 70 String entityID, 84 " entityID=\"" + entityID + "\">\n\n"); 772 String entityID, 783 " entityID=\"" + entityID + "\">\n"); 61 createExtendedDataTemplate( String entityID, Map mapParams, String url ) argument 69 createExtendedDataTemplate( String entityID, Map mapParams, String url, boolean hosted ) argument 771 buildMetaDataTemplate( String entityID, Map mapParams, String url ) argument
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/meta/ |
H A D | IDFFMetaCache.java | 63 * @param entityID the entity descriptor identifier. 68 String realm, String entityID) 71 String cacheKey = buildCacheKey(realm, entityID); 90 * @param entityID entity descriptor identifier. 94 public static void setEntityDescriptor(String realm, String entityID, argument 96 String cacheKey = buildCacheKey(realm, entityID); 109 * @param entityID the entity config identifier. 114 String realm, String entityID) { 116 String cacheKey = buildCacheKey(realm, entityID); 134 * @param entityID I 67 getEntityDescriptor( String realm, String entityID) argument 113 getEntityConfig( String realm, String entityID) argument 137 setEntityConfig(String realm, String entityID, EntityConfigElement entityConfig) argument 162 setMetaAliasEntityMapping(String metaAlias, String entityID) argument [all...] |
H A D | IDFFMetaSecurityUtils.java | 137 * @param entityID ID of the entity to be updated. 152 String entityID, String certAlias, boolean isSigning, boolean isIDP, 156 metaManager.getEntityConfig(realm, entityID); 158 String[] args = {entityID, realm}; 162 realm, entityID); 169 String[] args = {entityID, realm}; 207 String[] args = {entityID, realm}; 151 updateProviderKeyInfo(String realm, String entityID, String certAlias, boolean isSigning, boolean isIDP, String encAlgo, int keySize) argument
|
H A D | IDFFMetaManager.java | 234 * @param entityID identifier of the entity to be retrieved. 240 String realm, String entityID) 247 if (entityID != null) { 251 String[] args = { entityID, realm }; 255 realm, entityID); 260 realm, entityID); 273 realm, entityID, entityDescriptor); 276 + " meta value for : " + entityID); 320 String entityID = entityDescriptor.getProviderID(); 324 String[] args = { entityID, real 239 getEntityDescriptor( String realm, String entityID) argument 363 deleteEntityDescriptor(String realm, String entityID) argument 464 getSPDescriptor(String realm, String entityID) argument 482 getIDPDescriptor(String realm, String entityID) argument 502 getAffiliationDescriptor( String realm, String entityID) argument 606 getEntityConfig(String realm, String entityID) argument 733 getSPDescriptorConfig( String realm, String entityID) argument 756 getIDPDescriptorConfig( String realm, String entityID) argument 779 getAffiliationDescriptorConfig(String realm, String entityID) argument 992 isTrustedProvider( String realm, String hostedEntityID, String entityID) argument 1352 isSameCircleOfTrust( BaseConfigType config, String realm, String entityID) argument 1457 addEntityToCOT(String realm, String entityID) argument 1479 removeEntityFromCOT(String realm, String entityID) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/key/ |
H A D | KeyUtil.java | 142 * @param entityID The entity ID. 146 public static Set<PrivateKey> getDecryptionKeys(String realm, String entityID, String role) { argument 147 return getDecryptionKeys(SAML2Utils.getEncryptionCertAliases(realm, entityID, role)); 202 * @param entityID Partner entity's ID. 206 public static Set<X509Certificate> getVerificationCerts(RoleDescriptorType roleDescriptor, String entityID, argument 211 String index = entityID.trim() + "|" + role; 222 "Null RoleDescriptorType input for entityID=" + 223 entityID + " in "+role+" role." 231 "No signing KeyDescriptor for entityID=" + 232 entityID 262 getEncInfo( RoleDescriptorType roled, String entityID, String role ) argument 472 getPEPVerificationCerts(XACMLAuthzDecisionQueryDescriptorElement pepDescriptor, String entityID) argument 536 getEncryptionInfo(KeyDescriptorType kd, String entityID, String role) argument 587 getPDPVerificationCerts(XACMLPDPDescriptorElement pdpDescriptor, String entityID) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/soapbinding/ |
H A D | QueryClient.java | 271 * @param entityID entity identifier. 276 private static Issuer createIssuer(String entityID) argument 279 issuer.setValue(entityID);
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/meta/ |
H A D | SAML2MetaSecurityUtils.java | 451 * @param entityID ID of the entity to be updated. 466 String entityID, Set<String> certAliases, boolean isSigning, boolean isIDP, 470 metaManager.getEntityConfig(realm, entityID); 472 String[] args = {entityID, realm}; 475 EntityDescriptorElement desp = metaManager.getEntityDescriptor(realm, entityID); 482 String[] args = {entityID, realm}; 489 String[] args = {entityID, realm}; 465 updateProviderKeyInfo(String realm, String entityID, Set<String> certAliases, boolean isSigning, boolean isIDP, String encAlgo, int keySize) argument
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | NameIDMapping.java | 467 String entityID, String role) throws SAML2Exception { 472 roled = metaManager.getSPSSODescriptor(realm, entityID); 474 roled = metaManager.getIDPSSODescriptor(realm, entityID); 477 EncInfo encInfo = KeyUtil.getEncInfo(roled, entityID, role); 486 entityID); 466 getEncryptedID(NameID nameID, String realm, String entityID, String role) argument
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/wsfederation/meta/ |
H A D | WSFederationMetaSecurityUtils.java | 453 * @param entityID ID of the entity to be updated. 462 String entityID, String certAlias, boolean isIDP) 466 metaManager.getEntityConfig(realm, entityID); 468 String[] args = {entityID, realm}; 472 metaManager.getEntityDescriptor(realm, entityID); 475 metaManager.getIDPSSOConfig(realm, entityID); 477 String[] args = {entityID, realm}; 497 metaManager.getSPSSOConfig(realm, entityID); 499 String[] args = {entityID, realm}; 461 updateProviderKeyInfo(String realm, String entityID, String certAlias, boolean isIDP) argument
|
/forgerock/openam-v13/openam-cli/openam-cli-impl/src/main/java/com/sun/identity/federation/cli/ |
H A D | CreateMetaDataTemplate.java | 70 private String entityID; field in class:CreateMetaDataTemplate 122 String[] params = {entityID, metadata,extendedData, 146 String[] args = {entityID, spec, e.getMessage()}; 197 entityID = getStringOptionValue(FedCLIConstants.ARGUMENT_ENTITY_ID); 321 if (entityID == null) { 322 entityID = host; 564 entityID, getWorkflowParamMap(), 611 entityID, getWorkflowParamMap(), 651 entityID, getWorkflowParamMap()); 690 entityID, getWorkflowParamMa [all...] |
/forgerock/openam-v13/openam-console/src/main/java/com/sun/identity/console/federation/model/ |
H A D | EntityModelImpl.java | 312 private void deleteSAMLv2Entity(String entityID, String realm) argument 317 metaManager.deleteEntityDescriptor(realm, entityID); 323 private void deleteIDFFEntity(String entityID, String realm) argument 329 metaManager.deleteEntityDescriptor(realm, entityID); 336 private void deleteWSFedEntity(String entityID, String realm) argument 341 realm, entityID);
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/cot/ |
H A D | CircleOfTrustDescriptor.java | 508 * @param entityID the entity id of a provider . 510 * @return true if the set did not already contain the entityID. 512 public boolean add(String entityID, String protocol) throws COTException { argument 518 || !((Set) trustedProviderMap.get(protocol)).contains(entityID)) { 523 boolean result = ret.add(entityID + COTConstants.DELIMITER 536 * @param entityID The entity id of a provider. 538 * @return true if the set contained the entityID. 540 public boolean remove(String entityID, String protocol) { argument 546 !((Set) trustedProviderMap.get(protocol)).contains(entityID)) { 553 boolean result = ret.remove(entityID [all...] |
H A D | CircleOfTrustManager.java | 421 * @param entityID the entity identifier. 426 String entityID) throws COTException,JAXBException { 430 realm,cotName,entityID); 437 realm,cotName,entityID); 444 realm,cotName, entityID); 460 * @param entityID the entity identifier to be updated. 468 String entityID 473 realm, cotName,entityID); 480 realm,cotName, entityID); 487 (realm, cotName, entityID); 425 updateEntityConfig(String realm, String cotName, String protocolType, String entityID) argument [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/common/ |
H A D | FSUtils.java | 142 * @param entityID the entity ID of the source site 145 public static String generateSourceID(String entityID) { argument 153 char chars[] = entityID.toCharArray();
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/logout/ |
H A D | FSLogoutUtil.java | 384 * @param entityID the provider Id to whom logout notification needs to 391 String entityID, 402 realm, entityID); 427 "Account. No Affiliation for:" + entityID, ex); 431 accountInst.readAccountFedInfo(userID, entityID); 759 ", entityID : " + hostedEntityId); 389 getCurrentWorkingAccount( String userID, String entityID, String metaAlias) argument
|
/forgerock/openam/openam-console/src/main/java/com/sun/identity/console/federation/model/ |
H A D | EntityModelImpl.java | 312 private void deleteSAMLv2Entity(String entityID, String realm) argument 317 metaManager.deleteEntityDescriptor(realm, entityID); 323 private void deleteIDFFEntity(String entityID, String realm) argument 329 metaManager.deleteEntityDescriptor(realm, entityID); 336 private void deleteWSFedEntity(String entityID, String realm) argument 341 realm, entityID);
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/cot/ |
H A D | CircleOfTrustDescriptor.java | 508 * @param entityID the entity id of a provider . 510 * @return true if the set did not already contain the entityID. 512 public boolean add(String entityID, String protocol) throws COTException { argument 518 || !((Set) trustedProviderMap.get(protocol)).contains(entityID)) { 523 boolean result = ret.add(entityID + COTConstants.DELIMITER 536 * @param entityID The entity id of a provider. 538 * @return true if the set contained the entityID. 540 public boolean remove(String entityID, String protocol) { argument 546 !((Set) trustedProviderMap.get(protocol)).contains(entityID)) { 553 boolean result = ret.remove(entityID [all...] |
H A D | CircleOfTrustManager.java | 422 * @param entityID the entity identifier. 427 String entityID) throws COTException,JAXBException { 431 realm,cotName,entityID); 438 realm,cotName,entityID); 445 realm,cotName, entityID); 461 * @param entityID the entity identifier to be updated. 469 String entityID 474 realm, cotName,entityID); 481 realm,cotName, entityID); 488 (realm, cotName, entityID); 426 updateEntityConfig(String realm, String cotName, String protocolType, String entityID) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/common/ |
H A D | FSUtils.java | 142 * @param entityID the entity ID of the source site 145 public static String generateSourceID(String entityID) { argument 153 char chars[] = entityID.toCharArray();
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/logout/ |
H A D | FSLogoutUtil.java | 384 * @param entityID the provider Id to whom logout notification needs to 391 String entityID, 402 realm, entityID); 427 "Account. No Affiliation for:" + entityID, ex); 431 accountInst.readAccountFedInfo(userID, entityID); 759 ", entityID : " + hostedEntityId); 389 getCurrentWorkingAccount( String userID, String entityID, String metaAlias) argument
|