/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/wsfederation/common/ |
H A D | WSFederationUtils.java | 384 String idpEntityId = (String) 396 realm, idpEntityId, null, wreply, null, null, 498 * @param idpEntityId The WS-Fed IdP (IP) entity ID. 507 public static SAML11RequestedSecurityToken createSAML11Token(String realm, String idpEntityId, String spEntityId, argument 510 final IDPSSOConfigElement idpConfig = metaManager.getIDPSSOConfig(realm, idpEntityId); 512 debug.error("Cannot find configuration for IdP " + idpEntityId); 526 List attributes = attrMapper.getAttributes(session, idpEntityId, spEntityId, realm); 539 NameIdentifier nameIdentifier = accountMapper.getNameID(session, realm, idpEntityId, spEntityId); 561 return new SAML11RequestedSecurityToken(realm, spTokenIssuerName, idpEntityId,
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | SPACSUtils.java | 2091 String spEntityId, SAML2MetaManager metaManager, String idpEntityId, 2147 && acctMapper.shouldPersistNameIDFormat(realm, spEntityId, idpEntityId, nameIDFormat)); 2156 nameId, spEntityId, idpEntityId, realm, SAML2Constants.SP_ROLE)); 2174 writeFedData(nameId, spEntityId, realm, metaManager, idpEntityId, userName, storageKey); 2184 String idpEntityId, String userName, String storageKey) throws SAML2Exception { 2199 info = new NameIDInfo(affiID, idpEntityId, nameId, SAML2Constants.DUAL_ROLE, true); 2201 info = new NameIDInfo(affiID, idpEntityId, nameId, SAML2Constants.SP_ROLE, true); 2205 info = new NameIDInfo(spEntityId, idpEntityId, nameId, SAML2Constants.DUAL_ROLE, false); 2207 info = new NameIDInfo(spEntityId, idpEntityId, nameId, SAML2Constants.SP_ROLE, false); 2090 getPrincipalWithoutLogin(Subject assertionSubject, Assertion authnAssertion, String realm, String spEntityId, SAML2MetaManager metaManager, String idpEntityId, String storageKey) argument 2183 writeFedData(NameID nameId, String spEntityId, String realm, SAML2MetaManager metaManager, String idpEntityId, String userName, String storageKey) argument
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/ |
H A D | FSSessionManager.java | 283 * @param idpEntityId identity provider's entity ID to be set 287 String idpEntityId) 290 idDestnMap.put (requestID, idpEntityId); 285 setIDPEntityID( String requestID, String idpEntityId) argument
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/ |
H A D | FSSessionManager.java | 286 * @param idpEntityId identity provider's entity ID to be set 290 String idpEntityId) 293 idDestnMap.put (requestID, idpEntityId); 288 setIDPEntityID( String requestID, String idpEntityId) argument
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | SPACSUtils.java | 2072 String spEntityId, SAML2MetaManager metaManager, String idpEntityId, 2125 && acctMapper.shouldPersistNameIDFormat(realm, spEntityId, idpEntityId, nameIDFormat); 2134 nameId, spEntityId, idpEntityId, realm, SAML2Constants.SP_ROLE)); 2152 writeFedData(nameId, spEntityId, realm, metaManager, idpEntityId, userName, storageKey); 2162 String idpEntityId, String userName, String storageKey) throws SAML2Exception { 2177 info = new NameIDInfo(affiID, idpEntityId, nameId, SAML2Constants.DUAL_ROLE, true); 2179 info = new NameIDInfo(affiID, idpEntityId, nameId, SAML2Constants.SP_ROLE, true); 2183 info = new NameIDInfo(spEntityId, idpEntityId, nameId, SAML2Constants.DUAL_ROLE, false); 2185 info = new NameIDInfo(spEntityId, idpEntityId, nameId, SAML2Constants.SP_ROLE, false); 2071 getPrincipalWithoutLogin(Subject assertionSubject, Assertion authnAssertion, String realm, String spEntityId, SAML2MetaManager metaManager, String idpEntityId, String storageKey) argument 2161 writeFedData(NameID nameId, String spEntityId, String realm, SAML2MetaManager metaManager, String idpEntityId, String userName, String storageKey) argument
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/fednsso/ |
H A D | FSAssertionArtifactHandler.java | 122 protected String idpEntityId = null; field in class:FSAssertionArtifactHandler 256 * @param idpEntityId entity ID of the <code>IDP</code> 265 String idpEntityId, 275 this.idpEntityId = idpEntityId; 286 * @param idpEntityId entity ID of the <code>IDP</code> 295 String idpEntityId, 305 this.idpEntityId = idpEntityId; 695 if (idpEntityId ! 261 FSAssertionArtifactHandler( HttpServletRequest request, HttpServletResponse response, IDPDescriptorType idpDescriptor, String idpEntityId, boolean doFederate, String nameIDPolicy, String relayState ) argument 291 FSAssertionArtifactHandler( HttpServletRequest request, HttpServletResponse response, IDPDescriptorType idpDescriptor, String idpEntityId, FSAuthnRequest authnRequest, boolean doFederate, String relayState ) argument 1825 setProviderEntityId(String idpEntityId) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/fednsso/ |
H A D | FSAssertionArtifactHandler.java | 124 protected String idpEntityId = null; field in class:FSAssertionArtifactHandler 258 * @param idpEntityId entity ID of the <code>IDP</code> 267 String idpEntityId, 277 this.idpEntityId = idpEntityId; 288 * @param idpEntityId entity ID of the <code>IDP</code> 297 String idpEntityId, 307 this.idpEntityId = idpEntityId; 697 if (idpEntityId ! 263 FSAssertionArtifactHandler( HttpServletRequest request, HttpServletResponse response, IDPDescriptorType idpDescriptor, String idpEntityId, boolean doFederate, String nameIDPolicy, String relayState ) argument 293 FSAssertionArtifactHandler( HttpServletRequest request, HttpServletResponse response, IDPDescriptorType idpDescriptor, String idpEntityId, FSAuthnRequest authnRequest, boolean doFederate, String relayState ) argument 1827 setProviderEntityId(String idpEntityId) argument [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/common/ |
H A D | SAML2Utils.java | 363 String idpEntityId = null; 378 idpEntityId = respIssuer.getValue(); 436 idpSSODescriptor = saml2MetaManager.getIDPSSODescriptor(orgName, idpEntityId); 438 String[] data = { orgName, idpEntityId }; 443 Set<X509Certificate> verificationCerts = KeyUtil.getVerificationCerts(idpSSODescriptor, idpEntityId, 447 String[] data = { orgName, hostEntityId, idpEntityId }; 452 String[] data = { idpEntityId }; 525 if (idpEntityId == null) { 526 idpEntityId = issuer.getValue(); 528 if (!idpEntityId 873 fillMap(final List authnStmts, final Subject subject, final Assertion assertion, final List assertions, final AuthnRequestInfo reqInfo, final String inRespToResp, final String orgName, final String hostEntityId, final String idpEntityId, final SPSSOConfigElement spConfig, final Date notOnOrAfterTime) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/common/ |
H A D | SAML2Utils.java | 365 String idpEntityId = null; 380 idpEntityId = respIssuer.getValue(); 428 idpSSODescriptor = saml2MetaManager.getIDPSSODescriptor(orgName, idpEntityId); 430 String[] data = { orgName, idpEntityId }; 435 Set<X509Certificate> verificationCerts = KeyUtil.getVerificationCerts(idpSSODescriptor, idpEntityId, 439 String[] data = { orgName, hostEntityId, idpEntityId }; 444 String[] data = { idpEntityId }; 517 if (idpEntityId == null) { 518 idpEntityId = issuer.getValue(); 520 if (!idpEntityId 909 fillMap(final List authnStmts, final Subject subject, final Assertion assertion, final List assertions, final AuthnRequestInfo reqInfo, final String inRespToResp, final String orgName, final String hostEntityId, final String idpEntityId, final SPSSOConfigElement spConfig, final Date notOnOrAfterTime) argument [all...] |