Searched defs:pm (Results 26 - 50 of 51) sorted by relevance

123

/forgerock/openam-v13/openam-entitlements/src/main/java/com/sun/identity/entitlement/opensso/
H A DPolicyPrivilegeManager.java74 private PolicyManager pm; field in class:PolicyPrivilegeManager
118 pm = new PolicyManager(ssoToken, realm);
148 Policy policy = pm.getPolicy(privilegeName);
222 pm.addPolicy((Policy) policyObject);
251 pm.removePolicy(name);
303 pm.removePolicy(privilege.getName());
304 pm.addPolicy(PrivilegeUtils.privilegeToPolicy(realm, privilege));
351 policy = pm.getPolicy(name);
/forgerock/openam-v13/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/
H A DXACMLExportImportTest.java60 private PrivilegeManager pm; field in class:XACMLExportImportTest
73 pm = mock(PrivilegeManager.class);
87 given(pmFactory.createReferralPrivilegeManager(eq(ROOT_REALM), any(Subject.class))).willReturn(pm);
114 verify(pm).add(privilegeToAdd);
115 verify(pm).modify(privilegeToUpdate);
142 verify(pm, times(0)).add(any(Privilege.class));
143 verify(pm, times(0)).modify(any(Privilege.class));
200 given(pm.canFindByName(eq(privilege.getName()))).willReturn(true);
207 given(pm.canFindByName(eq(privilege.getName()))).willReturn(false);
/forgerock/openam-v13/openam-federation/OpenFM/src/test/java/com/sun/identity/unittest/
H A DUtil.java184 * @param pm The PolicyManager to use.
188 public static Subject createAuthenticatedUsersSubject(PolicyManager pm) throws PolicyException { argument
190 SubjectTypeManager mgr = pm.getSubjectTypeManager();
198 * @param pm The PolicyManager to use.
203 public static Subject createAMIdentitySubject(PolicyManager pm, AMIdentity user) throws PolicyException { argument
205 SubjectTypeManager mgr = pm.getSubjectTypeManager();
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/
H A DSubjectTypeManager.java58 private PolicyManager pm; field in class:SubjectTypeManager
82 * @param pm <code>PolicyManager</code> to initialize
85 protected SubjectTypeManager(PolicyManager pm) { argument
86 this.pm = pm;
87 pmRealmName = LDAPUtils.formatToRFC(pm.getOrganizationDN());
88 token = pm.token;
136 Map policyConfig = pm.getPolicyConfig();
239 answer.initialize(pm.getPolicyConfig());
350 Set userPolicies = pm
[all...]
H A DReferrals.java71 * @param pm <code>PolicyManager</code> to initialize the
86 protected Referrals(PolicyManager pm, Node referralsNode) argument
114 ReferralTypeManager rtm = pm.getReferralTypeManager();
H A DSubjects.java82 protected Subjects(PolicyManager pm, Node usersNode) argument
111 SubjectTypeManager stm = pm.getSubjectTypeManager();
H A DPolicyUtils.java777 PolicyManager pm = new PolicyManager(token);
778 String org = pm.getOrganizationDN();
1076 * @param pm Policy manager.
1082 public static void createPolicies(PolicyManager pm, InputStream xmlPolicies) argument
1085 createOrReplacePolicies(pm, xmlPolicies, false);
1092 * @param pm Policy manager.
1099 public static void createOrReplacePolicies(PolicyManager pm, InputStream xmlPolicies, boolean replace) argument
1112 pm.replacePolicy(new Policy(pm, node));
1114 pm
[all...]
H A DPolicy.java236 * @param pm <code>PolicyManager</code> requesting the operation
243 public Policy(PolicyManager pm, Node policyNode) argument
316 users = new Subjects(pm, subjectsNode);
323 conditions = new Conditions(pm.getConditionTypeManager(),
332 pm.getResponseProviderTypeManager(),
340 referrals = new Referrals(pm, referralsNode);
733 PolicyManager pm = new PolicyManager(token, realmName);
734 SubjectTypeManager stm = pm.getSubjectTypeManager();
1327 PolicyManager pm = new PolicyManager(token, name);
1328 pm
[all...]
/forgerock/openam/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/
H A DXACMLExportImportTest.java71 private PrivilegeManager pm; field in class:XACMLExportImportTest
86 pm = mock(PrivilegeManager.class);
111 given(pmFactory.createReferralPrivilegeManager(eq(ROOT_REALM), any(Subject.class))).willReturn(pm);
144 verify(pm).add(privilegeToAdd);
145 verify(pm).modify(privilegeToUpdate);
172 verify(pm, times(0)).add(any(Privilege.class));
173 verify(pm, times(0)).modify(any(Privilege.class));
214 given(pm.canFindByName(eq(privilege.getName()))).willReturn(true);
221 given(pm.canFindByName(eq(privilege.getName()))).willReturn(false);
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/unittest/
H A DUtil.java184 * @param pm The PolicyManager to use.
188 public static Subject createAuthenticatedUsersSubject(PolicyManager pm) throws PolicyException { argument
190 SubjectTypeManager mgr = pm.getSubjectTypeManager();
198 * @param pm The PolicyManager to use.
203 public static Subject createAMIdentitySubject(PolicyManager pm, AMIdentity user) throws PolicyException { argument
205 SubjectTypeManager mgr = pm.getSubjectTypeManager();
/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/policy/
H A DReferrals.java71 * @param pm <code>PolicyManager</code> to initialize the
86 protected Referrals(PolicyManager pm, Node referralsNode) argument
114 ReferralTypeManager rtm = pm.getReferralTypeManager();
H A DSubjects.java83 protected Subjects(PolicyManager pm, Node usersNode) argument
112 SubjectTypeManager stm = pm.getSubjectTypeManager();
H A DPolicyUtils.java777 PolicyManager pm = new PolicyManager(token);
778 String org = pm.getOrganizationDN();
1076 * @param pm Policy manager.
1082 public static void createPolicies(PolicyManager pm, InputStream xmlPolicies) argument
1085 createOrReplacePolicies(pm, xmlPolicies, false);
1092 * @param pm Policy manager.
1099 public static void createOrReplacePolicies(PolicyManager pm, InputStream xmlPolicies, boolean replace) argument
1112 pm.replacePolicy(new Policy(pm, node));
1114 pm
[all...]
H A DPolicy.java236 * @param pm <code>PolicyManager</code> requesting the operation
243 public Policy(PolicyManager pm, Node policyNode) argument
316 users = new Subjects(pm, subjectsNode);
323 conditions = new Conditions(pm.getConditionTypeManager(),
332 pm.getResponseProviderTypeManager(),
340 referrals = new Referrals(pm, referralsNode);
733 PolicyManager pm = new PolicyManager(token, realmName);
734 SubjectTypeManager stm = pm.getSubjectTypeManager();
1327 PolicyManager pm = new PolicyManager(token, name);
1328 pm
[all...]
/forgerock/openam-v13/openam-entitlements/src/main/java/com/sun/identity/entitlement/xacml3/
H A DXACMLExportImport.java122 PrivilegeManager pm = privilegeManagerFactory.createReferralPrivilegeManager(realm, admin);
135 if (pm.canFindByName(privilege.getName())) {
136 importSteps.add(privilegeImportStep(pm, DiffStatus.UPDATE, privilege));
138 importSteps.add(privilegeImportStep(pm, DiffStatus.ADD, privilege));
158 PrivilegeManager pm = privilegeManagerFactory.createReferralPrivilegeManager(realm, admin);
169 Set<String> privilegeNames = pm.searchNames(filterSet);
174 Privilege privilege = pm.findByName(name, admin);
220 private ImportStep privilegeImportStep(PrivilegeManager pm, DiffStatus type, Privilege privilege) { argument
221 return new ImportStepImpl<Privilege>(pm, type, privilege, "Privilege");
/forgerock/openam-v13/openam-federation/OpenFM/src/test/java/com/sun/identity/policy/
H A DPolicyEvaluatorTest.java84 PolicyManager pm = new PolicyManager(adminToken, "/");
88 policy.addSubject("group", createSubject(pm));
89 pm.addPolicy(policy);
94 policy.addSubject("group2", createSubject(pm));
95 pm.addPolicy(policy);
100 policy.addSubject("group3", createSubject(pm));
101 pm.addPolicy(policy);
107 policy.addSubject("group4", createGroupSubject(pm));
108 policy.addCondition("condition4", createIPCondition(pm));
109 pm
329 createSubject(PolicyManager pm) argument
338 createGroupSubject(PolicyManager pm) argument
348 createIPCondition(PolicyManager pm) argument
[all...]
/forgerock/openam-v13/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/
H A DUpgradeEntitlementsStep.java135 PolicyManager pm = new PolicyManager(getAdminToken(), realm);
136 Set<String> policyNames = pm.getPolicyNames();
138 Policy policy = pm.getPolicy(policyName);
183 PolicyManager pm = new PolicyManager(getAdminToken(), realm);
188 upgradeReferrals(pm, referrals);
297 private void upgradeReferrals(PolicyManager pm, Set<String> referrals) throws Exception { argument
302 Policy referral = pm.getPolicy(referralName);
322 pm.replacePolicy(referral);
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/policy/
H A DPolicyEvaluatorTest.java84 PolicyManager pm = new PolicyManager(adminToken, "/");
88 policy.addSubject("group", createSubject(pm));
89 pm.addPolicy(policy);
94 policy.addSubject("group2", createSubject(pm));
95 pm.addPolicy(policy);
100 policy.addSubject("group3", createSubject(pm));
101 pm.addPolicy(policy);
107 policy.addSubject("group4", createGroupSubject(pm));
108 policy.addCondition("condition4", createIPCondition(pm));
109 pm
329 createSubject(PolicyManager pm) argument
338 createGroupSubject(PolicyManager pm) argument
348 createIPCondition(PolicyManager pm) argument
[all...]
/forgerock/openam/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/
H A DUpgradeEntitlementsStep.java136 PolicyManager pm = new PolicyManager(getAdminToken(), realm);
137 Set<String> policyNames = pm.getPolicyNames();
139 Policy policy = pm.getPolicy(policyName);
184 PolicyManager pm = new PolicyManager(getAdminToken(), realm);
189 upgradeReferrals(pm, referrals);
298 private void upgradeReferrals(PolicyManager pm, Set<String> referrals) throws Exception { argument
303 Policy referral = pm.getPolicy(referralName);
323 pm.replacePolicy(referral);
/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/delegation/plugins/
H A DDelegationPolicyImpl.java240 PolicyManager pm = new PolicyManager(token,
242 Set pnames = pm.getPolicyNames();
263 Policy p = pm.getPolicy(pname);
305 PolicyManager pm = new PolicyManager(token,
307 Policy p = privilegeToPolicy(pm, privilege, orgName);
309 Set existingPolicies = pm.getPolicyNames();
314 pm.removePolicy(p.getName());
316 pm.replacePolicy(p);
322 pm.addPolicy(p);
357 PolicyManager pm
771 privilegeToPolicy( PolicyManager pm, DelegationPrivilege priv, String orgName ) argument
[all...]
/forgerock/openam-v13/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/policy/
H A DUpgradeResourceTypeStep.java234 final PrivilegeManager pm = PrivilegeManager.getInstance(realm, getAdminSubject());
249 upgradePrivileges(pm, state.appName, uuids.iterator().next());
400 * @param pm The PrivilegeManager for the given realm.
404 private void upgradePrivileges(PrivilegeManager pm, String appName, String resourceTypeUUID) argument
409 final List<Privilege> privileges = pm.search(Collections.singleton(searchFilter));
412 upgradePrivilege(pm, privilege, resourceTypeUUID);
/forgerock/openam/openam-core/src/main/java/com/sun/identity/delegation/plugins/
H A DDelegationPolicyImpl.java243 PolicyManager pm = new PolicyManager(token,
245 Set pnames = pm.getPolicyNames();
266 Policy p = pm.getPolicy(pname);
308 PolicyManager pm = new PolicyManager(token,
310 Policy p = privilegeToPolicy(pm, privilege, orgName);
312 Set existingPolicies = pm.getPolicyNames();
317 pm.removePolicy(p.getName());
319 pm.replacePolicy(p);
325 pm.addPolicy(p);
360 PolicyManager pm
782 privilegeToPolicy( PolicyManager pm, DelegationPrivilege priv, String orgName ) argument
[all...]
/forgerock/openam/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/policy/
H A DUpgradeResourceTypeStep.java232 final PrivilegeManager pm = PrivilegeManager.getInstance(realm, getAdminSubject());
248 upgradePrivileges(pm, state.appName, uuids.iterator().next());
399 * @param pm The PrivilegeManager for the given realm.
403 private void upgradePrivileges(PrivilegeManager pm, String appName, String resourceTypeUUID) argument
408 final List<Privilege> privileges = pm.search(Collections.singleton(searchFilter));
411 upgradePrivilege(pm, privilege, resourceTypeUUID);
/forgerock/authenticator-android-v2/app/libs/
H A Dpicasso-2.4.0.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/squareup/ com/squareup/picasso/ com/squareup/picasso/Action ...
/forgerock/opendj2/ext/svnkit/lib/
H A Dplatform-3.5.2.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/sun/ com/sun/jna/ com/sun/jna/platform/ ...

Completed in 65 milliseconds

123