Searched defs:spEntityID (Results 26 - 38 of 38) sorted by relevance

12

/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/
H A DIDPProxyUtil.java1015 String spEntityID,
1022 IDPSSOConfigElement config = sm.getIDPSSOConfig(realm, spEntityID);
1037 if (spEntityID != null && !spEntityID.equals("")) {
1038 logoutResponseMap.put("spEntityID", spEntityID);
1009 sendIDPInitProxyLogoutRequest( HttpServletRequest request, HttpServletResponse response, PrintWriter out, LogoutResponse logoutResponse, String location, String spEntityID, String idpEntityID, String binding, String realm) argument
H A DSPSSOFederate.java142 String spEntityID = getSPEntityId(metaAlias);
146 SAML2Utils.debug.message("SPSSOFederate : spEntityID is :" + spEntityID);
150 initiateAuthnRequest(request, response, spEntityID, idpEntityID, realm, paramsMap, auditor);
152 SAML2Utils.debug.error("SPSSOFederate: Error retreiving spEntityID from MetaAlias",sme);
174 * @param spEntityID entityID of Service Provider.
190 final HttpServletRequest request, final HttpServletResponse response, final String spEntityID,
198 if (spEntityID == null) {
200 String[] data = { spEntityID };
218 SAML2Utils.debug.message("SPSSOFederate: spEntityID i
189 initiateAuthnRequest( final HttpServletRequest request, final HttpServletResponse response, final String spEntityID, final String idpEntityID, final String realmName, final Map paramsMap, final SAML2EventLogger auditor) argument
388 getSPSSOForAuthnReq(String realm, String spEntityID) argument
400 getAttrsMapForAuthnReq(String realm, String spEntityID) argument
737 createNameIDPolicy(String spEntityID, String format, boolean allowCreate, SPSSODescriptorElement spsso, IDPSSODescriptorElement idpsso, String realm, Map paramsMap) argument
772 createIssuer(String spEntityID) argument
794 createAuthnRequest(final String realmName, final String spEntityID, final Map paramsMap, final Map spConfigMap, final List extensionsList, final SPSSODescriptorElement spsso, final IDPSSODescriptorElement idpsso, final String ssourl, final boolean isForECP) argument
1213 createReqAuthnContext(String realmName, String spEntityID,Map paramsMap, Map spConfigMap) argument
[all...]
H A DAttributeQueryUtil.java1279 * @param spEntityID SP entity ID
1292 public static Map<String, String> getAttributeMapForFedlet(String spEntityID, String idpEntityID, argument
1295 Map<String, Set<String>> attrMap = getAttributesForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList,
1322 * @param spEntityID SP entity ID
1335 public static Map<String, Set<String>> getAttributesForFedlet(String spEntityID, String idpEntityID, argument
1340 AttributeQueryConfigElement attrQueryConfig = metaManager.getAttributeQueryConfig("/", spEntityID);
1356 boolean wantNameIDEncrypted = SAML2Utils.getWantNameIDEncrypted("/", spEntityID,
1359 AttributeQuery attrQuery = constructAttrQueryForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList,
1373 boolean validResp = validateSAMLResponseForFedlet(samlResp, spEntityID, wantNameIDEncrypted);
1389 assertion = getDecryptedAssertion((EncryptedAssertion) currentAssertion, spEntityID);
1424 mapAttributes(String realm, String spEntityID, String idpEntityID, String userID, List<Attribute> attributes) argument
1440 constructAttrQueryForFedlet( String spEntityID, String idpEntityID, String nameIDValue, List<String> attrsList, String attrqMetaAlias, String attrProfileNameAlias, String subjectDN, boolean wantNameIDEncrypted) argument
1522 validateSAMLResponseForFedlet( Response samlResp, String spEntityID, boolean wantNameIDEncrypted) argument
1580 getDecryptedAssertion( EncryptedAssertion eAssertion, String spEntityID) argument
[all...]
H A DIDPSSOUtil.java178 * @param spEntityID the entity id of the service provider
189 String spEntityID,
196 spEntityID, idpMetaAlias, nameIDFormat,
207 * @param spEntityID the entity id of the service provider
219 String spEntityID,
253 String[] logdata = {spEntityID, idpMetaAlias, authnRequestStr};
292 issuer.setValue(spEntityID);
322 String[] data = {sessionRealm, realm, spEntityID, ipAddress, null};
334 redirectAuthentication(request, response, authnReq, null, realm, idpEntityID, spEntityID);
366 sendResponseToACS(request, response, out, session, authnReq, spEntityID,
185 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, SAML2EventLogger auditor) argument
215 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, Object newSession, SAML2EventLogger auditor) argument
388 sendResponseToACS(HttpServletRequest request, HttpServletResponse response, PrintWriter out, Object session, AuthnRequest authnReq, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String relayState, AuthnContext matchingAuthnContext) argument
536 setCOTCookie( HttpServletRequest request, HttpServletResponse response, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument
625 sendNoPassiveResponse(HttpServletRequest request, HttpServletResponse response, PrintWriter out, String idpMetaAlias, String idpEntityID, String realm, AuthnRequest authnReq, String relayState, String spEntityID) argument
692 sendResponse( HttpServletRequest request, HttpServletResponse response, PrintWriter out, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument
1734 getACSurl(String spEntityID, String realm, AuthnRequest authnReq, HttpServletRequest request, StringBuffer rBinding) argument
1766 getACSurl(String spEntityID, String realm, String acsURL, String binding, Integer index, HttpServletRequest request, StringBuffer rBinding) argument
1813 getDefaultACSurl( String spEntityID, String realm, StringBuffer returnedBinding) argument
1858 getBindingForAcsUrl( String spEntityID, String realm, String acsURL) argument
1890 getACSurlFromMetaByBinding( String spEntityID, String realm, String desiredBinding, StringBuffer returnedBinding) argument
1959 getACSurlFromMetaByIndex( String spEntityID, String realm, int acsIndex, StringBuffer returnedBinding) argument
2034 sendResponseArtifact(HttpServletRequest request, HttpServletResponse response, String idpEntityID, String spEntityID, String realm, String acsURL, String relayState, Response res, Object session, Map props) argument
2336 redirectAuthentication( HttpServletRequest request, HttpServletResponse response, AuthnRequest authnReq, String reqID, String realm, String idpEntityID, String spEntityID) argument
2494 signAndEncryptResponseComponents(String realm, String spEntityID, String idpEntityID, Response res, boolean signAssertion) argument
2670 getWriterURL(String realm, String idpEntityID, String spEntityID) argument
2938 isACSurlValidInMetadataSP(String acsURL, String spEntityID, String realm) argument
2972 wantAssertionsSigned(String realm, String spEntityID) argument
2990 getSPSSODescriptor(String realm, String spEntityID, String classMethod) argument
[all...]
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/
H A DFSAssertionManager.java369 * @param spEntityID service provider's entity ID
380 String spEntityID,
388 if ((id == null) ||(spEntityID == null)) {
428 spEntityID,
441 * @param spEntityID service provider's entity ID
452 String spEntityID,
462 if ((id == null) ||(spEntityID == null)) {
470 String destID = spEntityID;
377 createFSAssertionArtifact( String id, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int minorVersion) argument
448 createFSAssertion( String id, AssertionArtifact artifact, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int assertionMinorVersion) argument
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/
H A DFSAssertionManager.java372 * @param spEntityID service provider's entity ID
383 String spEntityID,
391 if ((id == null) ||(spEntityID == null)) {
431 spEntityID,
444 * @param spEntityID service provider's entity ID
455 String spEntityID,
465 if ((id == null) ||(spEntityID == null)) {
473 String destID = spEntityID;
380 createFSAssertionArtifact( String id, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int minorVersion) argument
451 createFSAssertion( String id, AssertionArtifact artifact, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int assertionMinorVersion) argument
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/multiprotocol/
H A DSingleLogoutManager.java327 * @param spEntityID <code>EntityID</code> of the remote service provider
365 String spEntityID,
399 isIDPInitiated, protocol, realm, idpEntityID, spEntityID,
445 spEntityID = (String) spEntityIDMap.get(tmpRelayState);
454 protocol, realm, idpEntityID, spEntityID, relayState,
505 String spEntityID,
519 realm + ", idpEntityID=" + idpEntityID + ", spEntityID=" +
520 spEntityID + ", status=" + currentStatus +
560 if (spEntityID != null) {
561 spEntityIDMap.put(tmpRelayState, spEntityID);
355 doIDPSingleLogout( Set userSession, String userID, HttpServletRequest request, HttpServletResponse response, boolean isSOAPInitiated, boolean isIDPInitiated, String protocol, String realm, String idpEntityID, String spEntityID, String relayState, String singleLogoutRequestXML, String singleLogoutResponseXML, int currentStatus ) argument
497 saveParameters( Set userSession, String userID, boolean isSOAPInitiated, boolean isIDPInitiated, String protocol, String realm, String idpEntityID, String spEntityID, String relayState, String singleLogoutRequestXML, String singleLogoutResponseXML, int currentStatus) argument
[all...]
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/
H A DIDPProxyUtil.java1075 String spEntityID,
1082 IDPSSOConfigElement config = sm.getIDPSSOConfig(realm, spEntityID);
1097 if (spEntityID != null && !spEntityID.equals("")) {
1098 logoutResponseMap.put("spEntityID", spEntityID);
1069 sendIDPInitProxyLogoutRequest( HttpServletRequest request, HttpServletResponse response, PrintWriter out, LogoutResponse logoutResponse, String location, String spEntityID, String idpEntityID, String binding, String realm) argument
H A DSPSSOFederate.java144 String spEntityID = getSPEntityId(metaAlias);
148 SAML2Utils.debug.message("SPSSOFederate : spEntityID is :" + spEntityID);
152 initiateAuthnRequest(request, response, spEntityID, idpEntityID, realm, paramsMap, auditor);
154 SAML2Utils.debug.error("SPSSOFederate: Error retreiving spEntityID from MetaAlias",sme);
176 * @param spEntityID entityID of Service Provider.
192 final HttpServletRequest request, final HttpServletResponse response, final String spEntityID,
200 if (spEntityID == null) {
202 String[] data = { spEntityID };
217 SAML2Utils.debug.message("SPSSOFederate: spEntityID i
191 initiateAuthnRequest( final HttpServletRequest request, final HttpServletResponse response, final String spEntityID, final String idpEntityID, final String realmName, final Map paramsMap, final SAML2EventLogger auditor) argument
401 getSPSSOForAuthnReq(String realm, String spEntityID) argument
413 getAttrsMapForAuthnReq(String realm, String spEntityID) argument
753 createNameIDPolicy(String spEntityID, String format, boolean allowCreate, SPSSODescriptorElement spsso, IDPSSODescriptorElement idpsso, String realm, Map paramsMap) argument
788 createIssuer(String spEntityID) argument
810 createAuthnRequest(final String realmName, final String spEntityID, final Map paramsMap, final Map spConfigMap, final List extensionsList, final SPSSODescriptorElement spsso, final IDPSSODescriptorElement idpsso, final String ssourl, final boolean isForECP) argument
1226 createReqAuthnContext(String realmName, String spEntityID,Map paramsMap, Map spConfigMap) argument
[all...]
H A DAttributeQueryUtil.java1281 * @param spEntityID SP entity ID
1294 public static Map<String, String> getAttributeMapForFedlet(String spEntityID, String idpEntityID, argument
1297 Map<String, Set<String>> attrMap = getAttributesForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList,
1324 * @param spEntityID SP entity ID
1337 public static Map<String, Set<String>> getAttributesForFedlet(String spEntityID, String idpEntityID, argument
1342 AttributeQueryConfigElement attrQueryConfig = metaManager.getAttributeQueryConfig("/", spEntityID);
1358 boolean wantNameIDEncrypted = SAML2Utils.getWantNameIDEncrypted("/", spEntityID,
1361 AttributeQuery attrQuery = constructAttrQueryForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList,
1375 boolean validResp = validateSAMLResponseForFedlet(samlResp, spEntityID, wantNameIDEncrypted);
1391 assertion = getDecryptedAssertion((EncryptedAssertion) currentAssertion, spEntityID);
1426 mapAttributes(String realm, String spEntityID, String idpEntityID, String userID, List<Attribute> attributes) argument
1442 constructAttrQueryForFedlet( String spEntityID, String idpEntityID, String nameIDValue, List<String> attrsList, String attrqMetaAlias, String attrProfileNameAlias, String subjectDN, boolean wantNameIDEncrypted) argument
1524 validateSAMLResponseForFedlet( Response samlResp, String spEntityID, boolean wantNameIDEncrypted) argument
1582 getDecryptedAssertion( EncryptedAssertion eAssertion, String spEntityID) argument
[all...]
H A DIDPSSOUtil.java182 * @param spEntityID the entity id of the service provider
193 String spEntityID,
200 spEntityID, idpMetaAlias, nameIDFormat,
211 * @param spEntityID the entity id of the service provider
223 String spEntityID,
257 String[] logdata = {spEntityID, idpMetaAlias, authnRequestStr};
296 issuer.setValue(spEntityID);
326 String[] data = {sessionRealm, realm, spEntityID, ipAddress, null};
338 redirectAuthentication(request, response, authnReq, null, realm, idpEntityID, spEntityID);
370 sendResponseToACS(request, response, out, session, authnReq, spEntityID,
189 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, SAML2EventLogger auditor) argument
219 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, Object newSession, SAML2EventLogger auditor) argument
392 sendResponseToACS(HttpServletRequest request, HttpServletResponse response, PrintWriter out, Object session, AuthnRequest authnReq, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String relayState, AuthnContext matchingAuthnContext) argument
540 setCOTCookie( HttpServletRequest request, HttpServletResponse response, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument
632 sendResponseWithStatus(HttpServletRequest request, HttpServletResponse response, PrintWriter out, String idpMetaAlias, String idpEntityID, String realm, AuthnRequest authnReq, String relayState, String spEntityID, String firstlevelStatusCodeValue, String secondlevelStatusCodeValue) argument
701 sendResponse( HttpServletRequest request, HttpServletResponse response, PrintWriter out, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument
1767 getACSurl(String spEntityID, String realm, AuthnRequest authnReq, HttpServletRequest request, StringBuffer rBinding) argument
1799 getACSurl(String spEntityID, String realm, String acsURL, String binding, Integer index, HttpServletRequest request, StringBuffer rBinding) argument
1846 getDefaultACSurl( String spEntityID, String realm, StringBuffer returnedBinding) argument
1891 getBindingForAcsUrl( String spEntityID, String realm, String acsURL) argument
1923 getACSurlFromMetaByBinding( String spEntityID, String realm, String desiredBinding, StringBuffer returnedBinding) argument
1992 getACSurlFromMetaByIndex( String spEntityID, String realm, int acsIndex, StringBuffer returnedBinding) argument
2067 sendResponseArtifact(HttpServletRequest request, HttpServletResponse response, String idpEntityID, String spEntityID, String realm, String acsURL, String relayState, Response res, Object session, Map props) argument
2369 redirectAuthentication( HttpServletRequest request, HttpServletResponse response, AuthnRequest authnReq, String reqID, String realm, String idpEntityID, String spEntityID) argument
2527 signAndEncryptResponseComponents(String realm, String spEntityID, String idpEntityID, Response res, boolean signAssertion) argument
2703 getWriterURL(String realm, String idpEntityID, String spEntityID) argument
2971 isACSurlValidInMetadataSP(String acsURL, String spEntityID, String realm) argument
3005 wantAssertionsSigned(String realm, String spEntityID) argument
3023 getSPSSODescriptor(String realm, String spEntityID, String classMethod) argument
[all...]
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/common/
H A DSAML2Utils.java2606 String spEntityID =
2612 debug.message(classMethod + "spEntityID is :" + spEntityID);
2616 saml2MetaManager.getSPSSOConfig(realm, spEntityID);
2839 * @param spEntityID the entity id of the service provider
2845 String spEntityID, String realm)
2850 "get SPAdapter for " + spEntityID + " under realm " + realm);
2856 realm, spEntityID, SAML2Constants.SP_ROLE,
2865 SPCache.spAdapterClassCache.get(realm + spEntityID +
2871 realm, spEntityID, SAML2Constant
2844 getSPAdapterClass( String spEntityID, String realm) argument
2919 getFedletAdapterClass( String spEntityID, String realm) argument
3023 getSPAccountMapper( String realm, String spEntityID) argument
3072 getECPIDPFinder(String realm, String spEntityID) argument
3485 getSPAttributeMapper(String realm, String spEntityID) argument
4056 isSPProfileBindingSupported( String realm, String spEntityID, String profile, String binding) argument
[all...]
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/common/
H A DSAML2Utils.java2631 String spEntityID =
2637 debug.message(classMethod + "spEntityID is :" + spEntityID);
2641 saml2MetaManager.getSPSSOConfig(realm, spEntityID);
2864 * @param spEntityID the entity id of the service provider
2870 String spEntityID, String realm)
2875 "get SPAdapter for " + spEntityID + " under realm " + realm);
2881 realm, spEntityID, SAML2Constants.SP_ROLE,
2890 SPCache.spAdapterClassCache.get(realm + spEntityID +
2896 realm, spEntityID, SAML2Constant
2869 getSPAdapterClass( String spEntityID, String realm) argument
2944 getFedletAdapterClass( String spEntityID, String realm) argument
3048 getSPAccountMapper( String realm, String spEntityID) argument
3097 getECPIDPFinder(String realm, String spEntityID) argument
3510 getSPAttributeMapper(String realm, String spEntityID) argument
4081 isSPProfileBindingSupported( String realm, String spEntityID, String profile, String binding) argument
[all...]

Completed in 2815 milliseconds

12