/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | IDPProxyUtil.java | 1015 String spEntityID, 1022 IDPSSOConfigElement config = sm.getIDPSSOConfig(realm, spEntityID); 1037 if (spEntityID != null && !spEntityID.equals("")) { 1038 logoutResponseMap.put("spEntityID", spEntityID); 1009 sendIDPInitProxyLogoutRequest( HttpServletRequest request, HttpServletResponse response, PrintWriter out, LogoutResponse logoutResponse, String location, String spEntityID, String idpEntityID, String binding, String realm) argument
|
H A D | SPSSOFederate.java | 142 String spEntityID = getSPEntityId(metaAlias); 146 SAML2Utils.debug.message("SPSSOFederate : spEntityID is :" + spEntityID); 150 initiateAuthnRequest(request, response, spEntityID, idpEntityID, realm, paramsMap, auditor); 152 SAML2Utils.debug.error("SPSSOFederate: Error retreiving spEntityID from MetaAlias",sme); 174 * @param spEntityID entityID of Service Provider. 190 final HttpServletRequest request, final HttpServletResponse response, final String spEntityID, 198 if (spEntityID == null) { 200 String[] data = { spEntityID }; 218 SAML2Utils.debug.message("SPSSOFederate: spEntityID i 189 initiateAuthnRequest( final HttpServletRequest request, final HttpServletResponse response, final String spEntityID, final String idpEntityID, final String realmName, final Map paramsMap, final SAML2EventLogger auditor) argument 388 getSPSSOForAuthnReq(String realm, String spEntityID) argument 400 getAttrsMapForAuthnReq(String realm, String spEntityID) argument 737 createNameIDPolicy(String spEntityID, String format, boolean allowCreate, SPSSODescriptorElement spsso, IDPSSODescriptorElement idpsso, String realm, Map paramsMap) argument 772 createIssuer(String spEntityID) argument 794 createAuthnRequest(final String realmName, final String spEntityID, final Map paramsMap, final Map spConfigMap, final List extensionsList, final SPSSODescriptorElement spsso, final IDPSSODescriptorElement idpsso, final String ssourl, final boolean isForECP) argument 1213 createReqAuthnContext(String realmName, String spEntityID,Map paramsMap, Map spConfigMap) argument [all...] |
H A D | AttributeQueryUtil.java | 1279 * @param spEntityID SP entity ID 1292 public static Map<String, String> getAttributeMapForFedlet(String spEntityID, String idpEntityID, argument 1295 Map<String, Set<String>> attrMap = getAttributesForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList, 1322 * @param spEntityID SP entity ID 1335 public static Map<String, Set<String>> getAttributesForFedlet(String spEntityID, String idpEntityID, argument 1340 AttributeQueryConfigElement attrQueryConfig = metaManager.getAttributeQueryConfig("/", spEntityID); 1356 boolean wantNameIDEncrypted = SAML2Utils.getWantNameIDEncrypted("/", spEntityID, 1359 AttributeQuery attrQuery = constructAttrQueryForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList, 1373 boolean validResp = validateSAMLResponseForFedlet(samlResp, spEntityID, wantNameIDEncrypted); 1389 assertion = getDecryptedAssertion((EncryptedAssertion) currentAssertion, spEntityID); 1424 mapAttributes(String realm, String spEntityID, String idpEntityID, String userID, List<Attribute> attributes) argument 1440 constructAttrQueryForFedlet( String spEntityID, String idpEntityID, String nameIDValue, List<String> attrsList, String attrqMetaAlias, String attrProfileNameAlias, String subjectDN, boolean wantNameIDEncrypted) argument 1522 validateSAMLResponseForFedlet( Response samlResp, String spEntityID, boolean wantNameIDEncrypted) argument 1580 getDecryptedAssertion( EncryptedAssertion eAssertion, String spEntityID) argument [all...] |
H A D | IDPSSOUtil.java | 178 * @param spEntityID the entity id of the service provider 189 String spEntityID, 196 spEntityID, idpMetaAlias, nameIDFormat, 207 * @param spEntityID the entity id of the service provider 219 String spEntityID, 253 String[] logdata = {spEntityID, idpMetaAlias, authnRequestStr}; 292 issuer.setValue(spEntityID); 322 String[] data = {sessionRealm, realm, spEntityID, ipAddress, null}; 334 redirectAuthentication(request, response, authnReq, null, realm, idpEntityID, spEntityID); 366 sendResponseToACS(request, response, out, session, authnReq, spEntityID, 185 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, SAML2EventLogger auditor) argument 215 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, Object newSession, SAML2EventLogger auditor) argument 388 sendResponseToACS(HttpServletRequest request, HttpServletResponse response, PrintWriter out, Object session, AuthnRequest authnReq, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String relayState, AuthnContext matchingAuthnContext) argument 536 setCOTCookie( HttpServletRequest request, HttpServletResponse response, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 625 sendNoPassiveResponse(HttpServletRequest request, HttpServletResponse response, PrintWriter out, String idpMetaAlias, String idpEntityID, String realm, AuthnRequest authnReq, String relayState, String spEntityID) argument 692 sendResponse( HttpServletRequest request, HttpServletResponse response, PrintWriter out, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 1734 getACSurl(String spEntityID, String realm, AuthnRequest authnReq, HttpServletRequest request, StringBuffer rBinding) argument 1766 getACSurl(String spEntityID, String realm, String acsURL, String binding, Integer index, HttpServletRequest request, StringBuffer rBinding) argument 1813 getDefaultACSurl( String spEntityID, String realm, StringBuffer returnedBinding) argument 1858 getBindingForAcsUrl( String spEntityID, String realm, String acsURL) argument 1890 getACSurlFromMetaByBinding( String spEntityID, String realm, String desiredBinding, StringBuffer returnedBinding) argument 1959 getACSurlFromMetaByIndex( String spEntityID, String realm, int acsIndex, StringBuffer returnedBinding) argument 2034 sendResponseArtifact(HttpServletRequest request, HttpServletResponse response, String idpEntityID, String spEntityID, String realm, String acsURL, String relayState, Response res, Object session, Map props) argument 2336 redirectAuthentication( HttpServletRequest request, HttpServletResponse response, AuthnRequest authnReq, String reqID, String realm, String idpEntityID, String spEntityID) argument 2494 signAndEncryptResponseComponents(String realm, String spEntityID, String idpEntityID, Response res, boolean signAssertion) argument 2670 getWriterURL(String realm, String idpEntityID, String spEntityID) argument 2938 isACSurlValidInMetadataSP(String acsURL, String spEntityID, String realm) argument 2972 wantAssertionsSigned(String realm, String spEntityID) argument 2990 getSPSSODescriptor(String realm, String spEntityID, String classMethod) argument [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/ |
H A D | FSAssertionManager.java | 369 * @param spEntityID service provider's entity ID 380 String spEntityID, 388 if ((id == null) ||(spEntityID == null)) { 428 spEntityID, 441 * @param spEntityID service provider's entity ID 452 String spEntityID, 462 if ((id == null) ||(spEntityID == null)) { 470 String destID = spEntityID; 377 createFSAssertionArtifact( String id, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int minorVersion) argument 448 createFSAssertion( String id, AssertionArtifact artifact, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int assertionMinorVersion) argument
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/federation/services/ |
H A D | FSAssertionManager.java | 372 * @param spEntityID service provider's entity ID 383 String spEntityID, 391 if ((id == null) ||(spEntityID == null)) { 431 spEntityID, 444 * @param spEntityID service provider's entity ID 455 String spEntityID, 465 if ((id == null) ||(spEntityID == null)) { 473 String destID = spEntityID; 380 createFSAssertionArtifact( String id, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int minorVersion) argument 451 createFSAssertion( String id, AssertionArtifact artifact, String realm, String spEntityID, NameIdentifier spHandle, NameIdentifier idpHandle, String inResponseTo, int assertionMinorVersion) argument
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/multiprotocol/ |
H A D | SingleLogoutManager.java | 327 * @param spEntityID <code>EntityID</code> of the remote service provider 365 String spEntityID, 399 isIDPInitiated, protocol, realm, idpEntityID, spEntityID, 445 spEntityID = (String) spEntityIDMap.get(tmpRelayState); 454 protocol, realm, idpEntityID, spEntityID, relayState, 505 String spEntityID, 519 realm + ", idpEntityID=" + idpEntityID + ", spEntityID=" + 520 spEntityID + ", status=" + currentStatus + 560 if (spEntityID != null) { 561 spEntityIDMap.put(tmpRelayState, spEntityID); 355 doIDPSingleLogout( Set userSession, String userID, HttpServletRequest request, HttpServletResponse response, boolean isSOAPInitiated, boolean isIDPInitiated, String protocol, String realm, String idpEntityID, String spEntityID, String relayState, String singleLogoutRequestXML, String singleLogoutResponseXML, int currentStatus ) argument 497 saveParameters( Set userSession, String userID, boolean isSOAPInitiated, boolean isIDPInitiated, String protocol, String realm, String idpEntityID, String spEntityID, String relayState, String singleLogoutRequestXML, String singleLogoutResponseXML, int currentStatus) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | IDPProxyUtil.java | 1075 String spEntityID, 1082 IDPSSOConfigElement config = sm.getIDPSSOConfig(realm, spEntityID); 1097 if (spEntityID != null && !spEntityID.equals("")) { 1098 logoutResponseMap.put("spEntityID", spEntityID); 1069 sendIDPInitProxyLogoutRequest( HttpServletRequest request, HttpServletResponse response, PrintWriter out, LogoutResponse logoutResponse, String location, String spEntityID, String idpEntityID, String binding, String realm) argument
|
H A D | SPSSOFederate.java | 144 String spEntityID = getSPEntityId(metaAlias); 148 SAML2Utils.debug.message("SPSSOFederate : spEntityID is :" + spEntityID); 152 initiateAuthnRequest(request, response, spEntityID, idpEntityID, realm, paramsMap, auditor); 154 SAML2Utils.debug.error("SPSSOFederate: Error retreiving spEntityID from MetaAlias",sme); 176 * @param spEntityID entityID of Service Provider. 192 final HttpServletRequest request, final HttpServletResponse response, final String spEntityID, 200 if (spEntityID == null) { 202 String[] data = { spEntityID }; 217 SAML2Utils.debug.message("SPSSOFederate: spEntityID i 191 initiateAuthnRequest( final HttpServletRequest request, final HttpServletResponse response, final String spEntityID, final String idpEntityID, final String realmName, final Map paramsMap, final SAML2EventLogger auditor) argument 401 getSPSSOForAuthnReq(String realm, String spEntityID) argument 413 getAttrsMapForAuthnReq(String realm, String spEntityID) argument 753 createNameIDPolicy(String spEntityID, String format, boolean allowCreate, SPSSODescriptorElement spsso, IDPSSODescriptorElement idpsso, String realm, Map paramsMap) argument 788 createIssuer(String spEntityID) argument 810 createAuthnRequest(final String realmName, final String spEntityID, final Map paramsMap, final Map spConfigMap, final List extensionsList, final SPSSODescriptorElement spsso, final IDPSSODescriptorElement idpsso, final String ssourl, final boolean isForECP) argument 1226 createReqAuthnContext(String realmName, String spEntityID,Map paramsMap, Map spConfigMap) argument [all...] |
H A D | AttributeQueryUtil.java | 1281 * @param spEntityID SP entity ID 1294 public static Map<String, String> getAttributeMapForFedlet(String spEntityID, String idpEntityID, argument 1297 Map<String, Set<String>> attrMap = getAttributesForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList, 1324 * @param spEntityID SP entity ID 1337 public static Map<String, Set<String>> getAttributesForFedlet(String spEntityID, String idpEntityID, argument 1342 AttributeQueryConfigElement attrQueryConfig = metaManager.getAttributeQueryConfig("/", spEntityID); 1358 boolean wantNameIDEncrypted = SAML2Utils.getWantNameIDEncrypted("/", spEntityID, 1361 AttributeQuery attrQuery = constructAttrQueryForFedlet(spEntityID, idpEntityID, nameIDValue, attrsList, 1375 boolean validResp = validateSAMLResponseForFedlet(samlResp, spEntityID, wantNameIDEncrypted); 1391 assertion = getDecryptedAssertion((EncryptedAssertion) currentAssertion, spEntityID); 1426 mapAttributes(String realm, String spEntityID, String idpEntityID, String userID, List<Attribute> attributes) argument 1442 constructAttrQueryForFedlet( String spEntityID, String idpEntityID, String nameIDValue, List<String> attrsList, String attrqMetaAlias, String attrProfileNameAlias, String subjectDN, boolean wantNameIDEncrypted) argument 1524 validateSAMLResponseForFedlet( Response samlResp, String spEntityID, boolean wantNameIDEncrypted) argument 1582 getDecryptedAssertion( EncryptedAssertion eAssertion, String spEntityID) argument [all...] |
H A D | IDPSSOUtil.java | 182 * @param spEntityID the entity id of the service provider 193 String spEntityID, 200 spEntityID, idpMetaAlias, nameIDFormat, 211 * @param spEntityID the entity id of the service provider 223 String spEntityID, 257 String[] logdata = {spEntityID, idpMetaAlias, authnRequestStr}; 296 issuer.setValue(spEntityID); 326 String[] data = {sessionRealm, realm, spEntityID, ipAddress, null}; 338 redirectAuthentication(request, response, authnReq, null, realm, idpEntityID, spEntityID); 370 sendResponseToACS(request, response, out, session, authnReq, spEntityID, 189 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, SAML2EventLogger auditor) argument 219 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, Object newSession, SAML2EventLogger auditor) argument 392 sendResponseToACS(HttpServletRequest request, HttpServletResponse response, PrintWriter out, Object session, AuthnRequest authnReq, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String relayState, AuthnContext matchingAuthnContext) argument 540 setCOTCookie( HttpServletRequest request, HttpServletResponse response, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 632 sendResponseWithStatus(HttpServletRequest request, HttpServletResponse response, PrintWriter out, String idpMetaAlias, String idpEntityID, String realm, AuthnRequest authnReq, String relayState, String spEntityID, String firstlevelStatusCodeValue, String secondlevelStatusCodeValue) argument 701 sendResponse( HttpServletRequest request, HttpServletResponse response, PrintWriter out, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 1767 getACSurl(String spEntityID, String realm, AuthnRequest authnReq, HttpServletRequest request, StringBuffer rBinding) argument 1799 getACSurl(String spEntityID, String realm, String acsURL, String binding, Integer index, HttpServletRequest request, StringBuffer rBinding) argument 1846 getDefaultACSurl( String spEntityID, String realm, StringBuffer returnedBinding) argument 1891 getBindingForAcsUrl( String spEntityID, String realm, String acsURL) argument 1923 getACSurlFromMetaByBinding( String spEntityID, String realm, String desiredBinding, StringBuffer returnedBinding) argument 1992 getACSurlFromMetaByIndex( String spEntityID, String realm, int acsIndex, StringBuffer returnedBinding) argument 2067 sendResponseArtifact(HttpServletRequest request, HttpServletResponse response, String idpEntityID, String spEntityID, String realm, String acsURL, String relayState, Response res, Object session, Map props) argument 2369 redirectAuthentication( HttpServletRequest request, HttpServletResponse response, AuthnRequest authnReq, String reqID, String realm, String idpEntityID, String spEntityID) argument 2527 signAndEncryptResponseComponents(String realm, String spEntityID, String idpEntityID, Response res, boolean signAssertion) argument 2703 getWriterURL(String realm, String idpEntityID, String spEntityID) argument 2971 isACSurlValidInMetadataSP(String acsURL, String spEntityID, String realm) argument 3005 wantAssertionsSigned(String realm, String spEntityID) argument 3023 getSPSSODescriptor(String realm, String spEntityID, String classMethod) argument [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/common/ |
H A D | SAML2Utils.java | 2606 String spEntityID = 2612 debug.message(classMethod + "spEntityID is :" + spEntityID); 2616 saml2MetaManager.getSPSSOConfig(realm, spEntityID); 2839 * @param spEntityID the entity id of the service provider 2845 String spEntityID, String realm) 2850 "get SPAdapter for " + spEntityID + " under realm " + realm); 2856 realm, spEntityID, SAML2Constants.SP_ROLE, 2865 SPCache.spAdapterClassCache.get(realm + spEntityID + 2871 realm, spEntityID, SAML2Constant 2844 getSPAdapterClass( String spEntityID, String realm) argument 2919 getFedletAdapterClass( String spEntityID, String realm) argument 3023 getSPAccountMapper( String realm, String spEntityID) argument 3072 getECPIDPFinder(String realm, String spEntityID) argument 3485 getSPAttributeMapper(String realm, String spEntityID) argument 4056 isSPProfileBindingSupported( String realm, String spEntityID, String profile, String binding) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/common/ |
H A D | SAML2Utils.java | 2631 String spEntityID = 2637 debug.message(classMethod + "spEntityID is :" + spEntityID); 2641 saml2MetaManager.getSPSSOConfig(realm, spEntityID); 2864 * @param spEntityID the entity id of the service provider 2870 String spEntityID, String realm) 2875 "get SPAdapter for " + spEntityID + " under realm " + realm); 2881 realm, spEntityID, SAML2Constants.SP_ROLE, 2890 SPCache.spAdapterClassCache.get(realm + spEntityID + 2896 realm, spEntityID, SAML2Constant 2869 getSPAdapterClass( String spEntityID, String realm) argument 2944 getFedletAdapterClass( String spEntityID, String realm) argument 3048 getSPAccountMapper( String realm, String spEntityID) argument 3097 getECPIDPFinder(String realm, String spEntityID) argument 3510 getSPAttributeMapper(String realm, String spEntityID) argument 4081 isSPProfileBindingSupported( String realm, String spEntityID, String profile, String binding) argument [all...] |