/forgerock/openam/openam-core/src/main/java/com/sun/identity/authentication/internal/ |
H A D | LoginContext.java | 149 String username = ((NameCallback) callbacks[i]).getName(); 150 if (username != null) { 152 username); 166 void updateSharedState(String username, char[] passwd) { argument 167 sharedState.put(ISAuthConstants.SHARED_STATE_USERNAME, username);
|
/forgerock/openam/openam-core/src/main/java/org/forgerock/openam/core/ |
H A D | CoreServicesWrapper.java | 222 * Gets the AMIdentity of a user with username equal to {@literal username} that exists in realm 224 * @param username username of the user to get. 226 * @return The AMIdentity of user with username equal to {@literal username}. 228 public AMIdentity getIdentity(String username, String realm) { argument 229 return IdUtils.getIdentity(username, realm);
|
H A D | CoreWrapper.java | 262 * Gets the AMIdentity of a user with username equal to {@literal username} that exists in realm 264 * @param username username of the user to get. 266 * @return The AMIdentity of user with username equal to {@literal username}. 268 public AMIdentity getIdentity(String username, String realm) { argument 269 return IdUtils.getIdentity(username, realm);
|
/forgerock/openam/openam-core/src/main/java/org/forgerock/openam/sm/datalayer/impl/ |
H A D | LabelsDataLayerConfiguration.java | 63 public void updateExternalLdapConfiguration(ModifiedProperty<String> hosts, ModifiedProperty<String> username, argument 68 username.set(SystemProperties.get(STORE_USERNAME));
|
/forgerock/openam/openam-core/src/main/java/org/forgerock/openam/sm/datalayer/impl/ldap/ |
H A D | ExternalLdapConfig.java | 53 protected ModifiedProperty<String> username = new ModifiedProperty<String>(); field in class:ExternalLdapConfig 102 * @return The External Token Store username. Maybe null. 105 return username.get(); 151 username.hasChanged() || 163 config.updateExternalLdapConfiguration(hosts, username, password, maxConnections, sslMode, heartbeat, 202 ", username=" + username +
|
/forgerock/openam/openam-datastore/src/test/java/org/forgerock/openam/idrepo/ldap/ |
H A D | IdRepoTestBase.java | 80 createConnectionFactory(String username, char[] password, int maxPoolSize) { 163 protected Callback[] getCredentials(String username, String password) { argument 166 nc.setName(username);
|
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/unittest/ |
H A D | Util.java | 142 * Create a AMIdentity User for using in Test cases, uses username for password. 144 * @param username The username of the user. 151 String username, String realm) throws IdRepoException, SSOException { 157 set.add(username); 163 return amir.createIdentity(IdType.USER, username, attrValues); 262 * @param username The username of the user to login as 268 public static SSOToken datastoreLogin(String username, argument 281 addLoginCallbackMessage(callbacks, username, passwor 150 createATestUser(SSOToken adminToken, String username, String realm) argument 295 addLoginCallbackMessage(Callback[] callbacks, String username, String password) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/wsfederation/servlet/ |
H A D | ActiveRequest.java | 86 private String username = null; field in class:ActiveRequest 249 } else if (StringUtils.isEmpty(username) || password.length == 0) { 288 return wsFedAuthenticator.authenticate(request, response, soapMessage, realm, username, password); 296 username = getSingleElement(element, WSSE_NAMESPACE, "Username");
|
/forgerock/openam/openam-sts/openam-soap-sts/openam-soap-sts-client/src/main/java/org/forgerock/openam/sts/soap/ |
H A D | TokenSpecification.java | 95 * @param username the username in the UsernameToken included as the OnBehalfOf element 100 public static TokenSpecification usernameTokenSaml2SenderVouches(String username, String password) { argument 101 return new TokenSpecification(SAML2_TOKEN_TYPE, PUBLIC_KEY_KEYTYPE, usernameTokenOnBehalfOfElement(username, password)); 137 * The subject asserted by this token will correspond to the {username, password} credentials. 139 public static TokenSpecification openIdConnectTokenUsernameTokenDelegation(String username, String password) { argument 141 usernameTokenOnBehalfOfElement(username, password)); 155 * @param username the UsernameToken username 160 public static Element usernameTokenOnBehalfOfElement(String username, Strin argument [all...] |
/forgerock/openam/openam-uma/src/main/java/org/forgerock/openam/uma/rest/ |
H A D | ResourceSetService.java | 121 protected Subject createSubject(String username, String realm) { argument 122 AMIdentity identity = coreWrapper.getIdentity(username, realm);
|
/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/authentication/service/ |
H A D | AMAccountLockout.java | 108 * @param username User name. 110 public void invalidPasswd(String username) { argument 113 DEBUG.message("AMAccountLockout::invalidPasswd: " + username); 121 amIdentity = AuthD.getAuth().getIdentity(IdType.USER, username, loginState.getOrgDN()); 124 userDN = normalizeDN(username); 129 warnUser = isAccountLockout.invalidPasswd(userDN, username, amIdentity, acInfo);
|
/forgerock/openam-v13/openam-core/src/main/java/org/forgerock/openam/authentication/service/protocol/ |
H A D | RemoteHttpServletRequest.java | 427 public void login(String username, String password) throws ServletException { argument 429 this._getHttpServletRequest().login(username, password);
|
/forgerock/openam-v13/openam-oauth2/src/main/java/org/forgerock/openam/oauth2/ |
H A D | OpenAMScopeValidator.java | 461 private String getUpdatedAt(String username, String realm, OAuth2Request request) throws NotFoundException { argument 478 final AMHashMap timestamps = getTimestamps(username, realm, modifyTimestampAttributeName, 501 "error searching Identities with username : " + 502 username, 516 private AMHashMap getTimestamps(String username, String realm, String modifyTimestamp, argument 524 final IdSearchResults searchResults = amIdRepo.searchIdentities(IdType.USER, username, searchConfig);
|
/forgerock/jee-agents-v3.5/jee-agents-sdk/src/main/java/com/sun/identity/agents/filter/ |
H A D | WSSUserNameTokenContentHandler.java | 112 private void setUsername(String username) { argument 113 _username = username;
|
/forgerock/openam-v13/openam-authentication/openam-auth-radius/src/main/java/com/sun/identity/authentication/modules/radius/ |
H A D | RADIUS.java | 57 * An authentication module that defers to remote radius servers to validate username and password. It includes admin 73 private String username; field in class:RADIUS 231 username = (String) sharedState.get(getUserKey()); 234 if (username == null || tmpPasswd == null) { 240 username = ((NameCallback) callbacks[0]).getName(); 244 debug.message("username: " + username); 248 storeUsernamePasswd(username, tmpPasswd); 252 radiusConn.authenticate(username, tmpPasswd); 264 setFailureID(username); [all...] |
/forgerock/openam-v13/openam-core-rest/src/main/java/org/forgerock/openam/core/rest/ |
H A D | IdentityRestUtils.java | 67 public static final String USERNAME = "username"; 78 public static void changePassword(Context serverContext, String realm, String username, String oldPassword, argument 82 AMIdentity userIdentity = new AMIdentity(token, username, IdType.USER, realm, null); 86 + "the password for user: " + username, ssoe);
|
/forgerock/openam-v13/openam-federation/OpenFM/src/main/java/com/sun/identity/liberty/ws/authnsvc/mechanism/ |
H A D | CramMD5MechanismHandler.java | 359 String username, 369 ((NameCallback)callback).setName(username); 358 fillInCallbacks(Callback[] callbacks, String username, String password) argument
|
/forgerock/openam-v13/openam-uma/src/main/java/org/forgerock/openam/uma/ |
H A D | AuthorizationRequestEndpoint.java | 354 protected AMIdentity createIdentity(String username, String realm) { argument 355 return IdUtils.getIdentity(username, realm);
|
/forgerock/openam-v13/openam-uma/src/test/java/org/forgerock/openam/uma/rest/ |
H A D | UmaPolicyServiceImplDelegationTest.java | 319 private AMIdentity userIsLoggedIn(String username, String realm) { argument 320 loggedInUserId = username; 322 return setupIdentityForUser(username, loggedInRealm); 325 private AMIdentity setupIdentityForUser(String username, String realm) { argument 327 given(loggedInUser.getUniversalId()).willReturn("id=" + username + ",ou=" + realm + ",dc=forgerock,dc=org"); 328 given(coreServicesWrapper.getIdentity(username, realm)).willReturn(loggedInUser); 332 private void accessingUriForUser(String username) { argument 333 userInUri = username; 362 private Subject createSubject(String username) { argument 363 setupIdentityForUser(username, loggedInReal [all...] |
/forgerock/openidm-v4/openidm-shell/src/main/java/org/forgerock/openidm/shell/impl/ |
H A D | HttpRemoteJsonResource.java | 100 private String username = ""; field in class:HttpRemoteJsonResource 115 * @param username Username for HTTP basic authentication 118 public HttpRemoteJsonResource(final String uri, final String username, final String password) { argument 119 this.username = username; 282 ChallengeResponse rc = new ChallengeResponse(ChallengeScheme.HTTP_BASIC, username, password); 417 * Gets the username. 419 * @return the username 422 return username; 426 * Sets the username 430 setUsername(String username) argument [all...] |
/forgerock/openidm-v4/openidm-provisioner-openicf/src/test/java/org/forgerock/openidm/provisioner/openicf/connector/ |
H A D | TestConnector.java | 79 * @param username the name based credential for authentication. 90 public Uid authenticate(ObjectClass objectClass, String username, GuardedString password, OperationOptions options) { argument 196 * Resolve an object to its {@link org.identityconnectors.framework.common.objects.Uid} based on its username. 200 * returns the {@link org.identityconnectors.framework.common.objects.Uid} corresponding to the username. 201 * Implementations method must, however, validate the username (i.e., they must throw 202 * and exception if the username does not correspond to an existing object). 204 * If the username validation fails, the 217 * @param objectClass The object class to resolve the username for. 219 * @param username the username t 230 resolveUsername(ObjectClass objectClass, String username, OperationOptions options) argument [all...] |
/forgerock/openam/openam-oauth2/src/main/java/org/forgerock/openam/oauth2/ |
H A D | OpenAMScopeValidator.java | 497 private String getUpdatedAt(String username, String realm, OAuth2Request request) throws NotFoundException { argument 514 final AMHashMap timestamps = getTimestamps(username, realm, modifyTimestampAttributeName, 537 "error searching Identities with username : " + 538 username, 552 private AMHashMap getTimestamps(String username, String realm, String modifyTimestamp, argument 560 final IdSearchResults searchResults = amIdRepo.searchIdentities(IdType.USER, username, searchConfig);
|
/forgerock/openam/openam-samples/sts-example-code/ |
H A D | RestSTSConsumer.java | 106 { "input_token_state": { "token_type": "USERNAME", "username": "unt_user1767572069", "password": "password" }, "output_token_state": { "token_type": "SAML2", "subject_confirmation": "BEARER" } } 108 { "input_token_state": { "token_type": "USERNAME", "username": "unt_user1683257432", "password": "password" }, "output_token_state": { "token_type": "SAML2", "subject_confirmation": "HOLDER_OF_KEY", "proof_token_state": { "base64EncodedCertificate": "MIICQDCCAakCBEeNB0...wWigmrW0Y0Q==" } } } 110 { "input_token_state": { "token_type": "USERNAME", "username": "unt_user1683257432", "password": "password" }, "output_token_state": { "token_type": "SAML2", "subject_confirmation": "SENDER_VOUCHES" } } 112 * @param username the username in the UsernameToken 119 public String transformUntToSAML2(String username, String password, argument 123 .username(username.getBytes(AMSTSConstants.UTF_8_CHARSET_ID)) 150 public String transformUntToCustomToken(String username, String password, JsonValue customTokenOutput) throws IOException { argument 152 .username(usernam 166 transformUntToOIDC(String username, String password, String nonce) argument [all...] |
/forgerock/openam/openam-authentication/openam-auth-push/src/main/java/org/forgerock/openam/authentication/modules/push/ |
H A D | AuthenticatorPush.java | 87 private String username; field in class:AuthenticatorPush 157 return emergencyState(callbacks, username, realm); 159 storeUsername(username); 190 private int emergencyState(Callback[] callbacks, String username, String realm) throws AuthLoginException { argument 199 userPushDeviceProfileManager.saveDeviceProfile(username, realm, device); 240 storeUsername(username); 260 storeUsername(username); 281 if (username == null && sharedState != null) { 282 username = sharedState.get(getUserKey()); 285 if (username [all...] |
/forgerock/openam/openam-authentication/openam-auth-radius/src/main/java/com/sun/identity/authentication/modules/radius/ |
H A D | RADIUS.java | 54 * An authentication module that defers to remote radius servers to validate username and password. It includes admin 70 private String username; field in class:RADIUS 231 username = (String) sharedState.get(getUserKey()); 234 if (username == null || tmpPasswd == null) { 240 username = ((NameCallback) callbacks[0]).getName(); 244 debug.message("username: " + username); 248 storeUsernamePasswd(username, tmpPasswd); 252 radiusConn.authenticate(username, tmpPasswd); 264 setFailureID(username); [all...] |