/forgerock/openam/openam-samples/sts-example-code/ |
H A D | SoapSTSInstanceConfigFactory.java | 92 mappingBuilder.addMapping(TokenType.X509, "module", CommonConstants.DEFAULT_CERT_MODULE_NAME, certContext); 193 return TokenType.X509;
|
/forgerock/web-agents-v4/source/ |
H A D | net_client_ssl.c | 152 typedef struct x509_st X509; typedef in typeref:struct:x509_st 184 #define SSL_get_peer_certificate (* (X509 * (*)(const SSL *)) ssl_sw[24].ptr) 208 #define X509_get_subject_name (* (X509_NAME * (*)(X509 *)) crypto_sw[5].ptr) 209 #define X509_get_issuer_name (* (X509_NAME * (*)(X509 *)) crypto_sw[6].ptr) 211 #define X509_free (* (void (*)(X509 *)) crypto_sw[8].ptr) 325 X509 *cert;
|
/forgerock/openam-v13/openam-oauth2/src/main/java/org/forgerock/openam/openidconnect/ |
H A D | OpenAMOpenIdConnectClientRegistrationService.java | 172 if (input.get(X509.getType()).asString() != null) { 173 clientBuilder.setX509(input.get(X509.getType()).asString()); 178 clientBuilder.setPublicKeySelector(Client.PublicKeySelector.X509.getType());
|
/forgerock/openam-v13/openam-oauth2-common/openid-connect-core/src/main/java/org/forgerock/openidconnect/ |
H A D | Client.java | 272 /** X509 */ 273 X509("x509"); enum constant in enum:Client.PublicKeySelector 410 * Gets X509 certificate for this client. 413 return get(OAuth2Constants.ShortClientAttributeNames.X509.getType()).asString(); 437 put(OAuth2Constants.ShortClientAttributeNames.X509.getType(), x509);
|
/forgerock/openam/openam-oauth2/src/main/java/org/forgerock/openidconnect/ |
H A D | Client.java | 272 /** X509 */ 273 X509("x509"); enum constant in enum:Client.PublicKeySelector 410 * Gets X509 certificate for this client. 413 return get(OAuth2Constants.ShortClientAttributeNames.X509.getType()).asString(); 437 put(OAuth2Constants.ShortClientAttributeNames.X509.getType(), x509);
|
H A D | OpenIdConnectClientRegistrationService.java | 180 if (input.get(X509.getType()).asString() != null) { 181 clientBuilder.setX509(input.get(X509.getType()).asString()); 186 clientBuilder.setPublicKeySelector(Client.PublicKeySelector.X509.getType());
|
/forgerock/openam-v13/openam-sts/openam-client-sts/src/main/java/org/forgerock/openam/sts/soap/config/user/ |
H A D | SoapDelegationConfig.java | 135 if (TokenType.X509.equals(validationConfig.getValidatedTokenType())) { 136 throw new IllegalStateException("X509 tokens are not supported as delegated token types.");
|
H A D | SoapSTSInstanceConfig.java | 211 is no X509 TokenType entry in the securityPolicyValidatedTokenConfiguration, an error will be thrown, as the presence of an 212 X509 TokenType in the securityPolicyValidatedTokenConfiguration determines the deployment of the wss.SoapCertificateTokenValidator, 215 Note that specifying a X509 TokenType entry in the securityPolicyValidatedTokenConfiguration will insure that any client-presented 220 throw new IllegalStateException("Configured STS instance does not specify a X509 TokenType in the " + 238 if (TokenType.X509.equals(validationConfig.getValidatedTokenType())) {
|
/forgerock/openam-v13/openam-sts/openam-token-service-sts/src/test/java/org/forgerock/openam/sts/tokengeneration/saml2/ |
H A D | RestSTSInstanceStateProviderTest.java | 141 TokenType.X509,
|
H A D | RestSTSInstanceStateServiceListenerTest.java | 147 TokenType.X509,
|
H A D | SAML2TokenGenerationImplTest.java | 250 TokenType.X509,
|
/forgerock/openam/openam-sts/openam-client-sts/src/main/java/org/forgerock/openam/sts/soap/config/user/ |
H A D | SoapDelegationConfig.java | 136 if (TokenType.X509.equals(validationConfig.getValidatedTokenType())) { 137 throw new IllegalStateException("X509 tokens are not supported as delegated token types.");
|
H A D | SoapSTSInstanceConfig.java | 211 is no X509 TokenType entry in the securityPolicyValidatedTokenConfiguration, an error will be thrown, as the presence of an 212 X509 TokenType in the securityPolicyValidatedTokenConfiguration determines the deployment of the wss.SoapCertificateTokenValidator, 215 Note that specifying a X509 TokenType entry in the securityPolicyValidatedTokenConfiguration will insure that any client-presented 220 throw new IllegalStateException("Configured STS instance does not specify a X509 TokenType in the " + 238 if (TokenType.X509.equals(validationConfig.getValidatedTokenType())) {
|
/forgerock/openam/openam-sts/openam-token-service-sts/src/test/java/org/forgerock/openam/sts/tokengeneration/saml2/ |
H A D | RestSTSInstanceStateProviderTest.java | 141 TokenType.X509,
|
H A D | RestSTSInstanceStateServiceListenerTest.java | 147 TokenType.X509,
|
H A D | SAML2TokenGenerationImplTest.java | 250 TokenType.X509,
|
/forgerock/openam-v13/openam-sts/openam-soap-sts/openam-soap-sts-server/src/main/java/org/forgerock/openam/sts/soap/config/ |
H A D | SoapSTSInstanceModule.java | 253 case X509: 256 TokenType.X509, 273 SoapCertificateTokenValidator will be plugged in as the SecurityConstants.SIGNATURE_TOKEN_VALIDATOR (in the X509 case above).
|
/forgerock/openam/openam-sts/openam-soap-sts/openam-soap-sts-server/src/main/java/org/forgerock/openam/sts/soap/config/ |
H A D | SoapSTSInstanceModule.java | 253 case X509: 256 TokenType.X509, 273 SoapCertificateTokenValidator will be plugged in as the SecurityConstants.SIGNATURE_TOKEN_VALIDATOR (in the X509 case above).
|
/forgerock/openam-v13/openam-oauth2-common/oauth2-core/src/main/java/org/forgerock/oauth2/core/ |
H A D | OAuth2Constants.java | 1029 X509("x509"), enum constant in enum:OAuth2Constants.ShortClientAttributeNames
|
/forgerock/openam-v13/openam-sts/openam-rest-sts/src/main/java/org/forgerock/openam/sts/rest/operation/translate/ |
H A D | TokenTransformFactoryImpl.java | 150 } else if (TokenType.X509.getId().equals(inputTokenType.getId())) {
|
/forgerock/openam/openam-core/src/main/java/org/forgerock/openam/oauth2/ |
H A D | OAuth2Constants.java | 1005 X509("x509"), enum constant in enum:OAuth2Constants.ShortClientAttributeNames
|
/forgerock/openam/openam-sts/openam-rest-sts/src/main/java/org/forgerock/openam/sts/rest/operation/translate/ |
H A D | TokenTransformFactoryImpl.java | 150 } else if (TokenType.X509.getId().equals(inputTokenType.getId())) {
|
/forgerock/openam-v13/openam-sts/openam-client-sts/src/test/java/org/forgerock/openam/sts/rest/config/user/ |
H A D | RestSTSInstanceConfigTest.java | 383 TokenType.X509,
|
/forgerock/openam-v13/openam-sts/openam-client-sts/src/test/java/org/forgerock/openam/sts/soap/config/user/ |
H A D | SoapSTSInstanceConfigTest.java | 372 builder.addSecurityPolicyTokenValidationConfiguration(TokenType.X509, true);
|
/forgerock/openam-v13/openam-sts/openam-rest-sts/src/main/java/org/forgerock/openam/sts/rest/operation/ |
H A D | TokenRequestMarshallerImpl.java | 109 } else if (TokenType.X509.name().equals(tokenType)) { 382 * @throws org.forgerock.openam.sts.TokenMarshalException if the client's X509 token cannot be obtained from the 430 // Filter the certs on the request to just the X509 ones and return as an array. 454 "Exception caught marshalling X509 cert from value set in " + offloadedTlsClientCertKey + " header: " + e, e);
|