/forgerock/openidm-v4/openidm-config/src/main/java/org/forgerock/openidm/config/persistence/ |
H A D | ConfigBootstrapHelper.java | 301 * @param alias the config factory pid alias 306 public static String getId(String alias, String pid, String factoryPid) { argument 309 // If there is an alias for factory config is available, make a nicer ID then the internal PID 310 return unqualifiedFactoryPid != null && alias != null 311 ? unqualifiedFactoryPid + "/" + alias
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/key/ |
H A D | KeyUtil.java | 120 * Returns the host entity's signing certificate alias. 123 * certificate alias 130 String alias = (String)list.get(0); 131 if (alias != null && alias.length() != 0 && keyProvider != null) { 132 return alias; 165 for (String alias : aliases) { 166 if (StringUtils.isNotEmpty(alias) && keyProvider != null) { 167 decryptionKeys.add(keyProvider.getPrivateKey(alias));
|
/forgerock/openam-v13/openam-tools/openam-diagnostics/openam-diagnostics-plugins/src/main/resources/ |
H A D | ServerConfigService_de.properties | 73 #cert alias 75 saml-cert-alias-mismatch=Kein Zertifikat mit diesem Alias: {0} 76 saml-validate-cert-alias=Validieren des SAML-Zertifikatalias. 119 svr-org-alias-entry=Servereintrag in Unternehmensalias 120 svr-entry-not-in-org-alias=Serverinstanz hat keinen Eintrag in Unternehmensalias: {0} 131 site-org-alias-check=Validieren des Site-Eintrags gegen das Unternehmensalias 132 site-org-alias-fail=Kein Eintrag in Unternehmensalias f\u00fcr Site: {0}
|
H A D | ServerConfigService_es.properties | 73 #cert alias 75 saml-cert-alias-mismatch=No hay certificado para el alias especificado: {0} 76 saml-validate-cert-alias=Validando alias de cert. SAML. 119 svr-org-alias-entry=Entrada de servidor en Alias de organizaci\u00f3n 120 svr-entry-not-in-org-alias=La instancia del servidor no tiene entrada en el Alias de organizaci\u00f3n: {0} 131 site-org-alias-check=Validando la entrada del sitio compar\u00e1ndola con el Alias de organizaci\u00f3n 132 site-org-alias-fail=No existe ninguna entrada en Alias de organizaci\u00f3n para el sitio: {0}
|
H A D | ServerConfigService_fr.properties | 73 #cert alias 75 saml-cert-alias-mismatch=Pas de certificat avec l\u2019alias donn\u00e9\u00a0: {0} 76 saml-validate-cert-alias=Validation de l\u2019alias cert SAML. 119 svr-org-alias-entry=Entr\u00e9e de serveur dans l\u2019alias d\u2019organisation 120 svr-entry-not-in-org-alias=L\u2019instance de serveur ne poss\u00e8de pas d\u2019entr\u00e9e dans l\u2019alias d\u2019organisation : {0} 131 site-org-alias-check=Validation d\u2019entr\u00e9e de site en fonction de l\u2019alias d\u2019organisation 132 site-org-alias-fail=Pas d\u2019entr\u00e9e dans l\u2019alias d\u2019organisation pour le site : {0}
|
H A D | ServerConfigService_zh.properties | 73 #cert alias 75 saml-cert-alias-mismatch=\u6ca1\u6709\u4f7f\u7528\u7ed9\u5b9a\u522b\u540d\u7684\u8bc1\u4e66: {0} 76 saml-validate-cert-alias=\u6b63\u5728\u9a8c\u8bc1 SAML \u8bc1\u4e66\u522b\u540d\u3002 119 svr-org-alias-entry=\u201c\u7ec4\u7ec7\u522b\u540d\u201d\u4e2d\u7684\u670d\u52a1\u5668\u6761\u76ee 120 svr-entry-not-in-org-alias=\u670d\u52a1\u5668\u5b9e\u4f8b\u5728\u201c\u7ec4\u7ec7\u522b\u540d\u201d\u4e2d\u6ca1\u6709\u6761\u76ee: {0} 131 site-org-alias-check=\u6b63\u5728\u9488\u5bf9\u201c\u7ec4\u7ec7\u522b\u540d\u201d\u9a8c\u8bc1\u7ad9\u70b9\u6761\u76ee 132 site-org-alias-fail=\u201c\u7ec4\u7ec7\u522b\u540d\u201d\u4e2d\u6ca1\u6709\u4ee5\u4e0b\u7ad9\u70b9\u7684\u6761\u76ee: {0}
|
H A D | ServerConfigService_zh_TW.properties | 73 #cert alias 75 saml-cert-alias-mismatch=\u6c92\u6709\u5177\u6709\u6307\u5b9a\u5225\u540d\u7684\u6191\u8b49: {0} 76 saml-validate-cert-alias=\u6b63\u5728\u9a57\u8b49 SAML \u6191\u8b49\u5225\u540d\u3002 119 svr-org-alias-entry=\u7d44\u7e54\u5225\u540d\u4e2d\u7684\u4f3a\u670d\u5668\u9805\u76ee 120 svr-entry-not-in-org-alias=\u7d44\u7e54\u5225\u540d\u4e2d\u6c92\u6709\u4f3a\u670d\u5668\u5be6\u4f8b\u7684\u4efb\u4f55\u9805\u76ee: {0} 131 site-org-alias-check=\u6b63\u5728\u91dd\u5c0d\u7d44\u7e54\u5225\u540d\u9a57\u8b49\u7ad9\u9ede\u9805\u76ee 132 site-org-alias-fail=[\u7d44\u7e54\u5225\u540d] \u4e2d\u6c92\u6709\u4ee5\u4e0b\u7ad9\u9ede\u7684\u9805\u76ee: {0}
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/sae/api/ |
H A D | SecureAttrs.java | 220 * SAE Config : Private key alias for asymmetric signing. Alias 343 * @param secret Shared secret (symmetric) Private key alias (asymmetric) 359 * @param secret Shared secret (symmetric) Private key alias (asymmetric) * @param encSecret The encryption secret (symmetric) or Public 360 * Key alias (asymmetric) 442 * Key alias (asymmetric) 539 * Key alias (asymmetric) 599 private X509Certificate getPublicKey(String alias) argument 601 return certs.getPublicKey(alias); 1028 public PrivateKey getPrivateKey(String alias); argument 1029 public X509Certificate getPublicKey(String alias); argument 1071 getPrivateKey(String alias) argument 1082 getPublicKey(String alias) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/sae/api/ |
H A D | SecureAttrs.java | 223 * SAE Config : Private key alias for asymmetric signing. Alias 346 * @param secret Shared secret (symmetric) Private key alias (asymmetric) 362 * @param secret Shared secret (symmetric) Private key alias (asymmetric) * @param encSecret The encryption secret (symmetric) or Public 363 * Key alias (asymmetric) 445 * Key alias (asymmetric) 542 * Key alias (asymmetric) 602 private X509Certificate getPublicKey(String alias) argument 604 return certs.getPublicKey(alias); 1031 public PrivateKey getPrivateKey(String alias); argument 1032 public X509Certificate getPublicKey(String alias); argument 1074 getPrivateKey(String alias) argument 1085 getPublicKey(String alias) argument [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/liberty/ws/security/ |
H A D | SecurityUtils.java | 120 String alias = aliasIssuer.substring(0, index).trim(); 121 if (alias.length() > 0) { 122 trustedCACertAliases.add(alias); 125 alias +" to trustedCACertAliases"); 130 issuerTrustedCACertAliases.put(issuer, alias); 133 "[" + issuer + ", " + alias + 241 " signing cert alias = " + certAlias);
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | AuthnQueryUtil.java | 353 String alias = SAML2Utils.getSigningCertAlias(realm, spEntityID, 356 PrivateKey signingKey = keyProvider.getPrivateKey(alias); 364 signingCert = keyProvider.getX509Certificate(alias); 418 String alias = SAML2Utils.getSigningCertAlias(realm, 421 PrivateKey signingKey = keyProvider.getPrivateKey(alias); 429 signingCert = keyProvider.getX509Certificate(alias);
|
H A D | AssertionIDRequestUtil.java | 568 String alias = SAML2Utils.getSigningCertAlias(realm, spEntityID, 571 PrivateKey signingKey = keyProvider.getPrivateKey(alias); 574 signingCert = keyProvider.getX509Certificate(alias); 627 String alias = SAML2Utils.getSigningCertAlias(realm, samlAuthorityEntityID, role); 632 signingKey = keyProvider.getPrivateKey(alias); 634 signingKey = keyProvider.getPrivateKey(alias, encryptedKeyPass); 638 signingCert = keyProvider.getX509Certificate(alias);
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/liberty/ws/security/ |
H A D | SecurityUtils.java | 120 String alias = aliasIssuer.substring(0, index).trim(); 121 if (alias.length() > 0) { 122 trustedCACertAliases.add(alias); 125 alias +" to trustedCACertAliases"); 130 issuerTrustedCACertAliases.put(issuer, alias); 133 "[" + issuer + ", " + alias + 241 " signing cert alias = " + certAlias);
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | AuthnQueryUtil.java | 355 String alias = SAML2Utils.getSigningCertAlias(realm, spEntityID, 358 PrivateKey signingKey = keyProvider.getPrivateKey(alias); 366 signingCert = keyProvider.getX509Certificate(alias); 420 String alias = SAML2Utils.getSigningCertAlias(realm, 423 PrivateKey signingKey = keyProvider.getPrivateKey(alias); 431 signingCert = keyProvider.getX509Certificate(alias);
|
H A D | AssertionIDRequestUtil.java | 570 String alias = SAML2Utils.getSigningCertAlias(realm, spEntityID, 573 PrivateKey signingKey = keyProvider.getPrivateKey(alias); 576 signingCert = keyProvider.getX509Certificate(alias); 629 String alias = SAML2Utils.getSigningCertAlias(realm, samlAuthorityEntityID, role); 634 signingKey = keyProvider.getPrivateKey(alias); 636 signingKey = keyProvider.getPrivateKey(alias, encryptedKeyPass); 640 signingCert = keyProvider.getX509Certificate(alias);
|
/forgerock/openidm-v4/openidm-security/src/main/java/org/forgerock/openidm/security/ |
H A D | SecurityManager.java | 163 String propValue = Param.getProperty("openidm.https.keystore.cert.alias"); 177 // Check if the default alias exists in keystore and truststore 285 private void createDefaultKeystoreAndTruststoreEntries(final String alias, argument 292 privateKeyProvider.createDefaultEntry(alias); 297 keystoreCertProvider.readInstance(new RootContext(), alias, readRequest); 300 final CreateRequest createRequest = Requests.newCreateRequest("/truststore/cert", alias,
|
/forgerock/openam/openam-oauth2/src/main/java/org/forgerock/oauth2/core/ |
H A D | RealmOAuth2ProviderSettings.java | 614 logger.warning("Empty ECDSA signing key alias"); 619 logger.warning("Invalid ECDSA signing key alias mapping: " + algorithmAlias); 622 String alias = aliasSplit[1]; 628 jwks.add(createECJWK(alias, (ECPublicKey) key, KeyUse.SIG)); 643 static Map<String, Object> createRSAJWK(String alias, RSAPublicKey key, KeyUse use, String alg) argument 645 String kid = Hash.hash(alias + key.getModulus().toString() + key.getPublicExponent().toString()); 653 static Map<String, Object> createECJWK(String alias, ECPublicKey key, KeyUse use) throws ServerException { argument 657 String kid = Hash.hash(alias + ':' + curve.getStandardName() + ':' + x.toString() + ':' + y.toString()); 666 String alias; 668 alias [all...] |
/forgerock/openam-v13/openam-rest/src/test/java/org/forgerock/openam/rest/ |
H A D | RealmContextFilterTest.java | 511 private void mockDnsAlias(String alias, String realm) throws Exception { argument 512 mockRealmAlias(alias, realm); 516 private void mockInvalidDnsAlias(String alias) throws Exception { argument 517 mockInvalidRealmAlias(alias); 521 private void mockRealmAlias(String alias, String realm) throws Exception { argument 522 given(coreWrapper.getOrganization(any(SSOToken.class), eq(alias))).willReturn(realm); 527 private void mockInvalidRealmAlias(String alias) throws Exception { argument 528 doThrow(IdRepoException.class).when(coreWrapper).getOrganization(any(SSOToken.class), eq(alias));
|
/forgerock/openam/openam-rest/src/test/java/org/forgerock/openam/rest/ |
H A D | RealmContextFilterTest.java | 532 private void mockDnsAlias(String alias, String realm) throws Exception { argument 533 mockRealmAlias(alias, realm); 537 private void mockInvalidDnsAlias(String alias) throws Exception { argument 538 mockInvalidRealmAlias(alias); 542 private void mockRealmAlias(String alias, String realm) throws Exception { argument 543 given(coreWrapper.getOrganization(any(SSOToken.class), eq(alias))).willReturn(realm); 548 private void mockInvalidRealmAlias(String alias) throws Exception { argument 549 doThrow(IdRepoException.class).when(coreWrapper).getOrganization(any(SSOToken.class), eq(alias));
|
/forgerock/openam/openam-core/src/test/java/org/forgerock/openam/core/realms/ |
H A D | RealmTestHelper.java | 151 * Mocks a {@link Realm} that with an alias. 153 * @param alias The alias of the realm. 157 public Realm mockRealmAlias(String alias, String... realmParts) { argument 160 when(realmLookup.lookup(alias)).thenReturn(realm);
|
/forgerock/opendj-b2.6/src/server/org/opends/server/util/cli/ |
H A D | LDAPConnectionConsoleInteraction.java | 1230 String alias = aliasesEnum.nextElement(); 1231 if (keystore.isKeyEntry(alias)) 1234 .getCertificate(alias); 1237 INFO_LDAP_CONN_PROMPT_SECURITY_CERTIFICATE_ALIAS.get(alias, 1239 .success(alias)); 1587 String alias = chain[i].getSubjectDN().getName(); 1590 truststore.setCertificateEntry(alias, chain[i]); 1692 String alias = chain[i].getSubjectDN().getName(); 1693 ts.setCertificateEntry(alias, chain[i]);
|
/forgerock/opendj2/src/server/org/opends/server/util/cli/ |
H A D | LDAPConnectionConsoleInteraction.java | 1229 String alias = aliasesEnum.nextElement(); 1230 if (keystore.isKeyEntry(alias)) 1233 .getCertificate(alias); 1236 INFO_LDAP_CONN_PROMPT_SECURITY_CERTIFICATE_ALIAS.get(alias, 1238 .success(alias)); 1586 String alias = chain[i].getSubjectDN().getName(); 1589 truststore.setCertificateEntry(alias, chain[i]); 1691 String alias = chain[i].getSubjectDN().getName(); 1692 ts.setCertificateEntry(alias, chain[i]);
|
/forgerock/opendj2.6.2/src/server/org/opends/server/util/cli/ |
H A D | LDAPConnectionConsoleInteraction.java | 1230 String alias = aliasesEnum.nextElement(); 1231 if (keystore.isKeyEntry(alias)) 1234 .getCertificate(alias); 1237 INFO_LDAP_CONN_PROMPT_SECURITY_CERTIFICATE_ALIAS.get(alias, 1239 .success(alias)); 1587 String alias = chain[i].getSubjectDN().getName(); 1590 truststore.setCertificateEntry(alias, chain[i]); 1692 String alias = chain[i].getSubjectDN().getName(); 1693 ts.setCertificateEntry(alias, chain[i]);
|
/forgerock/opendj2-jel-hg/src/server/org/opends/server/util/cli/ |
H A D | LDAPConnectionConsoleInteraction.java | 1230 String alias = aliasesEnum.nextElement(); 1231 if (keystore.isKeyEntry(alias)) 1234 .getCertificate(alias); 1237 INFO_LDAP_CONN_PROMPT_SECURITY_CERTIFICATE_ALIAS.get(alias, 1239 .success(alias)); 1587 String alias = chain[i].getSubjectDN().getName(); 1590 truststore.setCertificateEntry(alias, chain[i]); 1692 String alias = chain[i].getSubjectDN().getName(); 1693 ts.setCertificateEntry(alias, chain[i]);
|
/forgerock/opendj2-hg/src/server/org/opends/server/util/cli/ |
H A D | LDAPConnectionConsoleInteraction.java | 1229 String alias = aliasesEnum.nextElement(); 1230 if (keystore.isKeyEntry(alias)) 1233 .getCertificate(alias); 1236 INFO_LDAP_CONN_PROMPT_SECURITY_CERTIFICATE_ALIAS.get(alias, 1238 .success(alias)); 1586 String alias = chain[i].getSubjectDN().getName(); 1589 truststore.setCertificateEntry(alias, chain[i]); 1691 String alias = chain[i].getSubjectDN().getName(); 1692 ts.setCertificateEntry(alias, chain[i]);
|