/forgerock/openam-v13/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/policy/conditions/ |
H A D | EntitlementConditionMigrator.java | 17 package org.forgerock.openam.upgrade.steps.policy.conditions; 23 * Migrator for migrating old policy subject conditions to new entitlement environment conditions. 30 * Migrates the specified old policy environment condition to a new entitlement environment condition. 34 * @return A new {@code EntitlementSubject} of the migrated old policy environment condition
|
H A D | SubjectConditionMigrator.java | 17 package org.forgerock.openam.upgrade.steps.policy.conditions; 23 * Migrator for migrating old policy subject conditions to new entitlement subject conditions. 30 * Migrates the specified old policy subject condition to a new entitlement subject condition. 34 * @return A new {@code EntitlementSubject} of the migrated old policy subject condition
|
/forgerock/openam/openam-console/src/main/java/com/sun/identity/console/policy/ |
H A D | PMAuthenticatedUsersSubjectAddViewBean.java | 29 package com.sun.identity.console.policy; 37 "/console/policy/PMAuthenticatedUsersSubjectAdd.jsp"; 40 * Creates a policy creation view bean.
|
H A D | SubjectNoneAddViewBean.java | 29 package com.sun.identity.console.policy; 36 "/console/policy/SubjectNoneAdd.jsp"; 43 * Creates a policy creation view bean.
|
H A D | PMDefaultTimeConditionEditViewBean.java | 29 package com.sun.identity.console.policy; 36 import com.sun.identity.console.policy.model.CachedPolicy; 37 import com.sun.identity.console.policy.model.PolicyModel; 38 import com.sun.identity.console.policy.model.TimePolicyModelImpl; 39 import com.sun.identity.policy.NameNotFoundException; 40 import com.sun.identity.policy.Policy; 41 import com.sun.identity.policy.interfaces.Condition; 42 import com.sun.identity.policy.plugins.SimpleTimeCondition; 52 "/console/policy/PMDefaultTimeConditionEdit.jsp"; 96 Policy policy [all...] |
H A D | RuleAddViewBean.java | 29 package com.sun.identity.console.policy; 36 import com.sun.identity.console.policy.model.CachedPolicy; 37 import com.sun.identity.console.policy.model.PolicyModel; 38 import com.sun.identity.policy.ActionSchema; 39 import com.sun.identity.policy.NameAlreadyExistsException; 40 import com.sun.identity.policy.InvalidNameException; 41 import com.sun.identity.policy.Policy; 42 import com.sun.identity.policy.Rule; 53 "/console/policy/RuleAdd.jsp"; 64 * Creates a policy creatio [all...] |
/forgerock/openam/openam-console/src/main/java/com/sun/identity/console/policy/model/ |
H A D | IdentitySubjectModel.java | 29 package com.sun.identity.console.policy.model;
|
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/ |
H A D | PolicyLockFactory.java | 16 package com.sun.identity.policy; 23 * This factory is intended to be used when concurrent policy changes are not atomic. The retrieved lock
|
H A D | ValidValues.java | 32 package com.sun.identity.policy;
|
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/client/ |
H A D | PolicyNotificationHandler.java | 31 package com.sun.identity.policy.client; 36 import com.sun.identity.policy.PolicyException; 37 import com.sun.identity.policy.remote.PolicyNotification; 38 import com.sun.identity.policy.remote.PolicyService; 42 * Class that handles policy notifications from 44 * is registered as <code>NotificationHandler</code> for policy 105 * Processes a policy notification. Delegates to 109 * @param pn policy notification to process 116 + "Error while handling policy notification",
|
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/plugins/ |
H A D | AuthenticatedUsers.java | 32 package com.sun.identity.policy.plugins; 42 import com.sun.identity.policy.ValidValues; 43 import com.sun.identity.policy.interfaces.Subject; 44 import com.sun.identity.policy.Syntax; 74 * @see com.sun.identity.policy.Syntax
|
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/remote/ |
H A D | AdvicesHandleableByAMRequest.java | 30 package com.sun.identity.policy.remote; 41 * the names of policy advices that could be handled by OpenAM
|
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/policy/ |
H A D | PolicyWildcardTest.java | 26 package com.sun.identity.policy; 100 Policy policy = new Policy(POLICY_NAME_USER, "user - discard", false, true); 101 policy.addRule(Util.createAGetPostRule(URL_RESOURCE_USER1, URL_RESOURCE_USER1)); 102 policy.addRule(Util.createAGetPostRule(URL_RESOURCE_USER2, URL_RESOURCE_USER2)); 103 policy.addRule(Util.createAGetPostRule(URL_RESOURCE_USER3, URL_RESOURCE_USER3)); 104 policy.addSubject("AllUsers", Util.createAuthenticatedUsersSubject(pm)); 105 pm.addPolicy(policy); 107 policy = new Policy(POLICY_NAME_ADMIN, "admin - discard", false, true); 108 policy.addRule(Util.createAGetPostRule(URL_RESOURCE_ADMIN1, URL_RESOURCE_ADMIN1)); 109 policy [all...] |
/forgerock/openam/openam-sts/openam-soap-sts/openam-soap-sts-server/src/main/java/org/forgerock/openam/sts/soap/policy/am/ |
H A D | OpenAMSessionTokenServerAssertionBuilder.java | 17 package org.forgerock.openam.sts.soap.policy.am; 18 import org.apache.cxf.ws.policy.PolicyConstants; 19 import org.apache.cxf.ws.security.policy.SP12Constants; 23 import org.apache.cxf.ws.security.policy.SPConstants; 30 * Registered with the org.apache.cxf.ws.policy.AssertionBuilderRegistry, obtained via the cxf Bus in SoapSTSLifecycleImpl,
|
/forgerock/openam/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/policy/conditions/ |
H A D | EntitlementConditionMigrator.java | 17 package org.forgerock.openam.upgrade.steps.policy.conditions; 23 * Migrator for migrating old policy subject conditions to new entitlement environment conditions. 30 * Migrates the specified old policy environment condition to a new entitlement environment condition. 34 * @return A new {@code EntitlementSubject} of the migrated old policy environment condition
|
H A D | SubjectConditionMigrator.java | 17 package org.forgerock.openam.upgrade.steps.policy.conditions; 23 * Migrator for migrating old policy subject conditions to new entitlement subject conditions. 30 * Migrates the specified old policy subject condition to a new entitlement subject condition. 34 * @return A new {@code EntitlementSubject} of the migrated old policy subject condition
|
/forgerock/openam-v13/openam-console/src/main/java/com/sun/identity/console/policy/ |
H A D | PMDefaultTimeConditionEditViewBean.java | 29 package com.sun.identity.console.policy; 36 import com.sun.identity.console.policy.model.CachedPolicy; 37 import com.sun.identity.console.policy.model.PolicyModel; 38 import com.sun.identity.console.policy.model.TimePolicyModelImpl; 39 import com.sun.identity.policy.NameNotFoundException; 40 import com.sun.identity.policy.Policy; 41 import com.sun.identity.policy.interfaces.Condition; 42 import com.sun.identity.policy.plugins.SimpleTimeCondition; 52 "/console/policy/PMDefaultTimeConditionEdit.jsp"; 96 Policy policy [all...] |
H A D | RuleAddViewBean.java | 29 package com.sun.identity.console.policy; 36 import com.sun.identity.console.policy.model.CachedPolicy; 37 import com.sun.identity.console.policy.model.PolicyModel; 38 import com.sun.identity.policy.ActionSchema; 39 import com.sun.identity.policy.NameAlreadyExistsException; 40 import com.sun.identity.policy.InvalidNameException; 41 import com.sun.identity.policy.Policy; 42 import com.sun.identity.policy.Rule; 53 "/console/policy/RuleAdd.jsp"; 64 * Creates a policy creatio [all...] |
/forgerock/openam-v13/openam-federation/OpenFM/src/test/java/com/sun/identity/entitlement/ |
H A D | IdentityGroupToEntitlementGroupTest.java | 36 import com.sun.identity.policy.Policy; 37 import com.sun.identity.policy.PolicyException; 38 import com.sun.identity.policy.PolicyManager; 39 import com.sun.identity.policy.Rule; 40 import com.sun.identity.policy.SubjectTypeManager; 41 import com.sun.identity.policy.interfaces.Subject; 87 Policy policy = new Policy("IdentityGroupToEntitlementGroupTest", 89 policy.addRule(createRule()); 90 policy.addSubject("subject", createSubject(pm)); 93 PrivilegeUtils.policyObjectToPrivileges(policy); [all...] |
/forgerock/openam/openam-entitlements/src/main/java/com/sun/identity/entitlement/xacml3/ |
H A D | XACMLReaderWriter.java | 95 for (Policy policy : getPoliciesFromPolicySet(policySet)) { 97 if (isReferralPolicy(policy)) { 98 privilegeSet.addReferralPrivilege(policyToReferral(policy)); 102 String applicationName = getApplicationNameFromPolicy(policy); 106 application = policyToApplication(policy); 111 // Create one resourceType instance (with a dummy uuid) per policy read from the XACML file. 115 getResourceNamesFromPolicy(policy), 116 getActionValuesFromPolicy(policy), 120 Privilege privilege = policyToPrivilege(policy); 147 Policy policy [all...] |
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/entitlement/ |
H A D | IdentityGroupToEntitlementGroupTest.java | 36 import com.sun.identity.policy.Policy; 37 import com.sun.identity.policy.PolicyException; 38 import com.sun.identity.policy.PolicyManager; 39 import com.sun.identity.policy.Rule; 40 import com.sun.identity.policy.SubjectTypeManager; 41 import com.sun.identity.policy.interfaces.Subject; 87 Policy policy = new Policy("IdentityGroupToEntitlementGroupTest", 89 policy.addRule(createRule()); 90 policy.addSubject("subject", createSubject(pm)); 93 PrivilegeUtils.policyObjectToPrivileges(policy); [all...] |
/forgerock/opendj2/tests/unit-tests-testng/src/server/org/opends/server/core/ |
H A D | SubentryPasswordPolicyTestCase.java | 54 * A set of test cases for the Directory Server subentry password policy. 131 * initialize a password policy. 134 * initialize a password policy. 248 * Ensures that password policy creation will fail when given 251 * @param e The entry containing an invalid password policy 273 * Ensures that password policy constructed from subentry 287 // should differ from default password policy. 320 PasswordPolicy policy = (PasswordPolicy) DirectoryServer.getAuthenticationPolicy( 322 assertNotNull(policy); 325 assertEquals(policy [all...] |
/forgerock/opendj2.6.2/tests/unit-tests-testng/src/server/org/opends/server/core/ |
H A D | SubentryPasswordPolicyTestCase.java | 55 * A set of test cases for the Directory Server subentry password policy. 132 * initialize a password policy. 135 * initialize a password policy. 249 * Ensures that password policy creation will fail when given 252 * @param e The entry containing an invalid password policy 274 * Ensures that password policy constructed from subentry 288 // should differ from default password policy. 321 PasswordPolicy policy = (PasswordPolicy) DirectoryServer.getAuthenticationPolicy( 323 assertNotNull(policy); 326 assertEquals(policy [all...] |
/forgerock/opendj2-hg/tests/unit-tests-testng/src/server/org/opends/server/core/ |
H A D | SubentryPasswordPolicyTestCase.java | 54 * A set of test cases for the Directory Server subentry password policy. 131 * initialize a password policy. 134 * initialize a password policy. 248 * Ensures that password policy creation will fail when given 251 * @param e The entry containing an invalid password policy 273 * Ensures that password policy constructed from subentry 287 // should differ from default password policy. 320 PasswordPolicy policy = (PasswordPolicy) DirectoryServer.getAuthenticationPolicy( 322 assertNotNull(policy); 325 assertEquals(policy [all...] |
/forgerock/openam-v13/openam-sts/openam-soap-sts/openam-soap-sts-client/src/main/java/org/forgerock/openam/sts/soap/policy/am/ |
H A D | OpenAMSessionTokenClientInterceptor.java | 17 package org.forgerock.openam.sts.soap.policy.am; 21 import org.apache.cxf.ws.policy.AssertionInfo; 22 import org.apache.cxf.ws.policy.AssertionInfoMap; 23 import org.apache.cxf.ws.security.policy.SP12Constants; 24 import org.apache.cxf.ws.security.policy.model.Token; 33 * add the token, but rather assert the corresponding policy. 60 * Called to assert the relevant tokens. Asserting tokens means asserting that the corresponding policy has been 62 * has been satisfied, and also the SupportingToken policy (the OpenAMSessionToken policy always defines a SupportingToken), 87 @see org.apache.cxf.ws.security.policy [all...] |