Searched refs:policy (Results 201 - 225 of 1089) sorted by relevance

1234567891011>>

/forgerock/openam/openam-console/src/main/java/com/sun/identity/console/policy/
H A DResponseProviderEditViewBean.java29 package com.sun.identity.console.policy;
36 import com.sun.identity.console.policy.model.PolicyModel;
37 import com.sun.identity.console.policy.model.CachedPolicy;
38 import com.sun.identity.policy.NameAlreadyExistsException;
39 import com.sun.identity.policy.NameNotFoundException;
40 import com.sun.identity.policy.Policy;
41 import com.sun.identity.policy.interfaces.ResponseProvider;
52 "/console/policy/ResponseProviderEdit.jsp";
62 * Creates a policy creation view bean.
102 "page.title.policy
[all...]
H A DRuleEditViewBean.java29 package com.sun.identity.console.policy;
36 import com.sun.identity.console.policy.model.CachedPolicy;
37 import com.sun.identity.console.policy.model.PolicyModel;
38 import com.sun.identity.policy.ActionSchema;
39 import com.sun.identity.policy.NameAlreadyExistsException;
40 import com.sun.identity.policy.NameNotFoundException;
41 import com.sun.identity.policy.InvalidNameException;
42 import com.sun.identity.policy.Policy;
43 import com.sun.identity.policy.Rule;
55 "/console/policy/RuleEdi
[all...]
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/plugins/
H A DSubjectReferentialIntegrityPlugin.java30 package com.sun.identity.policy.plugins;
45 import com.sun.identity.policy.Policy;
46 import com.sun.identity.policy.PolicyConfig;
47 import com.sun.identity.policy.PolicyException;
48 import com.sun.identity.policy.PolicyManager;
49 import com.sun.identity.policy.PolicyUtils;
50 import com.sun.identity.policy.interfaces.Subject;
94 Policy policy;
109 * find out from org policy config that is the directory
147 policy
[all...]
/forgerock/openam-v13/openam-federation/OpenFM/src/test/java/com/sun/identity/entitlement/opensso/
H A DPrivilegePolicyMapping.java38 import com.sun.identity.policy.ConditionTypeManager;
39 import com.sun.identity.policy.Policy;
40 import com.sun.identity.policy.PolicyException;
41 import com.sun.identity.policy.PolicyManager;
42 import com.sun.identity.policy.Rule;
43 import com.sun.identity.policy.SubjectTypeManager;
44 import com.sun.identity.policy.interfaces.Condition;
45 import com.sun.identity.policy.interfaces.Subject;
46 import com.sun.identity.policy.plugins.PrivilegeCondition;
47 import com.sun.identity.policy
73 private Policy policy; field in class:PrivilegePolicyMapping
[all...]
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/entitlement/opensso/
H A DPrivilegePolicyMapping.java38 import com.sun.identity.policy.ConditionTypeManager;
39 import com.sun.identity.policy.Policy;
40 import com.sun.identity.policy.PolicyException;
41 import com.sun.identity.policy.PolicyManager;
42 import com.sun.identity.policy.Rule;
43 import com.sun.identity.policy.SubjectTypeManager;
44 import com.sun.identity.policy.interfaces.Condition;
45 import com.sun.identity.policy.interfaces.Subject;
46 import com.sun.identity.policy.plugins.PrivilegeCondition;
47 import com.sun.identity.policy
73 private Policy policy; field in class:PrivilegePolicyMapping
[all...]
/forgerock/opendj-b2.6/src/server/org/opends/server/extensions/
H A DPasswordPolicySubentryVirtualAttributeProvider.java111 AuthenticationPolicy policy = null;
115 policy = AuthenticationPolicy.forUser(entry, false);
120 // retrieve password policy, log this.
126 "policy for user %s: %s",
132 if (policy == null)
134 // No authentication policy: debug log this as an error since all
135 // entries should have at least the default password policy.
138 TRACER.debugError("No applicable password policy for user %s", entry
142 else if (policy.isPasswordPolicy())
146 DN policyDN = policy
[all...]
/forgerock/opendj2/src/server/org/opends/server/extensions/
H A DPasswordExpirationTimeVirtualAttributeProvider.java142 AuthenticationPolicy policy = null;
146 policy = AuthenticationPolicy.forUser(entry, false);
155 "policy for user %s: %s",
161 if (policy == null)
163 // No authentication policy: debug log this as an error since all
164 // entries should have at least the default password policy.
167 TRACER.debugError("No applicable password policy for user %s", entry
171 else if (policy.isPasswordPolicy())
178 (PasswordPolicyState) policy.createAuthenticationPolicyState(entry);
187 "policy stat
[all...]
H A DPasswordPolicySubentryVirtualAttributeProvider.java87 AuthenticationPolicy policy = null;
91 policy = AuthenticationPolicy.forUser(entry, false);
96 // retrieve password policy, log this.
102 "policy for user %s: %s",
108 if (policy == null)
110 // No authentication policy: debug log this as an error since all
111 // entries should have at least the default password policy.
114 TRACER.debugError("No applicable password policy for user %s", entry
118 else if (policy.isPasswordPolicy())
122 DN policyDN = policy
[all...]
/forgerock/opendj2.6.2/src/server/org/opends/server/extensions/
H A DPasswordPolicySubentryVirtualAttributeProvider.java111 AuthenticationPolicy policy = null;
115 policy = AuthenticationPolicy.forUser(entry, false);
120 // retrieve password policy, log this.
126 "policy for user %s: %s",
132 if (policy == null)
134 // No authentication policy: debug log this as an error since all
135 // entries should have at least the default password policy.
138 TRACER.debugError("No applicable password policy for user %s", entry
142 else if (policy.isPasswordPolicy())
146 DN policyDN = policy
[all...]
/forgerock/opendj2-jel-hg/src/server/org/opends/server/extensions/
H A DPasswordPolicySubentryVirtualAttributeProvider.java111 AuthenticationPolicy policy = null;
115 policy = AuthenticationPolicy.forUser(entry, false);
120 // retrieve password policy, log this.
126 "policy for user %s: %s",
132 if (policy == null)
134 // No authentication policy: debug log this as an error since all
135 // entries should have at least the default password policy.
138 TRACER.debugError("No applicable password policy for user %s", entry
142 else if (policy.isPasswordPolicy())
146 DN policyDN = policy
[all...]
/forgerock/opendj2-hg/src/server/org/opends/server/extensions/
H A DPasswordExpirationTimeVirtualAttributeProvider.java142 AuthenticationPolicy policy = null;
146 policy = AuthenticationPolicy.forUser(entry, false);
155 "policy for user %s: %s",
161 if (policy == null)
163 // No authentication policy: debug log this as an error since all
164 // entries should have at least the default password policy.
167 TRACER.debugError("No applicable password policy for user %s", entry
171 else if (policy.isPasswordPolicy())
178 (PasswordPolicyState) policy.createAuthenticationPolicyState(entry);
187 "policy stat
[all...]
H A DPasswordPolicySubentryVirtualAttributeProvider.java87 AuthenticationPolicy policy = null;
91 policy = AuthenticationPolicy.forUser(entry, false);
96 // retrieve password policy, log this.
102 "policy for user %s: %s",
108 if (policy == null)
110 // No authentication policy: debug log this as an error since all
111 // entries should have at least the default password policy.
114 TRACER.debugError("No applicable password policy for user %s", entry
118 else if (policy.isPasswordPolicy())
122 DN policyDN = policy
[all...]
/forgerock/opendj-v3/opendj-server-legacy/src/main/java/org/opends/server/api/
H A DAuthenticationPolicy.java43 * An abstract authentication policy.
50 * Returns the authentication policy for the user provided user. The following
51 * algorithm is used in order to obtain the appropriate authentication policy:
53 * <li>if the user entry contains the {@code ds-pwp-password-policy-dn}
55 * policy will be returned
57 * applicable password policy sub-entry to the user entry,
58 * <li>otherwise, the default password policy will be returned.
65 * password policy if there is a problem with the configured policy
67 * @return The password policy fo
[all...]
/forgerock/opendj-v3/opendj-server-legacy/src/main/java/org/opends/server/extensions/
H A DPasswordExpirationTimeVirtualAttributeProvider.java131 AuthenticationPolicy policy = null;
135 policy = AuthenticationPolicy.forUser(entry, false);
141 logger.traceException(de, "Failed to retrieve password policy for user %s",
145 if (policy == null)
147 // No authentication policy: debug log this as an error since all
148 // entries should have at least the default password policy.
149 logger.trace("No applicable password policy for user %s", entry.getName());
151 else if (policy.isPasswordPolicy())
158 (PasswordPolicyState) policy.createAuthenticationPolicyState(entry);
164 logger.traceException(de, "Failed to retrieve password policy stat
[all...]
/forgerock/openam-v13/openam-test/src/test/java/com/sun/identity/policy/client/
H A DIssue619Test.java29 package com.sun.identity.policy.client;
35 import com.sun.identity.policy.PolicyDecision;
36 import com.sun.identity.policy.client.PolicyEvaluator;
37 import com.sun.identity.policy.client.PolicyEvaluatorFactory;
38 import com.sun.identity.policy.TokenUtils;
40 import com.sun.identity.policy.interfaces.Condition;
55 * Issue 619 unable to set the relam qualified auth level in policy env map
63 @Test(groups={"policy-client"})
/forgerock/openam-v13/openam-distribution/src/main/amserver/samples/server/source/com/sun/identity/samples/policy/
H A DSampleCondition.java29 package com.sun.identity.samples.policy;
33 import com.sun.identity.policy.interfaces.Condition;
34 import com.sun.identity.policy.ConditionDecision;
35 import com.sun.identity.policy.PolicyException;
36 import com.sun.identity.policy.PolicyManager;
37 import com.sun.identity.policy.Syntax;
46 * This condition object provides the policy framework with the
53 * for which the policy would apply. The value should be
84 * @see com.sun.identity.policy.Syntax
130 * whether a policy applie
[all...]
/forgerock/openam-v13/openam-entitlements/src/test/java/org/forgerock/openam/entitlement/rest/
H A DJsonPolicyParserTest.java32 import com.sun.identity.policy.plugins.AuthenticateToRealmCondition;
459 Privilege policy = new StubPrivilege();
461 policy.setName(name);
464 JsonValue result = parser.printPolicy(policy);
473 Privilege policy = new StubPrivilege();
475 policy.setActive(active);
478 JsonValue result = parser.printPolicy(policy);
487 Privilege policy = new StubPrivilege();
489 policy.setCreationDate(createdDate.getTime());
492 JsonValue result = parser.printPolicy(policy);
[all...]
/forgerock/openam/openam-distribution/src/main/amserver/samples/server/source/com/sun/identity/samples/policy/
H A DSampleCondition.java29 package com.sun.identity.samples.policy;
33 import com.sun.identity.policy.interfaces.Condition;
34 import com.sun.identity.policy.ConditionDecision;
35 import com.sun.identity.policy.PolicyException;
36 import com.sun.identity.policy.PolicyManager;
37 import com.sun.identity.policy.Syntax;
46 * This condition object provides the policy framework with the
53 * for which the policy would apply. The value should be
84 * @see com.sun.identity.policy.Syntax
130 * whether a policy applie
[all...]
/forgerock/openam/openam-entitlements/src/test/java/org/forgerock/openam/entitlement/rest/
H A DJsonPolicyParserTest.java32 import com.sun.identity.policy.plugins.AuthenticateToRealmCondition;
459 Privilege policy = new StubPrivilege();
461 policy.setName(name);
464 JsonValue result = parser.printPolicy(policy);
473 Privilege policy = new StubPrivilege();
475 policy.setActive(active);
478 JsonValue result = parser.printPolicy(policy);
487 Privilege policy = new StubPrivilege();
489 policy.setCreationDate(createdDate.getTime());
492 JsonValue result = parser.printPolicy(policy);
[all...]
/forgerock/openam/openam-test/src/test/java/com/sun/identity/policy/client/
H A DIssue619Test.java29 package com.sun.identity.policy.client;
35 import com.sun.identity.policy.PolicyDecision;
36 import com.sun.identity.policy.client.PolicyEvaluator;
37 import com.sun.identity.policy.client.PolicyEvaluatorFactory;
38 import com.sun.identity.policy.TokenUtils;
40 import com.sun.identity.policy.interfaces.Condition;
55 * Issue 619 unable to set the relam qualified auth level in policy env map
63 @Test(groups={"policy-client"})
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/
H A DPolicyManager.java30 package com.sun.identity.policy;
67 import com.sun.identity.policy.interfaces.Subject;
88 * starting point for policy management, and provides methods to
209 * @param token <code>SSOToken</code> of the user managing policy
281 // Retrieves a singleton instance of LockFactory shared across policy.
286 * Gets the organization name for which the policy manager
291 * @return organization name for which the policy manager was
301 * Gets the policy config attribute values defined for this policy manager
302 * @return policy confi
567 addPolicy(Policy policy) argument
680 replacePolicy(Policy policy) argument
1322 validateForResourcePrefix(Policy policy) argument
1368 validateForResourcePrefixO(Policy policy) argument
1404 validateReferrals(Policy policy) argument
[all...]
/forgerock/openam-v13/openam-entitlements/src/main/java/org/forgerock/openam/entitlement/rest/
H A DPolicyResource.java56 * REST endpoint for policy/entitlements management and evaluation.
65 * Parser for converting between JSON and concrete entitlements policy instances.
112 DEBUG.message("Rendering policy request for action " + actionString);
120 builder.append("Evaluating policy request for action ");
133 DEBUG.error("Error evaluating policy request", eE);
156 Privilege policy = policyParser.parsePolicy(providedName, request.getContent());
158 if (isNotBlank(providedName) && !providedName.equals(policy.getName())) {
164 providedName = policy.getName();
174 new Object[]{"policy name \"" + providedName + "\""});
177 policyStoreProvider.getPolicyStore(context).create(policy);
275 policyResource(Privilege policy) argument
286 policyRevision(Privilege policy) argument
[all...]
/forgerock/openam-v13/openam-sts/openam-soap-sts/openam-soap-sts-server/src/main/java/org/forgerock/openam/sts/soap/policy/am/
H A DOpenAMSessionTokenServerInterceptorProvider.java17 package org.forgerock.openam.sts.soap.policy.am;
19 import org.apache.cxf.ws.policy.AbstractPolicyInterceptorProvider;
28 * PolicyInterceptorProvider registered with the org.apache.cxf.ws.policy.PolicyInterceptorProviderRegistry on the
/forgerock/openam-v13/openam-console/src/main/java/com/sun/identity/console/policy/
H A DPMDefaultIPConditionAddViewBean.java29 package com.sun.identity.console.policy;
31 import com.sun.identity.console.policy.model.PolicyModel;
39 "/console/policy/PMDefaultIPConditionAdd.jsp";
H A DPMDefaultIPConditionEditViewBean.java32 package com.sun.identity.console.policy;
34 import com.sun.identity.console.policy.model.PolicyModel;
42 "/console/policy/PMDefaultIPConditionEdit.jsp";

Completed in 287 milliseconds

1234567891011>>