/forgerock/openam/openam-console/src/main/java/com/sun/identity/console/policy/ |
H A D | ResponseProviderEditViewBean.java | 29 package com.sun.identity.console.policy; 36 import com.sun.identity.console.policy.model.PolicyModel; 37 import com.sun.identity.console.policy.model.CachedPolicy; 38 import com.sun.identity.policy.NameAlreadyExistsException; 39 import com.sun.identity.policy.NameNotFoundException; 40 import com.sun.identity.policy.Policy; 41 import com.sun.identity.policy.interfaces.ResponseProvider; 52 "/console/policy/ResponseProviderEdit.jsp"; 62 * Creates a policy creation view bean. 102 "page.title.policy [all...] |
H A D | RuleEditViewBean.java | 29 package com.sun.identity.console.policy; 36 import com.sun.identity.console.policy.model.CachedPolicy; 37 import com.sun.identity.console.policy.model.PolicyModel; 38 import com.sun.identity.policy.ActionSchema; 39 import com.sun.identity.policy.NameAlreadyExistsException; 40 import com.sun.identity.policy.NameNotFoundException; 41 import com.sun.identity.policy.InvalidNameException; 42 import com.sun.identity.policy.Policy; 43 import com.sun.identity.policy.Rule; 55 "/console/policy/RuleEdi [all...] |
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/plugins/ |
H A D | SubjectReferentialIntegrityPlugin.java | 30 package com.sun.identity.policy.plugins; 45 import com.sun.identity.policy.Policy; 46 import com.sun.identity.policy.PolicyConfig; 47 import com.sun.identity.policy.PolicyException; 48 import com.sun.identity.policy.PolicyManager; 49 import com.sun.identity.policy.PolicyUtils; 50 import com.sun.identity.policy.interfaces.Subject; 94 Policy policy; 109 * find out from org policy config that is the directory 147 policy [all...] |
/forgerock/openam-v13/openam-federation/OpenFM/src/test/java/com/sun/identity/entitlement/opensso/ |
H A D | PrivilegePolicyMapping.java | 38 import com.sun.identity.policy.ConditionTypeManager; 39 import com.sun.identity.policy.Policy; 40 import com.sun.identity.policy.PolicyException; 41 import com.sun.identity.policy.PolicyManager; 42 import com.sun.identity.policy.Rule; 43 import com.sun.identity.policy.SubjectTypeManager; 44 import com.sun.identity.policy.interfaces.Condition; 45 import com.sun.identity.policy.interfaces.Subject; 46 import com.sun.identity.policy.plugins.PrivilegeCondition; 47 import com.sun.identity.policy 73 private Policy policy; field in class:PrivilegePolicyMapping [all...] |
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/entitlement/opensso/ |
H A D | PrivilegePolicyMapping.java | 38 import com.sun.identity.policy.ConditionTypeManager; 39 import com.sun.identity.policy.Policy; 40 import com.sun.identity.policy.PolicyException; 41 import com.sun.identity.policy.PolicyManager; 42 import com.sun.identity.policy.Rule; 43 import com.sun.identity.policy.SubjectTypeManager; 44 import com.sun.identity.policy.interfaces.Condition; 45 import com.sun.identity.policy.interfaces.Subject; 46 import com.sun.identity.policy.plugins.PrivilegeCondition; 47 import com.sun.identity.policy 73 private Policy policy; field in class:PrivilegePolicyMapping [all...] |
/forgerock/opendj-b2.6/src/server/org/opends/server/extensions/ |
H A D | PasswordPolicySubentryVirtualAttributeProvider.java | 111 AuthenticationPolicy policy = null; 115 policy = AuthenticationPolicy.forUser(entry, false); 120 // retrieve password policy, log this. 126 "policy for user %s: %s", 132 if (policy == null) 134 // No authentication policy: debug log this as an error since all 135 // entries should have at least the default password policy. 138 TRACER.debugError("No applicable password policy for user %s", entry 142 else if (policy.isPasswordPolicy()) 146 DN policyDN = policy [all...] |
/forgerock/opendj2/src/server/org/opends/server/extensions/ |
H A D | PasswordExpirationTimeVirtualAttributeProvider.java | 142 AuthenticationPolicy policy = null; 146 policy = AuthenticationPolicy.forUser(entry, false); 155 "policy for user %s: %s", 161 if (policy == null) 163 // No authentication policy: debug log this as an error since all 164 // entries should have at least the default password policy. 167 TRACER.debugError("No applicable password policy for user %s", entry 171 else if (policy.isPasswordPolicy()) 178 (PasswordPolicyState) policy.createAuthenticationPolicyState(entry); 187 "policy stat [all...] |
H A D | PasswordPolicySubentryVirtualAttributeProvider.java | 87 AuthenticationPolicy policy = null; 91 policy = AuthenticationPolicy.forUser(entry, false); 96 // retrieve password policy, log this. 102 "policy for user %s: %s", 108 if (policy == null) 110 // No authentication policy: debug log this as an error since all 111 // entries should have at least the default password policy. 114 TRACER.debugError("No applicable password policy for user %s", entry 118 else if (policy.isPasswordPolicy()) 122 DN policyDN = policy [all...] |
/forgerock/opendj2.6.2/src/server/org/opends/server/extensions/ |
H A D | PasswordPolicySubentryVirtualAttributeProvider.java | 111 AuthenticationPolicy policy = null; 115 policy = AuthenticationPolicy.forUser(entry, false); 120 // retrieve password policy, log this. 126 "policy for user %s: %s", 132 if (policy == null) 134 // No authentication policy: debug log this as an error since all 135 // entries should have at least the default password policy. 138 TRACER.debugError("No applicable password policy for user %s", entry 142 else if (policy.isPasswordPolicy()) 146 DN policyDN = policy [all...] |
/forgerock/opendj2-jel-hg/src/server/org/opends/server/extensions/ |
H A D | PasswordPolicySubentryVirtualAttributeProvider.java | 111 AuthenticationPolicy policy = null; 115 policy = AuthenticationPolicy.forUser(entry, false); 120 // retrieve password policy, log this. 126 "policy for user %s: %s", 132 if (policy == null) 134 // No authentication policy: debug log this as an error since all 135 // entries should have at least the default password policy. 138 TRACER.debugError("No applicable password policy for user %s", entry 142 else if (policy.isPasswordPolicy()) 146 DN policyDN = policy [all...] |
/forgerock/opendj2-hg/src/server/org/opends/server/extensions/ |
H A D | PasswordExpirationTimeVirtualAttributeProvider.java | 142 AuthenticationPolicy policy = null; 146 policy = AuthenticationPolicy.forUser(entry, false); 155 "policy for user %s: %s", 161 if (policy == null) 163 // No authentication policy: debug log this as an error since all 164 // entries should have at least the default password policy. 167 TRACER.debugError("No applicable password policy for user %s", entry 171 else if (policy.isPasswordPolicy()) 178 (PasswordPolicyState) policy.createAuthenticationPolicyState(entry); 187 "policy stat [all...] |
H A D | PasswordPolicySubentryVirtualAttributeProvider.java | 87 AuthenticationPolicy policy = null; 91 policy = AuthenticationPolicy.forUser(entry, false); 96 // retrieve password policy, log this. 102 "policy for user %s: %s", 108 if (policy == null) 110 // No authentication policy: debug log this as an error since all 111 // entries should have at least the default password policy. 114 TRACER.debugError("No applicable password policy for user %s", entry 118 else if (policy.isPasswordPolicy()) 122 DN policyDN = policy [all...] |
/forgerock/opendj-v3/opendj-server-legacy/src/main/java/org/opends/server/api/ |
H A D | AuthenticationPolicy.java | 43 * An abstract authentication policy. 50 * Returns the authentication policy for the user provided user. The following 51 * algorithm is used in order to obtain the appropriate authentication policy: 53 * <li>if the user entry contains the {@code ds-pwp-password-policy-dn} 55 * policy will be returned 57 * applicable password policy sub-entry to the user entry, 58 * <li>otherwise, the default password policy will be returned. 65 * password policy if there is a problem with the configured policy 67 * @return The password policy fo [all...] |
/forgerock/opendj-v3/opendj-server-legacy/src/main/java/org/opends/server/extensions/ |
H A D | PasswordExpirationTimeVirtualAttributeProvider.java | 131 AuthenticationPolicy policy = null; 135 policy = AuthenticationPolicy.forUser(entry, false); 141 logger.traceException(de, "Failed to retrieve password policy for user %s", 145 if (policy == null) 147 // No authentication policy: debug log this as an error since all 148 // entries should have at least the default password policy. 149 logger.trace("No applicable password policy for user %s", entry.getName()); 151 else if (policy.isPasswordPolicy()) 158 (PasswordPolicyState) policy.createAuthenticationPolicyState(entry); 164 logger.traceException(de, "Failed to retrieve password policy stat [all...] |
/forgerock/openam-v13/openam-test/src/test/java/com/sun/identity/policy/client/ |
H A D | Issue619Test.java | 29 package com.sun.identity.policy.client; 35 import com.sun.identity.policy.PolicyDecision; 36 import com.sun.identity.policy.client.PolicyEvaluator; 37 import com.sun.identity.policy.client.PolicyEvaluatorFactory; 38 import com.sun.identity.policy.TokenUtils; 40 import com.sun.identity.policy.interfaces.Condition; 55 * Issue 619 unable to set the relam qualified auth level in policy env map 63 @Test(groups={"policy-client"})
|
/forgerock/openam-v13/openam-distribution/src/main/amserver/samples/server/source/com/sun/identity/samples/policy/ |
H A D | SampleCondition.java | 29 package com.sun.identity.samples.policy; 33 import com.sun.identity.policy.interfaces.Condition; 34 import com.sun.identity.policy.ConditionDecision; 35 import com.sun.identity.policy.PolicyException; 36 import com.sun.identity.policy.PolicyManager; 37 import com.sun.identity.policy.Syntax; 46 * This condition object provides the policy framework with the 53 * for which the policy would apply. The value should be 84 * @see com.sun.identity.policy.Syntax 130 * whether a policy applie [all...] |
/forgerock/openam-v13/openam-entitlements/src/test/java/org/forgerock/openam/entitlement/rest/ |
H A D | JsonPolicyParserTest.java | 32 import com.sun.identity.policy.plugins.AuthenticateToRealmCondition; 459 Privilege policy = new StubPrivilege(); 461 policy.setName(name); 464 JsonValue result = parser.printPolicy(policy); 473 Privilege policy = new StubPrivilege(); 475 policy.setActive(active); 478 JsonValue result = parser.printPolicy(policy); 487 Privilege policy = new StubPrivilege(); 489 policy.setCreationDate(createdDate.getTime()); 492 JsonValue result = parser.printPolicy(policy); [all...] |
/forgerock/openam/openam-distribution/src/main/amserver/samples/server/source/com/sun/identity/samples/policy/ |
H A D | SampleCondition.java | 29 package com.sun.identity.samples.policy; 33 import com.sun.identity.policy.interfaces.Condition; 34 import com.sun.identity.policy.ConditionDecision; 35 import com.sun.identity.policy.PolicyException; 36 import com.sun.identity.policy.PolicyManager; 37 import com.sun.identity.policy.Syntax; 46 * This condition object provides the policy framework with the 53 * for which the policy would apply. The value should be 84 * @see com.sun.identity.policy.Syntax 130 * whether a policy applie [all...] |
/forgerock/openam/openam-entitlements/src/test/java/org/forgerock/openam/entitlement/rest/ |
H A D | JsonPolicyParserTest.java | 32 import com.sun.identity.policy.plugins.AuthenticateToRealmCondition; 459 Privilege policy = new StubPrivilege(); 461 policy.setName(name); 464 JsonValue result = parser.printPolicy(policy); 473 Privilege policy = new StubPrivilege(); 475 policy.setActive(active); 478 JsonValue result = parser.printPolicy(policy); 487 Privilege policy = new StubPrivilege(); 489 policy.setCreationDate(createdDate.getTime()); 492 JsonValue result = parser.printPolicy(policy); [all...] |
/forgerock/openam/openam-test/src/test/java/com/sun/identity/policy/client/ |
H A D | Issue619Test.java | 29 package com.sun.identity.policy.client; 35 import com.sun.identity.policy.PolicyDecision; 36 import com.sun.identity.policy.client.PolicyEvaluator; 37 import com.sun.identity.policy.client.PolicyEvaluatorFactory; 38 import com.sun.identity.policy.TokenUtils; 40 import com.sun.identity.policy.interfaces.Condition; 55 * Issue 619 unable to set the relam qualified auth level in policy env map 63 @Test(groups={"policy-client"})
|
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/ |
H A D | PolicyManager.java | 30 package com.sun.identity.policy; 67 import com.sun.identity.policy.interfaces.Subject; 88 * starting point for policy management, and provides methods to 209 * @param token <code>SSOToken</code> of the user managing policy 281 // Retrieves a singleton instance of LockFactory shared across policy. 286 * Gets the organization name for which the policy manager 291 * @return organization name for which the policy manager was 301 * Gets the policy config attribute values defined for this policy manager 302 * @return policy confi 567 addPolicy(Policy policy) argument 680 replacePolicy(Policy policy) argument 1322 validateForResourcePrefix(Policy policy) argument 1368 validateForResourcePrefixO(Policy policy) argument 1404 validateReferrals(Policy policy) argument [all...] |
/forgerock/openam-v13/openam-entitlements/src/main/java/org/forgerock/openam/entitlement/rest/ |
H A D | PolicyResource.java | 56 * REST endpoint for policy/entitlements management and evaluation. 65 * Parser for converting between JSON and concrete entitlements policy instances. 112 DEBUG.message("Rendering policy request for action " + actionString); 120 builder.append("Evaluating policy request for action "); 133 DEBUG.error("Error evaluating policy request", eE); 156 Privilege policy = policyParser.parsePolicy(providedName, request.getContent()); 158 if (isNotBlank(providedName) && !providedName.equals(policy.getName())) { 164 providedName = policy.getName(); 174 new Object[]{"policy name \"" + providedName + "\""}); 177 policyStoreProvider.getPolicyStore(context).create(policy); 275 policyResource(Privilege policy) argument 286 policyRevision(Privilege policy) argument [all...] |
/forgerock/openam-v13/openam-sts/openam-soap-sts/openam-soap-sts-server/src/main/java/org/forgerock/openam/sts/soap/policy/am/ |
H A D | OpenAMSessionTokenServerInterceptorProvider.java | 17 package org.forgerock.openam.sts.soap.policy.am; 19 import org.apache.cxf.ws.policy.AbstractPolicyInterceptorProvider; 28 * PolicyInterceptorProvider registered with the org.apache.cxf.ws.policy.PolicyInterceptorProviderRegistry on the
|
/forgerock/openam-v13/openam-console/src/main/java/com/sun/identity/console/policy/ |
H A D | PMDefaultIPConditionAddViewBean.java | 29 package com.sun.identity.console.policy; 31 import com.sun.identity.console.policy.model.PolicyModel; 39 "/console/policy/PMDefaultIPConditionAdd.jsp";
|
H A D | PMDefaultIPConditionEditViewBean.java | 32 package com.sun.identity.console.policy; 34 import com.sun.identity.console.policy.model.PolicyModel; 42 "/console/policy/PMDefaultIPConditionEdit.jsp";
|