/forgerock/openam-v13/openam-scripting/src/main/groovy/ |
H A D | oidc-claims-extension.groovy | 37 * Map<String, List<String>> compositeScopes; // Mapping of scope name to a list of claim names. 44 def fromSet = { claim, attr -> 50 logger.warning("OpenAMScopeValidator.getUserInfo(): Got an empty result for claim=$claim"); 54 attributeRetriever = { attribute, claim, identity, requested -> 56 fromSet(claim, identity.getAttribute(attribute)) 60 throw new RuntimeException("No selection logic for $claim defined. Values: $requested") 64 // [ {claim}: {attribute retriever}, ... ] 67 "address": { claim, identity, requested -> [ "formatted" : attributeRetriever("postaladdress", claim, identit [all...] |
/forgerock/openam/openam-oauth2/src/test/resources/ |
H A D | oidc-claims-extension.groovy | 37 * Map<String, List<String>> compositeScopes; // Mapping of scope name to a list of claim names. 44 def fromSet = { claim, attr -> 50 logger.warning("OpenAMScopeValidator.getUserInfo(): Got an empty result for claim=$claim"); 54 attributeRetriever = { attribute, claim, identity, requested -> 56 fromSet(claim, identity.getAttribute(attribute)) 60 throw new RuntimeException("No selection logic for $claim defined. Values: $requested") 64 // [ {claim}: {attribute retriever}, ... ] 67 "address": { claim, identity, requested -> [ "formatted" : attributeRetriever("postaladdress", claim, identit [all...] |
/forgerock/openam/openam-scripting/src/main/groovy/ |
H A D | oidc-claims-extension.groovy | 37 * Map<String, List<String>> compositeScopes; // Mapping of scope name to a list of claim names. 44 def fromSet = { claim, attr -> 50 logger.warning("OpenAMScopeValidator.getUserInfo(): Got an empty result for claim=$claim"); 54 attributeRetriever = { attribute, claim, identity, requested -> 56 fromSet(claim, identity.getAttribute(attribute)) 60 throw new RuntimeException("No selection logic for $claim defined. Values: $requested") 64 // [ {claim}: {attribute retriever}, ... ] 67 "address": { claim, identity, requested -> [ "formatted" : attributeRetriever("postaladdress", claim, identit [all...] |
/forgerock/openam/openam-entitlements/src/main/java/com/sun/identity/entitlement/ |
H A D | JwtClaimSubject.java | 96 JsonValue claim = jwt.getClaim(claimName); 98 final boolean match = claimMatches(claim, claimValue); 102 public boolean claimMatches(JsonValue claim, String claimValue) { argument 103 if (claim.isNull()) { 105 } else if (claim.isString()) { 106 return StringUtils.equals(claim.asString(), claimValue); 107 } else if (claim.isCollection()) { 108 return claim.asCollection(String.class).contains(claimValue); 110 throw new IllegalArgumentException("Claim [" + claim + "] is an unsupported type"); 119 public void setClaimName(String claim) { argument [all...] |
/forgerock/openam/openam-push-notification/src/test/java/org/forgerock/openam/services/push/utils/ |
H A D | AmazonSNSPushResponseUpdaterTest.java | 59 .claim("communicationType", "communicationType") 60 .claim("deviceId", "deviceId") 61 .claim("mechanismUid", "mechanismUid") 62 .claim("deviceType", "deviceType"); 97 .claim("communicationType", "communicationType") 98 .claim("deviceId", "deviceId") 99 .claim("mechanismUid", "mechanismUid") 100 .claim("deviceType", "deviceType");
|
/forgerock/openam-v13/openam-oauth2-common/oauth2-restlet/src/main/java/org/forgerock/oauth2/restlet/ |
H A D | ConsentRequiredResource.java | 99 for (String claim : scopeClaims) { 100 Object claimValue = claimValues.get(claim); 102 String claimDescription = claimDescriptions.get(claim); 104 claimDescription = claim; 109 allScopeClaims.add(claim); 116 for (String claim : allScopeClaims) { 117 claimValues.remove(claim); 121 for (Map.Entry<String, Object> claim : claimValues.entrySet()) { 123 field("name", encodeForHTML(claimDescriptions.get(claim.getKey()))), 124 field("values", encodeForHTML(claimValues.get(claim [all...] |
/forgerock/openam/openam-oauth2/src/main/java/org/forgerock/oauth2/restlet/ |
H A D | ConsentRequiredResource.java | 111 for (String claim : scopeClaims) { 112 Object claimValue = claimValues.get(claim); 114 String claimDescription = claimDescriptions.get(claim); 116 claimDescription = claim; 121 allScopeClaims.add(claim); 128 for (String claim : allScopeClaims) { 129 claimValues.remove(claim); 133 for (Map.Entry<String, Object> claim : claimValues.entrySet()) { 135 field("name", encodeForHTML(claimDescriptions.get(claim.getKey()))), 136 field("values", encodeForHTML(claimValues.get(claim [all...] |
/forgerock/openam-v13/openam-sts/openam-token-service-sts/src/main/java/org/forgerock/openam/sts/tokengeneration/oidc/ |
H A D | STSOpenIdConnectToken.java | 41 * identification schemes. The OpenIdConnectToken also combines signing state and claim state - I would prefer to keep 63 " claim was set with an empty value."); 181 for (Map.Entry<String, String> claim : privateClaims.entrySet()) { 182 put(claim.getKey(), claim.getValue());
|
/forgerock/openam/openam-sts/openam-token-service-sts/src/main/java/org/forgerock/openam/sts/tokengeneration/oidc/ |
H A D | STSOpenIdConnectToken.java | 41 * identification schemes. The OpenIdConnectToken also combines signing state and claim state - I would prefer to keep 63 " claim was set with an empty value."); 181 for (Map.Entry<String, String> claim : privateClaims.entrySet()) { 182 put(claim.getKey(), claim.getValue());
|
/forgerock/openam/openam-oauth2/src/main/java/org/forgerock/openam/oauth2/ |
H A D | StatelessTokenStore.java | 187 .claim(SCOPE, scope) 188 .claim(CLAIMS, claims) 189 .claim(REALM, realm) 190 .claim(TOKEN_NAME, OAUTH_ACCESS_TOKEN) 191 .claim(OAUTH_TOKEN_TYPE, BEARER) 192 .claim(EXPIRES_IN, expiresIn.getMillis()) 193 .claim(AUDIT_TRACKING_ID, UUID.randomUUID().toString()) 194 .claim(AUTH_GRANT_ID, refreshToken != null ? refreshToken.getAuthGrantId() : UUID.randomUUID().toString()) 195 .claim(AUTH_TIME, authTime); 199 claimsSetBuilder.claim(ProofOfPossessio [all...] |
H A D | StatefulTokenStore.java | 342 for (Map.Entry<String, Object> claim : userInfo.entrySet()) { 343 oidcToken.put(claim.getKey(), claim.getValue());
|
/forgerock/openam-v13/openam-entitlements/src/main/java/com/sun/identity/entitlement/ |
H A D | JwtClaimSubject.java | 102 public void setClaimName(String claim) { argument 103 this.claimName = claim;
|
/forgerock/authenticator-android-v2/app/src/main/java/com/forgerock/authenticator/utils/ |
H A D | MessageUtils.java | 90 builder.claim(key, data.get(key));
|
/forgerock/openam/openam-authentication/openam-auth-push/src/main/java/org/forgerock/openam/authentication/modules/push/ |
H A D | AuthenticatorPush.java | 332 .claim(Constants.MECHANISM_ID_KEY, mechanismId) 333 .claim(LOADBALANCER_KEY, Base64.encode((lbCookieValue).getBytes())) 334 .claim(CHALLENGE_KEY, challenge) 335 .claim(TIME_TO_LIVE_KEY, String.valueOf(timeout / 1000));
|
/forgerock/openam-v13/openam-core-rest/src/test/java/org/forgerock/openam/core/rest/authn/ |
H A D | AuthIdHelperTest.java | 88 given(claimsSetBuilder.claim(anyString(), anyObject())).willReturn(claimsSetBuilder); 139 verify(claimsSetBuilder).claim(eq("otk"), anyString()); 172 verify(claimsSetBuilder).claim(eq("otk"), anyString());
|
/forgerock/openam/openam-core-rest/src/test/java/org/forgerock/openam/core/rest/authn/ |
H A D | AuthIdHelperTest.java | 88 given(claimsSetBuilder.claim(anyString(), anyObject())).willReturn(claimsSetBuilder); 139 verify(claimsSetBuilder).claim(eq("otk"), anyString()); 172 verify(claimsSetBuilder).claim(eq("otk"), anyString());
|
/forgerock/openam-v13/openam-core/src/main/java/org/forgerock/openam/sso/providers/stateless/ |
H A D | JwtSessionMapper.java | 82 * Store the SessionInfo as a serialized_session claim in a JWT. 88 * @return String JWT with SessionInfo stored in serialized_session claim. 97 JwtClaimsSet claimsSet = jwtBuilderFactory.claims().claim(SERIALIZED_SESSION_CLAIM, json).build(); 119 * Extract the SessionInfo stored in the provided JWT's serialized_session claim. 121 * @param jwtString Non-null, String which represents a JWT with SessionInfo state assigned to a serialized_session claim.
|
/forgerock/openam-v13/openam-oauth2/src/main/java/org/forgerock/openam/oauth2/ |
H A D | OpenAMOAuth2ProviderSettings.java | 661 for (String claim : getSetting(realm, key)) { 662 int pipe = claim.indexOf('|'); 664 claims.add(claim.substring(0, pipe)); 666 claims.add(claim);
|
H A D | OpenAMTokenStore.java | 305 for (Map.Entry<String, Object> claim : userInfo.entrySet()) { 306 oidcToken.put(claim.getKey(), claim.getValue());
|
/forgerock/openam-v13/openam-core-rest/src/main/java/org/forgerock/openam/core/rest/authn/ |
H A D | AuthIdHelper.java | 150 .claim("otk", otk)
|
/forgerock/openam/openam-core-rest/src/main/java/org/forgerock/openam/core/rest/authn/ |
H A D | AuthIdHelper.java | 150 .claim("otk", otk)
|
/forgerock/openidm-v4/openidm-ui/openidm-ui-common/src/main/resources/css/ |
H A D | dashboard.less | 87 .claim-item {
|
/forgerock/authenticator-android-v2/app/src/test/java/com/forgerock/authenticator/message/ |
H A D | GcmServiceTest.java | 230 builder.claim(key, data.get(key));
|
/forgerock/openam/openam-oauth2/src/main/java/org/forgerock/oauth2/core/ |
H A D | RealmOAuth2ProviderSettings.java | 554 for (String claim : getSetting(realm, key)) { 555 int pipe = claim.indexOf('|'); 557 claims.add(claim.substring(0, pipe)); 559 claims.add(claim);
|
/forgerock/openidm-v4/openidm-workflow-activiti/src/main/java/org/forgerock/openidm/workflow/activiti/impl/ |
H A D | TaskInstanceResource.java | 109 if ("claim".equals(request.getAction())) { 110 taskService.claim(resourceId, request.getContent().expect(Map.class).asMap().get("userId").toString());
|