/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/policy/ |
H A D | ProtectedResource.java | 36 * Class that encapsulates a resource and policies protecting the resource 46 private Set policies; field in class:ProtectedResource 50 * the given resource name and protecting policies 52 * @param policies set of policies that protect 55 ProtectedResource(String resourceName, Set policies) { argument 57 this.policies = policies; 77 * Sets policies that protect the resource name 78 * @param policies se 81 setPolicies(Set policies) argument [all...] |
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/ |
H A D | ProtectedResource.java | 36 * Class that encapsulates a resource and policies protecting the resource 46 private Set policies; field in class:ProtectedResource 50 * the given resource name and protecting policies 52 * @param policies set of policies that protect 55 ProtectedResource(String resourceName, Set policies) { argument 57 this.policies = policies; 77 * Sets policies that protect the resource name 78 * @param policies se 81 setPolicies(Set policies) argument [all...] |
/forgerock/openam-v13/openam-distribution/src/main/amserver/diagnostics/services/webcontainer/config/ |
H A D | BEAWeblogic.policy | 29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*; 30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve"; 31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write\\s*"\\s*; 32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write"; 33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*; 34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup"; 35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*; 36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory"; 37 pattern.policies.5=\\s*ermission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*; 38 cleartext.policies [all...] |
H A D | IBMWebSphere.policy | 29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*; 30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve"; 31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write\\s*"\\s*; 32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write"; 33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*; 34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup"; 35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*; 36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory"; 37 pattern.policies.5=\\s*ermission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*; 38 cleartext.policies [all...] |
H A D | SunApplicationServer.policy | 29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*; 30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve"; 31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write"\\s*; 32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write"; 33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*; 34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup"; 35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*; 36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory"; 37 pattern.policies.5=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*; 38 cleartext.policies [all...] |
H A D | SunWebServer.policy | 29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*; 30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve"; 31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write\\s*"\\s*; 32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write"; 33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*; 34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup"; 35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*; 36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory"; 37 pattern.policies.5=\\s*ermission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*; 38 cleartext.policies [all...] |
/forgerock/openam-v13/openam-uma/src/main/java/org/forgerock/openam/uma/ |
H A D | PolicySearch.java | 32 private final Collection<UmaPolicy> policies; field in class:PolicySearch 37 * @param policies 39 public PolicySearch(Collection<UmaPolicy> policies) { argument 40 this.policies = policies; 48 this.policies = new HashSet<UmaPolicy>(); 62 for (UmaPolicy policy : policies) { 68 for (UmaPolicy policy : policies) { 81 this.policies.add(policy); 90 return policies; [all...] |
/forgerock/openam/openam-uma/src/main/java/org/forgerock/openam/uma/ |
H A D | PolicySearch.java | 32 private final Collection<UmaPolicy> policies; field in class:PolicySearch 37 * @param policies 39 public PolicySearch(Collection<UmaPolicy> policies) { argument 40 this.policies = policies; 48 this.policies = new HashSet<UmaPolicy>(); 62 for (UmaPolicy policy : policies) { 68 for (UmaPolicy policy : policies) { 81 this.policies.add(policy); 90 return policies; [all...] |
/forgerock/openam-v13/openam-ui/openam-ui-ria/src/main/js/org/forgerock/openam/ui/common/util/ |
H A D | ExternalLinks.js | 29 policies: "#configure-policies-with-console",
|
/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/main/js/org/forgerock/openidm/ui/admin/mapping/behaviors/ |
H A D | PoliciesView.js | 93 policies:[], 104 this.model.renderedPolicies = args.policies || _.clone(this.model.mapping.policies, true) || []; 146 _.each(this.model.mapping.policies, function(policy) { 207 "policies": newPolicies, 225 // Gets a copy of a the default action policies and formats it for rendering 226 _.each(this.model.allPatterns["Default Actions"].policies, function(policy) { 266 * Take an array of policies and formats them for handlebar template rendering. 273 * @param policies 275 setPolicies: function(policies) { [all...] |
/forgerock/openam/openam-ui/openam-ui-ria/src/main/js/org/forgerock/openam/ui/common/util/ |
H A D | ExternalLinks.js | 26 policies: "#configure-policies-with-console",
|
/forgerock/openam-v13/openam-uma/src/test/java/org/forgerock/openam/uma/rest/ |
H A D | PolicyResourceDelegateTest.java | 68 Set<JsonValue> policies = new HashSet<JsonValue>(); 71 policies.add(policyOne); 72 policies.add(policyTwo); 86 List<ResourceResponse> returnedPolicies = delegate.createPolicies(context, policies).getOrThrowUninterruptibly(); 99 Set<JsonValue> policies = new HashSet<JsonValue>(); 102 policies.add(policyOne); 103 policies.add(policyTwo); 118 delegate.createPolicies(context, policies).getOrThrowUninterruptibly(); 134 Set<JsonValue> policies = new HashSet<JsonValue>(); 137 policies [all...] |
H A D | PolicyGraphTest.java | 75 * the policies, and where updates are required, the graph will be making 76 * the policies match this graph. 126 List<ResourceResponse> policies = VALID_POLICIES; 127 PolicyGraph graph = makePolicyGraph(policies); 142 List<ResourceResponse> policies = excludePolicies(DAVE, ED); 143 policies.add(makePolicy(DAVE, ED, true, DELETE)); 144 policies.add(makePolicy(DAVE, ED, false, VIEW)); 146 PolicyGraph graph = makePolicyGraph(policies); 163 List<ResourceResponse> policies = excludePolicies(DAVE, ED); 164 policies 281 makePolicyGraph(List<ResourceResponse> policies) argument [all...] |
/forgerock/openam/openam-uma/src/test/java/org/forgerock/openam/uma/rest/ |
H A D | PolicyResourceDelegateTest.java | 68 Set<JsonValue> policies = new HashSet<JsonValue>(); 71 policies.add(policyOne); 72 policies.add(policyTwo); 86 List<ResourceResponse> returnedPolicies = delegate.createPolicies(context, policies).getOrThrowUninterruptibly(); 99 Set<JsonValue> policies = new HashSet<JsonValue>(); 102 policies.add(policyOne); 103 policies.add(policyTwo); 118 delegate.createPolicies(context, policies).getOrThrowUninterruptibly(); 134 Set<JsonValue> policies = new HashSet<JsonValue>(); 137 policies [all...] |
H A D | PolicyGraphTest.java | 75 * the policies, and where updates are required, the graph will be making 76 * the policies match this graph. 126 List<ResourceResponse> policies = VALID_POLICIES; 127 PolicyGraph graph = makePolicyGraph(policies); 142 List<ResourceResponse> policies = excludePolicies(DAVE, ED); 143 policies.add(makePolicy(DAVE, ED, true, DELETE)); 144 policies.add(makePolicy(DAVE, ED, false, VIEW)); 146 PolicyGraph graph = makePolicyGraph(policies); 163 List<ResourceResponse> policies = excludePolicies(DAVE, ED); 164 policies 281 makePolicyGraph(List<ResourceResponse> policies) argument [all...] |
/forgerock/openam-v13/openam-uma/src/test/java/org/forgerock/openam/uma/ |
H A D | PolicySearchTest.java | 70 Set<UmaPolicy> policies = new HashSet<UmaPolicy>(); 71 policies.add(umaPolicy1); 72 policies.add(umaPolicy2); 75 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/permissions/subject"), "SUBJECT_ONE"); 89 Set<UmaPolicy> policies = new HashSet<UmaPolicy>(); 90 policies.add(umaPolicy1); 91 policies.add(umaPolicy2); 94 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/resourceServer"), "CLIENT_ID_2");
|
/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/test/qunit/mapping/ |
H A D | reconTests.js | 39 _.size(PoliciesView.model.allPatterns["Default Actions"].policies), 47 _.each(PoliciesView.model.allPatterns["Default Actions"].policies, function(situation, index) { 62 if ($(row).find(".action").val() !== "ASYNC" && index < PoliciesView.model.allPatterns["Read-only"].policies.length) { 70 if ($(row).find(".action :selected").text().indexOf("★") < 0 && index < PoliciesView.model.allPatterns["Read-only"].policies.length) { 88 _.each(mapping.policies, function(policy) {
|
/forgerock/openam/openam-uma/src/test/java/org/forgerock/openam/uma/ |
H A D | PolicySearchTest.java | 70 Set<UmaPolicy> policies = new HashSet<UmaPolicy>(); 71 policies.add(umaPolicy1); 72 policies.add(umaPolicy2); 75 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/permissions/subject"), "SUBJECT_ONE"); 89 Set<UmaPolicy> policies = new HashSet<UmaPolicy>(); 90 policies.add(umaPolicy1); 91 policies.add(umaPolicy2); 94 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/resourceServer"), "CLIENT_ID_2");
|
/forgerock/openam-v13/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/ |
H A D | XACMLPrivilegeUtilsTest.java | 69 List<Policy> policies = getPoliciesFromPolicySet(policySet); 71 for (Policy policy : policies) { 179 List<Policy> policies = getPoliciesFromPolicySet(policySet); 181 assertEquals(policies.size(), privileges.size(), "Mismatch between number of Policy elements in PolicySet, " + 185 for (Policy policy : policies) { 198 for (Policy policy : policies) { 208 for (Policy policy : policies) { 229 List<Policy> policies = getPoliciesFromPolicySet(policySet); 230 assertEquals(policies.size(), 1, "Expected one Policy to be added to the PolicySet."); 232 assertSame(policies [all...] |
/forgerock/openam-v13/openam-upgrade/src/test/java/org/forgerock/openam/upgrade/steps/policy/ |
H A D | UpgradeResourceTypeStepTest.java | 44 private final Set<String> policies = new HashSet<String>(); field in class:UpgradeResourceTypeStepTest 75 return policies; 120 policies.clear(); 146 policies.add("PolicyWithoutResourceType"); 173 policies.add("PolicyWithoutResourceTypeOne"); 174 policies.add("PolicyWithoutResourceTypeTwo"); 175 policies.add("PolicyWithoutResourceTypeThree"); 182 assertEquals(shortReport, "New entitlement resource types (1)Modified applications (1)Modified policies (3)"); 190 policies.add("PolicyWithoutResourceTypeOne"); 191 policies [all...] |
/forgerock/openam/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/ |
H A D | XACMLPrivilegeUtilsTest.java | 70 List<Policy> policies = getPoliciesFromPolicySet(policySet); 72 for (Policy policy : policies) { 180 List<Policy> policies = getPoliciesFromPolicySet(policySet); 182 assertEquals(policies.size(), privileges.size(), "Mismatch between number of Policy elements in PolicySet, " + 186 for (Policy policy : policies) { 199 for (Policy policy : policies) { 209 for (Policy policy : policies) { 230 List<Policy> policies = getPoliciesFromPolicySet(policySet); 231 assertEquals(policies.size(), 1, "Expected one Policy to be added to the PolicySet."); 233 assertSame(policies [all...] |
/forgerock/openam/openam-upgrade/src/test/java/org/forgerock/openam/upgrade/steps/policy/ |
H A D | UpgradeResourceTypeStepTest.java | 46 private final Set<String> policies = new HashSet<String>(); field in class:UpgradeResourceTypeStepTest 79 return policies; 124 policies.clear(); 150 policies.add("PolicyWithoutResourceType"); 177 policies.add("PolicyWithoutResourceTypeOne"); 178 policies.add("PolicyWithoutResourceTypeTwo"); 179 policies.add("PolicyWithoutResourceTypeThree"); 186 assertEquals(shortReport, "New entitlement resource types (1)Modified applications (1)Modified policies (3)"); 194 policies.add("PolicyWithoutResourceTypeOne"); 195 policies [all...] |
/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/main/js/org/forgerock/openidm/ui/admin/settings/audit/ |
H A D | AuditAdminAbstractView.js | 67 setFilterPolicies: function(policies) { 68 auditDataChanges.auditServiceConfig.filterPolicies = policies;
|
/forgerock/openam-v13/openam-tools/openam-diagnostics/openam-diagnostics-plugins/src/main/resources/ |
H A D | WebContainer.properties | 64 webcontainer-policies-check=Verifying policies 65 webcontainer-policies-invalid=Missing policies
|
/forgerock/openidm-v4/openidm-core/src/test/java/org/forgerock/openidm/sync/impl/ |
H A D | PolicyTest.java | 54 private Map<String, List<Policy>> policies = new HashMap<String, List<Policy>>(); field in class:PolicyTest 82 policies = new HashMap<String, List<Policy>>(); 90 assertEquals(policies.size(), 8); 98 assertEquals((policies.get(Situation.ABSENT.toString())).size(), 2); 123 assertEquals(policies.size(), 8); 129 assertEquals((policies.get(Situation.ABSENT.toString())).size(), 2); 145 for (JsonValue jv : mappingConfig.get("policies").expect(List.class)) { 147 if (policies.containsKey(situation)) { 148 List<Policy> policy = policies.get(situation); 153 policies [all...] |