Searched refs:policies (Results 1 - 25 of 85) sorted by relevance

1234

/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/policy/
H A DProtectedResource.java36 * Class that encapsulates a resource and policies protecting the resource
46 private Set policies; field in class:ProtectedResource
50 * the given resource name and protecting policies
52 * @param policies set of policies that protect
55 ProtectedResource(String resourceName, Set policies) { argument
57 this.policies = policies;
77 * Sets policies that protect the resource name
78 * @param policies se
81 setPolicies(Set policies) argument
[all...]
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/
H A DProtectedResource.java36 * Class that encapsulates a resource and policies protecting the resource
46 private Set policies; field in class:ProtectedResource
50 * the given resource name and protecting policies
52 * @param policies set of policies that protect
55 ProtectedResource(String resourceName, Set policies) { argument
57 this.policies = policies;
77 * Sets policies that protect the resource name
78 * @param policies se
81 setPolicies(Set policies) argument
[all...]
/forgerock/openam-v13/openam-distribution/src/main/amserver/diagnostics/services/webcontainer/config/
H A DBEAWeblogic.policy29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*;
30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve";
31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write\\s*"\\s*;
32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write";
33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*;
34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup";
35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*;
36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory";
37 pattern.policies.5=\\s*ermission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*;
38 cleartext.policies
[all...]
H A DIBMWebSphere.policy29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*;
30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve";
31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write\\s*"\\s*;
32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write";
33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*;
34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup";
35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*;
36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory";
37 pattern.policies.5=\\s*ermission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*;
38 cleartext.policies
[all...]
H A DSunApplicationServer.policy29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*;
30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve";
31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write"\\s*;
32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write";
33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*;
34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup";
35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*;
36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory";
37 pattern.policies.5=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*;
38 cleartext.policies
[all...]
H A DSunWebServer.policy29 pattern.policies.1=\\s*permission\\s+java[.]net[.]SocketPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*listen\\s*,\\s*connect\\s*,\\s*accept\\s*,\\s*resolve\\s*"\\s*;
30 cleartext.policies.1=permission java.net.SocketPermission "*", "listen,connect,accept,resolve";
31 pattern.policies.2=\\s*permission\\s+java[.]util[.]PropertyPermission\\s+"\\s*[*]\\s*"\\s*,\\s*"\\s*read\\s*,\\s*write\\s*"\\s*;
32 cleartext.policies.2=permission java.util.PropertyPermission "*", "read, write";
33 pattern.policies.3=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*modifyThreadGroup\\s*"\\s*;
34 cleartext.policies.3=permission java.lang.RuntimePermission "modifyThreadGroup";
35 pattern.policies.4=\\s*permission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*setFactory\\s*"\\s*;
36 cleartext.policies.4=permission java.lang.RuntimePermission "setFactory";
37 pattern.policies.5=\\s*ermission\\s+java[.]lang[.]RuntimePermission\\s+"\\s*accessClassInPackage[.][*]\\s*"\\s*;
38 cleartext.policies
[all...]
/forgerock/openam-v13/openam-uma/src/main/java/org/forgerock/openam/uma/
H A DPolicySearch.java32 private final Collection<UmaPolicy> policies; field in class:PolicySearch
37 * @param policies
39 public PolicySearch(Collection<UmaPolicy> policies) { argument
40 this.policies = policies;
48 this.policies = new HashSet<UmaPolicy>();
62 for (UmaPolicy policy : policies) {
68 for (UmaPolicy policy : policies) {
81 this.policies.add(policy);
90 return policies;
[all...]
/forgerock/openam/openam-uma/src/main/java/org/forgerock/openam/uma/
H A DPolicySearch.java32 private final Collection<UmaPolicy> policies; field in class:PolicySearch
37 * @param policies
39 public PolicySearch(Collection<UmaPolicy> policies) { argument
40 this.policies = policies;
48 this.policies = new HashSet<UmaPolicy>();
62 for (UmaPolicy policy : policies) {
68 for (UmaPolicy policy : policies) {
81 this.policies.add(policy);
90 return policies;
[all...]
/forgerock/openam-v13/openam-ui/openam-ui-ria/src/main/js/org/forgerock/openam/ui/common/util/
H A DExternalLinks.js29 policies: "#configure-policies-with-console",
/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/main/js/org/forgerock/openidm/ui/admin/mapping/behaviors/
H A DPoliciesView.js93 policies:[],
104 this.model.renderedPolicies = args.policies || _.clone(this.model.mapping.policies, true) || [];
146 _.each(this.model.mapping.policies, function(policy) {
207 "policies": newPolicies,
225 // Gets a copy of a the default action policies and formats it for rendering
226 _.each(this.model.allPatterns["Default Actions"].policies, function(policy) {
266 * Take an array of policies and formats them for handlebar template rendering.
273 * @param policies
275 setPolicies: function(policies) {
[all...]
/forgerock/openam/openam-ui/openam-ui-ria/src/main/js/org/forgerock/openam/ui/common/util/
H A DExternalLinks.js26 policies: "#configure-policies-with-console",
/forgerock/openam-v13/openam-uma/src/test/java/org/forgerock/openam/uma/rest/
H A DPolicyResourceDelegateTest.java68 Set<JsonValue> policies = new HashSet<JsonValue>();
71 policies.add(policyOne);
72 policies.add(policyTwo);
86 List<ResourceResponse> returnedPolicies = delegate.createPolicies(context, policies).getOrThrowUninterruptibly();
99 Set<JsonValue> policies = new HashSet<JsonValue>();
102 policies.add(policyOne);
103 policies.add(policyTwo);
118 delegate.createPolicies(context, policies).getOrThrowUninterruptibly();
134 Set<JsonValue> policies = new HashSet<JsonValue>();
137 policies
[all...]
H A DPolicyGraphTest.java75 * the policies, and where updates are required, the graph will be making
76 * the policies match this graph.
126 List<ResourceResponse> policies = VALID_POLICIES;
127 PolicyGraph graph = makePolicyGraph(policies);
142 List<ResourceResponse> policies = excludePolicies(DAVE, ED);
143 policies.add(makePolicy(DAVE, ED, true, DELETE));
144 policies.add(makePolicy(DAVE, ED, false, VIEW));
146 PolicyGraph graph = makePolicyGraph(policies);
163 List<ResourceResponse> policies = excludePolicies(DAVE, ED);
164 policies
281 makePolicyGraph(List<ResourceResponse> policies) argument
[all...]
/forgerock/openam/openam-uma/src/test/java/org/forgerock/openam/uma/rest/
H A DPolicyResourceDelegateTest.java68 Set<JsonValue> policies = new HashSet<JsonValue>();
71 policies.add(policyOne);
72 policies.add(policyTwo);
86 List<ResourceResponse> returnedPolicies = delegate.createPolicies(context, policies).getOrThrowUninterruptibly();
99 Set<JsonValue> policies = new HashSet<JsonValue>();
102 policies.add(policyOne);
103 policies.add(policyTwo);
118 delegate.createPolicies(context, policies).getOrThrowUninterruptibly();
134 Set<JsonValue> policies = new HashSet<JsonValue>();
137 policies
[all...]
H A DPolicyGraphTest.java75 * the policies, and where updates are required, the graph will be making
76 * the policies match this graph.
126 List<ResourceResponse> policies = VALID_POLICIES;
127 PolicyGraph graph = makePolicyGraph(policies);
142 List<ResourceResponse> policies = excludePolicies(DAVE, ED);
143 policies.add(makePolicy(DAVE, ED, true, DELETE));
144 policies.add(makePolicy(DAVE, ED, false, VIEW));
146 PolicyGraph graph = makePolicyGraph(policies);
163 List<ResourceResponse> policies = excludePolicies(DAVE, ED);
164 policies
281 makePolicyGraph(List<ResourceResponse> policies) argument
[all...]
/forgerock/openam-v13/openam-uma/src/test/java/org/forgerock/openam/uma/
H A DPolicySearchTest.java70 Set<UmaPolicy> policies = new HashSet<UmaPolicy>();
71 policies.add(umaPolicy1);
72 policies.add(umaPolicy2);
75 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/permissions/subject"), "SUBJECT_ONE");
89 Set<UmaPolicy> policies = new HashSet<UmaPolicy>();
90 policies.add(umaPolicy1);
91 policies.add(umaPolicy2);
94 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/resourceServer"), "CLIENT_ID_2");
/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/test/qunit/mapping/
H A DreconTests.js39 _.size(PoliciesView.model.allPatterns["Default Actions"].policies),
47 _.each(PoliciesView.model.allPatterns["Default Actions"].policies, function(situation, index) {
62 if ($(row).find(".action").val() !== "ASYNC" && index < PoliciesView.model.allPatterns["Read-only"].policies.length) {
70 if ($(row).find(".action :selected").text().indexOf("★") < 0 && index < PoliciesView.model.allPatterns["Read-only"].policies.length) {
88 _.each(mapping.policies, function(policy) {
/forgerock/openam/openam-uma/src/test/java/org/forgerock/openam/uma/
H A DPolicySearchTest.java70 Set<UmaPolicy> policies = new HashSet<UmaPolicy>();
71 policies.add(umaPolicy1);
72 policies.add(umaPolicy2);
75 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/permissions/subject"), "SUBJECT_ONE");
89 Set<UmaPolicy> policies = new HashSet<UmaPolicy>();
90 policies.add(umaPolicy1);
91 policies.add(umaPolicy2);
94 PolicySearch search = new PolicySearch(policies).equals(new JsonPointer("/resourceServer"), "CLIENT_ID_2");
/forgerock/openam-v13/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/
H A DXACMLPrivilegeUtilsTest.java69 List<Policy> policies = getPoliciesFromPolicySet(policySet);
71 for (Policy policy : policies) {
179 List<Policy> policies = getPoliciesFromPolicySet(policySet);
181 assertEquals(policies.size(), privileges.size(), "Mismatch between number of Policy elements in PolicySet, " +
185 for (Policy policy : policies) {
198 for (Policy policy : policies) {
208 for (Policy policy : policies) {
229 List<Policy> policies = getPoliciesFromPolicySet(policySet);
230 assertEquals(policies.size(), 1, "Expected one Policy to be added to the PolicySet.");
232 assertSame(policies
[all...]
/forgerock/openam-v13/openam-upgrade/src/test/java/org/forgerock/openam/upgrade/steps/policy/
H A DUpgradeResourceTypeStepTest.java44 private final Set<String> policies = new HashSet<String>(); field in class:UpgradeResourceTypeStepTest
75 return policies;
120 policies.clear();
146 policies.add("PolicyWithoutResourceType");
173 policies.add("PolicyWithoutResourceTypeOne");
174 policies.add("PolicyWithoutResourceTypeTwo");
175 policies.add("PolicyWithoutResourceTypeThree");
182 assertEquals(shortReport, "New entitlement resource types (1)Modified applications (1)Modified policies (3)");
190 policies.add("PolicyWithoutResourceTypeOne");
191 policies
[all...]
/forgerock/openam/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/
H A DXACMLPrivilegeUtilsTest.java70 List<Policy> policies = getPoliciesFromPolicySet(policySet);
72 for (Policy policy : policies) {
180 List<Policy> policies = getPoliciesFromPolicySet(policySet);
182 assertEquals(policies.size(), privileges.size(), "Mismatch between number of Policy elements in PolicySet, " +
186 for (Policy policy : policies) {
199 for (Policy policy : policies) {
209 for (Policy policy : policies) {
230 List<Policy> policies = getPoliciesFromPolicySet(policySet);
231 assertEquals(policies.size(), 1, "Expected one Policy to be added to the PolicySet.");
233 assertSame(policies
[all...]
/forgerock/openam/openam-upgrade/src/test/java/org/forgerock/openam/upgrade/steps/policy/
H A DUpgradeResourceTypeStepTest.java46 private final Set<String> policies = new HashSet<String>(); field in class:UpgradeResourceTypeStepTest
79 return policies;
124 policies.clear();
150 policies.add("PolicyWithoutResourceType");
177 policies.add("PolicyWithoutResourceTypeOne");
178 policies.add("PolicyWithoutResourceTypeTwo");
179 policies.add("PolicyWithoutResourceTypeThree");
186 assertEquals(shortReport, "New entitlement resource types (1)Modified applications (1)Modified policies (3)");
194 policies.add("PolicyWithoutResourceTypeOne");
195 policies
[all...]
/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/main/js/org/forgerock/openidm/ui/admin/settings/audit/
H A DAuditAdminAbstractView.js67 setFilterPolicies: function(policies) {
68 auditDataChanges.auditServiceConfig.filterPolicies = policies;
/forgerock/openam-v13/openam-tools/openam-diagnostics/openam-diagnostics-plugins/src/main/resources/
H A DWebContainer.properties64 webcontainer-policies-check=Verifying policies
65 webcontainer-policies-invalid=Missing policies
/forgerock/openidm-v4/openidm-core/src/test/java/org/forgerock/openidm/sync/impl/
H A DPolicyTest.java54 private Map<String, List<Policy>> policies = new HashMap<String, List<Policy>>(); field in class:PolicyTest
82 policies = new HashMap<String, List<Policy>>();
90 assertEquals(policies.size(), 8);
98 assertEquals((policies.get(Situation.ABSENT.toString())).size(), 2);
123 assertEquals(policies.size(), 8);
129 assertEquals((policies.get(Situation.ABSENT.toString())).size(), 2);
145 for (JsonValue jv : mappingConfig.get("policies").expect(List.class)) {
147 if (policies.containsKey(situation)) {
148 List<Policy> policy = policies.get(situation);
153 policies
[all...]

Completed in 136 milliseconds

1234