/forgerock/openam-v13/openam-console/src/main/java/com/sun/identity/console/delegation/model/ |
H A D | DelegationModel.java | 54 * Returns a set of privileges of an identity. 58 * @return a set of privileges of an identity. 65 * Set privileges of an identity. 69 * @param privileges Map of privilege name to privilege value. 72 void setPrivileges(String realmName, String uid, Map privileges) argument
|
H A D | DelegationModelImpl.java | 90 * Returns a set of privileges of an identity. 94 * @return a set of privileges of an identity. 127 * Set privileges of an identity. 131 * @param privileges Map of privilege name to privilege value. 134 public void setPrivileges(String realmName, String uid, Map privileges) argument 145 for (Iterator i = privileges.keySet().iterator(); i.hasNext(); ) { 148 (Set)privileges.get(name));
|
/forgerock/openam-v13/openam-entitlements/src/main/java/com/sun/identity/entitlement/xacml3/ |
H A D | PrivilegeSet.java | 37 private final List<Privilege> privileges; field in class:PrivilegeSet 41 this.privileges = new ArrayList<Privilege>(); 45 public PrivilegeSet(List<ReferralPrivilege> referralPrivileges, List<Privilege> privileges) { argument 47 this.privileges.addAll(privileges); 52 privileges.add(privilege); 61 return Collections.unmodifiableList(privileges);
|
H A D | XACMLPrivilegeUtils.java | 746 Set<Privilege> privileges = new HashSet<Privilege>(); 751 privileges.add(p); 754 return privileges; 845 public static PolicySet privilegesToPolicySet(String realm, Collection<Privilege> privileges) { argument 848 policySet = privilegesToPolicySetInternal(realm, privileges); 856 Collection<Privilege> privileges) throws JAXBException { 857 if (privileges == null) { 861 for (Privilege privilege : privileges) { 855 privilegesToPolicySetInternal(String realm, Collection<Privilege> privileges) argument
|
/forgerock/openam/openam-console/src/main/java/com/sun/identity/console/delegation/model/ |
H A D | DelegationModel.java | 54 * Returns a set of privileges of an identity. 58 * @return a set of privileges of an identity. 65 * Set privileges of an identity. 69 * @param privileges Map of privilege name to privilege value. 72 void setPrivileges(String realmName, String uid, Map privileges) argument
|
H A D | DelegationModelImpl.java | 90 * Returns a set of privileges of an identity. 94 * @return a set of privileges of an identity. 127 * Set privileges of an identity. 131 * @param privileges Map of privilege name to privilege value. 134 public void setPrivileges(String realmName, String uid, Map privileges) argument 145 for (Iterator i = privileges.keySet().iterator(); i.hasNext(); ) { 148 (Set)privileges.get(name));
|
/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/entitlement/opensso/ |
H A D | PolicyCache.java | 89 public void cache(Map<String, Privilege> privileges, boolean force) { argument 92 for (String dn : privileges.keySet()) { 94 cache.put(dn, privileges.get(dn)); 96 Privilege p = (Privilege)privileges.get(dn); 98 cache.put(dn, privileges.get(dn));
|
H A D | PrivilegeUtils.java | 120 Set<IPrivilege> privileges = new HashSet<IPrivilege>(); 122 policyToPrivileges((Policy)policyObject, privileges); 128 return privileges; 132 Set<IPrivilege> privileges) 147 privileges.add(rp); 156 privileges.add(createPrivilege(policyName, policyName, 162 privileges.add(createPrivilege(pName, policyName, e, 987 Set<IPrivilege> privileges = null; 989 privileges = policyToPrivileges((Policy) policy); 994 return privileges; 131 policyToPrivileges(Policy policy, Set<IPrivilege> privileges) argument [all...] |
/forgerock/openam/openam-core/src/main/java/com/sun/identity/entitlement/opensso/ |
H A D | PolicyCache.java | 89 public void cache(Map<String, Privilege> privileges, boolean force) { argument 92 for (String dn : privileges.keySet()) { 94 cache.put(dn, privileges.get(dn)); 96 Privilege p = (Privilege)privileges.get(dn); 98 cache.put(dn, privileges.get(dn));
|
H A D | PrivilegeUtils.java | 122 Set<IPrivilege> privileges = new HashSet<IPrivilege>(); 124 policyToPrivileges((Policy)policyObject, privileges); 130 return privileges; 134 Set<IPrivilege> privileges) 149 privileges.add(rp); 158 privileges.add(createPrivilege(policyName, policyName, 164 privileges.add(createPrivilege(pName, policyName, e, 1003 Set<IPrivilege> privileges = null; 1005 privileges = policyToPrivileges((Policy) policy); 1010 return privileges; 133 policyToPrivileges(Policy policy, Set<IPrivilege> privileges) argument [all...] |
/forgerock/openam-v13/openam-entitlements/src/main/java/com/sun/identity/entitlement/rest/ |
H A D | PrivilegeResource.java | 71 public String privileges( method in class:PrivilegeResource 86 PrivilegeManager.debug.error("PrivilegeResource.privileges", e); 89 PrivilegeManager.debug.error("PrivilegeResource.privileges", e); 92 PrivilegeManager.debug.error("PrivilegeResource.privileges", e);
|
/forgerock/openam-v13/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/ |
H A D | XACMLPrivilegeUtilsTest.java | 67 Set<Privilege> privileges = createArbitraryPrivilegeSet(now); 68 PolicySet policySet = XACMLPrivilegeUtils.privilegesToPolicySet("/", privileges); 76 assertAllPrivilegesEquivalent(deserializedPrivileges, privileges); 95 Set<Privilege> privileges = createArbitraryPrivilegeSet(now); 97 PolicySet policySet = XACMLPrivilegeUtils.privilegesToPolicySet("/", privileges); 99 assertPolicySetContentsMatchPrivilegesContent(policySet, privileges); 105 Set<Privilege> privileges = null; 107 PolicySet policySet = XACMLPrivilegeUtils.privilegesToPolicySet("/", privileges); 175 private void assertPolicySetContentsMatchPrivilegesContent(PolicySet policySet, Set<Privilege> privileges) { argument 176 if (privileges ! [all...] |
/forgerock/openam-v13/openam-upgrade/src/test/java/org/forgerock/openam/upgrade/steps/ |
H A D | DelegationConfigUpgradeStepTest.java | 67 private ServiceConfig privileges; field in class:DelegationConfigUpgradeStepTest 91 given(delegationConfig.getSubConfig("Privileges")).willReturn(privileges); 103 given(privileges.getSubConfig("TestPrivilege1")).willReturn(privilege1); 104 given(privileges.getSubConfig("TestPrivilege2")).willReturn(privilege2); 116 verify(privileges).getSubConfig("TestPrivilege1"); 117 verify(privileges).getSubConfig("TestPrivilege2"); 120 verifyNoMoreInteractions(configManager, delegationConfig, permissions, privileges, 129 given(delegationConfig.getSubConfig("Privileges")).willReturn(privileges); 142 given(privileges.getSubConfig("TestPrivilege1")).willReturn(privilege1); 143 given(privileges [all...] |
/forgerock/opendj-v3/opendj-server/src/main/java/org/forgerock/opendj/server/core/ |
H A D | Operation.java | 56 * privileges). 89 * privileges. 91 * @param privileges 92 * The array of privileges for which to make the determination. 94 * privileges, or {@code false} if not. 96 boolean hasAllPrivileges(Collection<Privilege> privileges); argument
|
/forgerock/openam/openam-entitlements/src/main/java/com/sun/identity/entitlement/rest/ |
H A D | PrivilegeResource.java | 71 public String privileges( method in class:PrivilegeResource 86 PrivilegeManager.debug.error("PrivilegeResource.privileges", e); 89 PrivilegeManager.debug.error("PrivilegeResource.privileges", e); 92 PrivilegeManager.debug.error("PrivilegeResource.privileges", e);
|
/forgerock/openam/openam-entitlements/src/main/java/com/sun/identity/entitlement/xacml3/ |
H A D | PrivilegeSet.java | 41 private final List<Privilege> privileges; field in class:PrivilegeSet 50 this.privileges = new ArrayList<>(); 63 privileges.add(privilege); 102 return Collections.unmodifiableList(privileges);
|
/forgerock/openam/openam-entitlements/src/test/java/com/sun/identity/entitlement/xacml3/ |
H A D | XACMLPrivilegeUtilsTest.java | 68 Set<Privilege> privileges = createArbitraryPrivilegeSet(now); 69 PolicySet policySet = XACMLPrivilegeUtils.privilegesToPolicySet("/", privileges); 77 assertAllPrivilegesEquivalent(deserializedPrivileges, privileges); 96 Set<Privilege> privileges = createArbitraryPrivilegeSet(now); 98 PolicySet policySet = XACMLPrivilegeUtils.privilegesToPolicySet("/", privileges); 100 assertPolicySetContentsMatchPrivilegesContent(policySet, privileges); 106 Set<Privilege> privileges = null; 108 PolicySet policySet = XACMLPrivilegeUtils.privilegesToPolicySet("/", privileges); 176 private void assertPolicySetContentsMatchPrivilegesContent(PolicySet policySet, Set<Privilege> privileges) { argument 177 if (privileges ! [all...] |
/forgerock/openam/openam-upgrade/src/test/java/org/forgerock/openam/upgrade/steps/ |
H A D | DelegationConfigUpgradeStepTest.java | 67 private ServiceConfig privileges; field in class:DelegationConfigUpgradeStepTest 91 given(delegationConfig.getSubConfig("Privileges")).willReturn(privileges); 103 given(privileges.getSubConfig("TestPrivilege1")).willReturn(privilege1); 104 given(privileges.getSubConfig("TestPrivilege2")).willReturn(privilege2); 116 verify(privileges).getSubConfig("TestPrivilege1"); 117 verify(privileges).getSubConfig("TestPrivilege2"); 120 verifyNoMoreInteractions(configManager, delegationConfig, permissions, privileges, 129 given(delegationConfig.getSubConfig("Privileges")).willReturn(privileges); 142 given(privileges.getSubConfig("TestPrivilege1")).willReturn(privilege1); 143 given(privileges [all...] |
/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/entitlement/ |
H A D | PrivilegeIndexStore.java | 119 * Adds a set of privileges to the data store. Proper indexes will be 122 * @param privileges Privileges to be added. 125 public abstract void add(Set<IPrivilege> privileges) argument 129 * Deletes a set of privileges from data store.
|
H A D | PrivilegeEvaluator.java | 400 private final Set<IPrivilege> privileges; field in class:PrivilegeEvaluator.PrivilegeTask 405 PrivilegeTask(PrivilegeEvaluator parent, Set<IPrivilege> privileges, argument 408 this.privileges = privileges; 418 for (final IPrivilege eval : privileges) {
|
/forgerock/openam/openam-core/src/main/java/com/sun/identity/entitlement/ |
H A D | PrivilegeIndexStore.java | 119 * Adds a set of privileges to the data store. Proper indexes will be 122 * @param privileges Privileges to be added. 125 public abstract void add(Set<IPrivilege> privileges) argument 129 * Deletes a set of privileges from data store.
|
H A D | PrivilegeEvaluator.java | 404 private final Set<IPrivilege> privileges; field in class:PrivilegeEvaluator.PrivilegeTask 409 PrivilegeTask(PrivilegeEvaluator parent, Set<IPrivilege> privileges, argument 412 this.privileges = privileges; 422 for (final IPrivilege eval : privileges) {
|
/forgerock/opendj2/src/server/org/opends/server/api/ |
H A D | ClientConnection.java | 117 /** The set of privileges assigned to this client connection. */ 118 private HashSet<Privilege> privileges; field in class:ClientConnection 176 privileges = new HashSet<Privilege>(); 1061 result = privileges.contains(privilege); 1079 result = privileges.contains(privilege) || 1119 * specified privileges. 1121 * @param privileges The array of privileges for which to make the 1129 * specified privileges, or {@code false} if not. 1131 public boolean hasAllPrivileges(Privilege[] privileges, argument [all...] |
/forgerock/opendj-b2.6/src/server/org/opends/server/api/ |
H A D | ClientConnection.java | 118 /** The set of privileges assigned to this client connection. */ 119 private HashSet<Privilege> privileges; field in class:ClientConnection 177 privileges = new HashSet<Privilege>(); 1062 result = privileges.contains(privilege); 1080 result = privileges.contains(privilege) || 1120 * specified privileges. 1122 * @param privileges The array of privileges for which to make the 1130 * specified privileges, or {@code false} if not. 1132 public boolean hasAllPrivileges(Privilege[] privileges, argument [all...] |
/forgerock/opendj2.6.2/src/server/org/opends/server/api/ |
H A D | ClientConnection.java | 118 /** The set of privileges assigned to this client connection. */ 119 private HashSet<Privilege> privileges; field in class:ClientConnection 177 privileges = new HashSet<Privilege>(); 1062 result = privileges.contains(privilege); 1080 result = privileges.contains(privilege) || 1120 * specified privileges. 1122 * @param privileges The array of privileges for which to make the 1130 * specified privileges, or {@code false} if not. 1132 public boolean hasAllPrivileges(Privilege[] privileges, argument [all...] |