/forgerock/openam-v13/openam-uma/src/main/java/org/forgerock/openam/uma/ |
H A D | Permission.java | 23 private Set<String> scopes; field in class:Permission 26 public Permission(String resourceSetId, Set<String> scopes) { argument 28 this.scopes = scopes; 42 return scopes; 45 public void setScopes(Set<String> scopes) { argument 46 this.scopes = scopes;
|
H A D | PendingRequestEmailTemplate.java | 79 * <li>The requested scopes</li> 101 * <li>The requested scopes</li> 139 String buildScopeString(Collection<String> scopes, String username, String realm) { argument 142 for (String scope : scopes) { 145 if (scopes.isEmpty()) {
|
H A D | UmaTokenStore.java | 77 PermissionTicket createPermissionTicket(String resourceSetId, Set<String> scopes, String clientId) argument 80 PermissionTicket permissionTicket = new PermissionTicket(null, resourceSetId, scopes, clientId);
|
H A D | PendingRequestsService.java | 108 * @param scopes The requested scopes. 114 String requestingPartyId, String realm, Set<String> scopes) throws ServerException { 117 requestingPartyId, scopes); 123 String scopesString = pendingRequestEmailTemplate.buildScopeString(scopes, resourceOwnerId, realm); 205 Collection<String> scopes = getScopes(request, content); 206 return createUmaPolicy(context, request, scopes) 207 .thenAsync(approvePendingRequest(request, scopes, id, realm)); 218 final Collection<String> scopes, final String id, final String realm) { 231 scopes, reques 112 createPendingRequest(HttpServletRequest httpRequest, String resourceSetId, String resourceSetName, String resourceOwnerId, String requestingPartyId, String realm, Set<String> scopes) argument 217 approvePendingRequest(final UmaPendingRequest request, final Collection<String> scopes, final String id, final String realm) argument 263 createUmaPolicy(final Context context, final UmaPendingRequest request, final Collection<String> scopes) argument 303 createPolicyJson(String resourceSetId, String requestingPartyId, Collection<String> scopes) argument [all...] |
H A D | PermissionTicket.java | 38 private static final String SCOPES = "scopes"; 57 public PermissionTicket(String id, String resourceSetId, Set<String> scopes, String resourceServerClientId) { argument 61 contents.put(SCOPES, scopes); 97 JsonValue scopes = contents.get(SCOPES); 98 return scopes == null ? null : scopes.asSet(String.class); 101 public void setScopes(Set<String> scopes) { argument 102 contents.put(SCOPES, scopes);
|
H A D | UmaPolicy.java | 113 throw new BadRequestException("Invalid UMA policy permission. Missing required attribute, 'scopes'."); 118 throw new BadRequestException("Invalid UMA policy permission. Required attribute, 'scopes', " 159 private Set<String> scopes; field in class:UmaPolicy 200 * Parses the unique set of scopes that are defined for all subject in this UMA policy. 202 * @return The set of defined scopes on the UMA policy. 205 if (scopes == null) { 206 scopes = new HashSet<>(); 208 scopes.addAll(permission.get(SCOPES_KEY).asList(String.class)); 211 return scopes; 231 * "scopes" [all...] |
H A D | AuthorizationRequestEndpoint.java | 252 String realm, String requestingUserId, Set<String> scopes) 258 if (pendingRequest.getScopes().containsAll(scopes)) { 251 verifyPendingRequestDoesNotAlreadyExist(String resourceSetId, String resourceOwnerId, String realm, String requestingUserId, Set<String> scopes) argument
|
/forgerock/openam/openam-uma/src/main/java/org/forgerock/openam/uma/ |
H A D | Permission.java | 23 private Set<String> scopes; field in class:Permission 26 public Permission(String resourceSetId, Set<String> scopes) { argument 28 this.scopes = scopes; 42 return scopes; 45 public void setScopes(Set<String> scopes) { argument 46 this.scopes = scopes;
|
H A D | PendingRequestEmailTemplate.java | 79 * <li>The requested scopes</li> 101 * <li>The requested scopes</li> 139 String buildScopeString(Collection<String> scopes, String username, String realm) { argument 142 for (String scope : scopes) { 145 if (scopes.isEmpty()) {
|
H A D | UmaTokenStore.java | 76 PermissionTicket createPermissionTicket(String resourceSetId, Set<String> scopes, String clientId) argument 79 PermissionTicket permissionTicket = new PermissionTicket(null, resourceSetId, scopes, clientId);
|
H A D | PendingRequestsService.java | 110 * @param scopes The requested scopes. 116 String requestingPartyId, String realm, Set<String> scopes) throws ServerException { 119 requestingPartyId, scopes); 125 String scopesString = pendingRequestEmailTemplate.buildScopeString(scopes, resourceOwnerId, realm); 207 Collection<String> scopes = getScopes(request, content); 208 return createUmaPolicy(context, request, scopes) 209 .thenAsync(approvePendingRequest(request, scopes, id, realm)); 220 final Collection<String> scopes, final String id, final String realm) { 233 scopes, reques 114 createPendingRequest(HttpServletRequest httpRequest, String resourceSetId, String resourceSetName, String resourceOwnerId, String requestingPartyId, String realm, Set<String> scopes) argument 219 approvePendingRequest(final UmaPendingRequest request, final Collection<String> scopes, final String id, final String realm) argument 265 createUmaPolicy(final Context context, final UmaPendingRequest request, final Collection<String> scopes) argument 305 createPolicyJson(String resourceSetId, String requestingPartyId, Collection<String> scopes) argument [all...] |
H A D | PermissionTicket.java | 41 private static final String SCOPES = "scopes"; 60 public PermissionTicket(String id, String resourceSetId, Set<String> scopes, String resourceServerClientId) { argument 64 contents.put(SCOPES, newList(scopes)); 100 JsonValue scopes = contents.get(SCOPES); 101 return scopes == null ? null : scopes.as(setOf(String.class)); 104 public void setScopes(Set<String> scopes) { argument 105 contents.put(SCOPES, newList(scopes));
|
H A D | UmaPolicy.java | 115 throw new BadRequestException("Invalid UMA policy permission. Missing required attribute, 'scopes'."); 120 throw new BadRequestException("Invalid UMA policy permission. Required attribute, 'scopes', " 161 private Set<String> scopes; field in class:UmaPolicy 202 * Parses the unique set of scopes that are defined for all subject in this UMA policy. 204 * @return The set of defined scopes on the UMA policy. 207 if (scopes == null) { 208 scopes = new HashSet<>(); 210 scopes.addAll(permission.get(SCOPES_KEY).asList(String.class)); 213 return scopes; 233 * "scopes" [all...] |
/forgerock/openam-v13/openam-oauth2-common/oauth2-core/src/main/java/org/forgerock/oauth2/core/ |
H A D | AuthorizationServiceImpl.java | 169 * Gets the scope descriptions for the requested scopes. 180 * Gets the scope descriptions for the requested scopes. 182 * @param scopes The requested scopes. 183 * @param scopeDescriptions The descriptions for all possible allowed scopes. 186 private Map<String, String> getScopeDescriptions(Set<String> scopes, Map<String, String> scopeDescriptions) { argument 187 return Maps.filterKeys(scopeDescriptions, Predicates.in(scopes));
|
/forgerock/openam-v13/openam-scripting/src/test/java/org/forgerock/openam/oauth2/openid/ |
H A D | OidcClaimsExtensionTest.java | 194 private Bindings testBindings(Set<String> scopes) { argument 195 return testBindings(scopes, new HashMap<String, Set<Object>>()); 197 private <T> Bindings testBindings(Set<String> scopes, Map<String, Set<T>> requestedClaims) { argument 204 scriptVariables.put("scopes", scopes);
|
/forgerock/openam/openam-oauth2/src/main/java/org/forgerock/oauth2/core/ |
H A D | AuthorizationService.java | 225 * Gets the scope descriptions for the requested scopes. 236 * Gets the scope descriptions for the requested scopes. 238 * @param scopes The requested scopes. 239 * @param scopeDescriptions The descriptions for all possible allowed scopes. 242 private Map<String, String> getScopeDescriptions(Set<String> scopes, Map<String, String> scopeDescriptions) { argument 243 return Maps.filterKeys(scopeDescriptions, Predicates.in(scopes));
|
/forgerock/openam/openam-oauth2/src/test/java/org/forgerock/openam/openidconnect/ |
H A D | OidcClaimsExtensionTest.java | 195 private Bindings testBindings(Set<String> scopes) { argument 196 return testBindings(scopes, new HashMap<String, Set<Object>>()); 198 private <T> Bindings testBindings(Set<String> scopes, Map<String, Set<T>> requestedClaims) { argument 205 scriptVariables.put("scopes", scopes);
|
/forgerock/openam-v13/openam-core/src/main/java/org/forgerock/openam/sm/datalayer/impl/uma/ |
H A D | UmaPendingRequest.java | 66 String requestingPartyId, Set<String> scopes) { 73 field("scopes", scopes), 134 return blob.get("scopes").asSet(String.class); 65 UmaPendingRequest(String resourceSetId, String resourceSetName, String resourceOwnerId, String realm, String requestingPartyId, Set<String> scopes) argument
|
/forgerock/openam-v13/openam-uma/src/test/java/org/forgerock/openam/uma/rest/ |
H A D | PolicyGraphTest.java | 311 private static ResourceResponse makePolicy(String owner, String subject, boolean active, String... scopes) { argument 319 for (String scope : scopes) {
|
/forgerock/openam-v13/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/ |
H A D | UpgradeOAuth2ClientStep.java | 132 // Check if single string scopes are included in the Scope(s) or Default Scope(s). 133 Set<String> scopes = attrs.get(attrName); 135 for (String scope : scopes) { 204 // If single string scopes are included in the Scope(s) or Default Scope(s), then apend a pipe. 238 private void addScopesWithPipe(Map<String, Set<String>> attrs, String attrName, Set<String> scopes) { argument 241 for (String scope : scopes) {
|
/forgerock/openam/openam-core/src/main/java/org/forgerock/openam/sm/datalayer/impl/uma/ |
H A D | UmaPendingRequest.java | 72 String requestingPartyId, Set<String> scopes) { 79 field("scopes", newList(scopes)), 140 return blob.get("scopes").as(setOf(String.class)); 71 UmaPendingRequest(String resourceSetId, String resourceSetName, String resourceOwnerId, String realm, String requestingPartyId, Set<String> scopes) argument
|
/forgerock/openam/openam-uma/src/test/java/org/forgerock/openam/uma/rest/ |
H A D | PolicyGraphTest.java | 311 private static ResourceResponse makePolicy(String owner, String subject, boolean active, String... scopes) { argument 319 for (String scope : scopes) {
|
/forgerock/openam/openam-upgrade/src/main/java/org/forgerock/openam/upgrade/steps/ |
H A D | UpgradeOAuth2ClientStep.java | 132 // Check if single string scopes are included in the Scope(s) or Default Scope(s). 133 Set<String> scopes = attrs.get(attrName); 135 for (String scope : scopes) { 207 // If single string scopes are included in the Scope(s) or Default Scope(s), then apend a pipe. 243 private void addScopesWithPipe(Map<String, Set<String>> attrs, String attrName, Set<String> scopes) { argument 246 for (String scope : scopes) {
|
/forgerock/openam-v13/openam-oauth2/src/main/java/org/forgerock/openam/oauth2/ |
H A D | OpenAMScopeValidator.java | 172 Set<String> scopes; 175 scopes = defaultScopes; 177 scopes = new HashSet<String>(allowedScopes); 178 scopes.retainAll(requestedScopes); 179 if (requestedScopes.size() > scopes.size()) { 186 if (scopes == null || scopes.isEmpty()) { 190 return scopes; 203 Set<String> scopes; 221 scopes 257 getScriptFriendlyScopes(Set<String> scopes) argument [all...] |
/forgerock/openam-v13/openam-uma/src/main/java/org/forgerock/openam/uma/rest/ |
H A D | PolicyGraph.java | 131 * either active or inactive based on entitlements) will be iterated over, moving scopes 185 * Moves the scopes that are incorrectly active/inactive to a policy that has the opposite state. 189 * @param policyResourceDelegate To be used for deleting any policies that are emptied of scopes (actions). 190 * @param allMovingRights All the scopes that need switching state. 235 // No scopes left in the policy, so it can be removed. 276 Set<String> scopes) { 280 Set<String> receivedScopes = new HashSet<>(scopes); 361 Set<String> scopes = UmaPolicyUtils.getPolicyScopes(policy); 371 edge.actions.addAll(scopes); 383 for (String scope : scopes) { 275 findRights0(Map<String, Set<String>> rights, Set<String> visited, PolicyEdge edge, Set<String> scopes) argument [all...] |