/forgerock/openam-v13/openam-examples/openam-example-clientsdk-cli/src/main/java/com/sun/identity/samples/clientsdk/logging/ |
H A D | LogSample.java | 77 SSOToken userSSOToken = null; field in class:LogSample 133 userSSOToken = sampleUtils.realmLogin(userSID, userPWD, userAC); 156 userSSOToken);
|
/forgerock/openam-v13/openam-federation/OpenFM/src/test/java/com/sun/identity/policy/ |
H A D | ProxyPETest.java | 63 private SSOToken userSSOToken; field in class:ProxyPETest 71 userSSOToken = login();
|
H A D | PolicyEvaluatorTest.java | 74 private SSOToken userSSOToken; field in class:PolicyEvaluatorTest 82 userSSOToken = login(); 138 if (!pe.isAllowed(userSSOToken, "http://www.sun.com:8080/private", "GET")){ 144 if (pe.isAllowed(userSSOToken, "http://www.sun.com:8080/public", "GET")){ 153 Set<ResourceResult> resResults = pe.getResourceResults(userSSOToken, 174 Set<ResourceResult> resResults = pe.getResourceResults(userSSOToken,
|
H A D | PolicyWildcardTest.java | 80 private SSOToken userSSOToken; field in class:PolicyWildcardTest 95 userSSOToken = Util.datastoreLogin(TEST_USER_NAME, TEST_USER_NAME, REALM); 121 SSOTokenManager.getInstance().destroyToken(userSSOToken); 140 Assert.assertTrue(pe.isAllowed(userSSOToken, URL_USER_TEST1, Util.GET_ACTION), "Expecting " + URL_USER_TEST1 + " to be allowed."); 147 Assert.assertTrue(pe.isAllowed(userSSOToken, URL_USER_TEST2, Util.GET_ACTION), "Expecting " + URL_USER_TEST2 + " to be allowed."); 154 Assert.assertTrue(pe.isAllowed(userSSOToken, URL_USER_TEST3, Util.GET_ACTION), "Expecting " + URL_USER_TEST3 + " to be allowed."); 182 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST1, ResourceResult.SELF_SCOPE), "Expecting SELF " + URL_USER_TEST1 + " to be allowed."); 189 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST2, ResourceResult.SELF_SCOPE), "Expecting SELF " + URL_USER_TEST2 + " to be allowed."); 196 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST3, ResourceResult.SELF_SCOPE), "Expecting SELF " + URL_USER_TEST3 + " to be allowed."); 203 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST [all...] |
/forgerock/openam/openam-examples/openam-example-clientsdk-cli/src/main/java/com/sun/identity/samples/clientsdk/logging/ |
H A D | LogSample.java | 77 SSOToken userSSOToken = null; field in class:LogSample 133 userSSOToken = sampleUtils.realmLogin(userSID, userPWD, userAC); 156 userSSOToken);
|
/forgerock/openam/openam-federation/OpenFM/src/test/java/com/sun/identity/policy/ |
H A D | ProxyPETest.java | 63 private SSOToken userSSOToken; field in class:ProxyPETest 71 userSSOToken = login();
|
H A D | PolicyEvaluatorTest.java | 74 private SSOToken userSSOToken; field in class:PolicyEvaluatorTest 82 userSSOToken = login(); 138 if (!pe.isAllowed(userSSOToken, "http://www.sun.com:8080/private", "GET")){ 144 if (pe.isAllowed(userSSOToken, "http://www.sun.com:8080/public", "GET")){ 153 Set<ResourceResult> resResults = pe.getResourceResults(userSSOToken, 174 Set<ResourceResult> resResults = pe.getResourceResults(userSSOToken,
|
H A D | PolicyWildcardTest.java | 80 private SSOToken userSSOToken; field in class:PolicyWildcardTest 95 userSSOToken = Util.datastoreLogin(TEST_USER_NAME, TEST_USER_NAME, REALM); 121 SSOTokenManager.getInstance().destroyToken(userSSOToken); 140 Assert.assertTrue(pe.isAllowed(userSSOToken, URL_USER_TEST1, Util.GET_ACTION), "Expecting " + URL_USER_TEST1 + " to be allowed."); 147 Assert.assertTrue(pe.isAllowed(userSSOToken, URL_USER_TEST2, Util.GET_ACTION), "Expecting " + URL_USER_TEST2 + " to be allowed."); 154 Assert.assertTrue(pe.isAllowed(userSSOToken, URL_USER_TEST3, Util.GET_ACTION), "Expecting " + URL_USER_TEST3 + " to be allowed."); 182 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST1, ResourceResult.SELF_SCOPE), "Expecting SELF " + URL_USER_TEST1 + " to be allowed."); 189 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST2, ResourceResult.SELF_SCOPE), "Expecting SELF " + URL_USER_TEST2 + " to be allowed."); 196 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST3, ResourceResult.SELF_SCOPE), "Expecting SELF " + URL_USER_TEST3 + " to be allowed."); 203 Util.isGetPostAllowed(userSSOToken, URL_USER_TEST [all...] |
/forgerock/openam/openam-core-rest/src/main/java/org/forgerock/openam/core/rest/sms/ |
H A D | ServicesRealmSmsHandler.java | 187 private AMIdentity getIdentityServices(String realmName, SSOToken userSSOToken) argument 189 AMIdentityRepository repo = new AMIdentityRepository(realmName, userSSOToken);
|
/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/policy/remote/ |
H A D | ResourceResultRequest.java | 53 * The attribute userSSOToken provides the identity of the user. 73 * userSSOToken CDATA #IMPLIED 86 static final String USER_SSOTOKEN = "userSSOToken"; 99 private String userSSOToken = null; field in class:ResourceResultRequest 119 return userSSOToken; 128 userSSOToken = ssoToken; 328 .append((userSSOToken != null) 329 ? userSSOToken : PolicyUtils.EMPTY_STRING)
|
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/remote/ |
H A D | ResourceResultRequest.java | 53 * The attribute userSSOToken provides the identity of the user. 73 * userSSOToken CDATA #IMPLIED 86 static final String USER_SSOTOKEN = "userSSOToken"; 99 private String userSSOToken = null; field in class:ResourceResultRequest 119 return userSSOToken; 128 userSSOToken = ssoToken; 328 .append((userSSOToken != null) 329 ? userSSOToken : PolicyUtils.EMPTY_STRING)
|