/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/org/forgerock/openam/saml2/ |
H A D | IDPRequestValidator.java | 48 * @param idpMetaAlias Non null meta alias. 53 String getIDPEntity(String idpMetaAlias, String realm) argument 71 * @param idpMetaAlias the IDP Meta Alias 74 String getRealmByMetaAlias(String idpMetaAlias); argument
|
H A D | IDPSSOFederateRequest.java | 35 private final String idpMetaAlias; field in class:IDPSSOFederateRequest 54 * @param idpMetaAlias The meta alias to use. 58 String idpMetaAlias, String idpEntityID) { 62 this.idpMetaAlias = idpMetaAlias; 165 return idpMetaAlias; 57 IDPSSOFederateRequest(String reqID, String realm, SAML2IdentityProviderAdapter idpAdapter, String idpMetaAlias, String idpEntityID) argument
|
H A D | UtilProxyIDPRequestValidator.java | 91 * @param idpMetaAlias Non null meta alias 97 public String getIDPEntity(String idpMetaAlias, String realm) throws ServerFaultException, ClientFaultException { argument 101 idpEntityID = saml2MetaManager.getEntityByMetaAlias(idpMetaAlias); 103 debug.error("Failed to locate IDP Entity ID\nRealm: {0}\nIDP Meta Alias: {1}", realm, idpMetaAlias); 118 LogUtil.error(Level.INFO, LogUtil.IDP_METADATA_ERROR, new String[]{ idpMetaAlias }, null); 153 public String getRealmByMetaAlias(String idpMetaAlias) { argument 154 return SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias);
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/org/forgerock/openam/saml2/ |
H A D | IDPRequestValidator.java | 48 * @param idpMetaAlias Non null meta alias. 53 String getIDPEntity(String idpMetaAlias, String realm) argument 71 * @param idpMetaAlias the IDP Meta Alias 74 String getRealmByMetaAlias(String idpMetaAlias); argument
|
H A D | IDPSSOFederateRequest.java | 35 private final String idpMetaAlias; field in class:IDPSSOFederateRequest 54 * @param idpMetaAlias The meta alias to use. 58 String idpMetaAlias, String idpEntityID) { 62 this.idpMetaAlias = idpMetaAlias; 165 return idpMetaAlias; 57 IDPSSOFederateRequest(String reqID, String realm, SAML2IdentityProviderAdapter idpAdapter, String idpMetaAlias, String idpEntityID) argument
|
H A D | UtilProxyIDPRequestValidator.java | 91 * @param idpMetaAlias Non null meta alias 97 public String getIDPEntity(String idpMetaAlias, String realm) throws ServerFaultException, ClientFaultException { argument 101 idpEntityID = saml2MetaManager.getEntityByMetaAlias(idpMetaAlias); 103 debug.error("Failed to locate IDP Entity ID\nRealm: {}\nIDP Meta Alias: {}", realm, idpMetaAlias); 118 LogUtil.error(Level.INFO, LogUtil.IDP_METADATA_ERROR, new String[]{ idpMetaAlias }, null); 153 public String getRealmByMetaAlias(String idpMetaAlias) { argument 154 return SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias);
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/multiprotocol/ |
H A D | IDFFSingleLogoutHandler.java | 140 String idpMetaAlias = findIDPMetaAlias(idpEntityID, spEntityID, 142 if (idpMetaAlias == null) { 148 "IDFF idp meta alias=" + idpMetaAlias + 158 String idpEntityId = idffManager.getEntityIDByMetaAlias(idpMetaAlias); 159 if (!FSLogoutUtil.liveConnectionsExist(userID, idpMetaAlias)) { 165 request, response, realm, idpMetaAlias, 176 idpMetaAlias + "&" + IFSConstants.RELAY_STATE + "=" + 190 String realm, String idpMetaAlias, String idpEntityId, 201 FSSessionManager.getInstance(idpMetaAlias); 231 handlerObj.setMetaAlias(idpMetaAlias); 188 handleSOAPInitiatedSingleLogout(Set userSession, String userID, HttpServletRequest request, HttpServletResponse response, String realm, String idpMetaAlias, String idpEntityId, String relayState, IDFFMetaManager metaManager) argument [all...] |
H A D | SAML2SingleLogoutHandler.java | 155 String idpMetaAlias = findIDPMetaAlias(idpEntityID, spEntityID, 157 if (idpMetaAlias == null) { 171 String idpEntityId = saml2Manager.getEntityByMetaAlias(idpMetaAlias); 173 request, response, realm, idpMetaAlias, 277 String realm, String idpMetaAlias, String idpEntityId, 352 LogoutUtil.doLogout(idpMetaAlias, 275 handleSOAPInitiatedSingleLogout(Set userSession, String userID, HttpServletRequest request, HttpServletResponse response, String realm, String idpMetaAlias, String idpEntityId, String relayState, SAML2MetaManager saml2Manager) argument
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/multiprotocol/ |
H A D | IDFFSingleLogoutHandler.java | 140 String idpMetaAlias = findIDPMetaAlias(idpEntityID, spEntityID, 142 if (idpMetaAlias == null) { 148 "IDFF idp meta alias=" + idpMetaAlias + 158 String idpEntityId = idffManager.getEntityIDByMetaAlias(idpMetaAlias); 159 if (!FSLogoutUtil.liveConnectionsExist(userID, idpMetaAlias)) { 165 request, response, realm, idpMetaAlias, 176 idpMetaAlias + "&" + IFSConstants.RELAY_STATE + "=" + 190 String realm, String idpMetaAlias, String idpEntityId, 201 FSSessionManager.getInstance(idpMetaAlias); 231 handlerObj.setMetaAlias(idpMetaAlias); 188 handleSOAPInitiatedSingleLogout(Set userSession, String userID, HttpServletRequest request, HttpServletResponse response, String realm, String idpMetaAlias, String idpEntityId, String relayState, IDFFMetaManager metaManager) argument [all...] |
H A D | SAML2SingleLogoutHandler.java | 155 String idpMetaAlias = findIDPMetaAlias(idpEntityID, spEntityID, 157 if (idpMetaAlias == null) { 171 String idpEntityId = saml2Manager.getEntityByMetaAlias(idpMetaAlias); 173 request, response, realm, idpMetaAlias, 277 String realm, String idpMetaAlias, String idpEntityId, 352 LogoutUtil.doLogout(idpMetaAlias, 275 handleSOAPInitiatedSingleLogout(Set userSession, String userID, HttpServletRequest request, HttpServletResponse response, String realm, String idpMetaAlias, String idpEntityId, String relayState, SAML2MetaManager saml2Manager) argument
|
/forgerock/openam-v13/openam-federation/OpenFM/src/main/java/com/sun/identity/workflow/ |
H A D | ValidateSAML2.java | 66 private String idpMetaAlias; field in class:ValidateSAML2 94 if (idpMetaAlias != null) { 101 if (!idpConfig.getMetaAlias().equals(idpMetaAlias)) { 226 idpMetaAlias = idp.substring(idx+1, idx1); 309 return (idpMetaAlias != null) && (idpMetaAlias.length() > 0); 313 if (idpMetaAlias != null) { 320 + URLEncoder.encode(idpMetaAlias, "UTF-8") 337 URLEncoder.encode(idpMetaAlias, "UTF-8") + 355 if (idpMetaAlias ! [all...] |
/forgerock/openam/openam-federation/OpenFM/src/main/java/com/sun/identity/workflow/ |
H A D | ValidateSAML2.java | 66 private String idpMetaAlias; field in class:ValidateSAML2 94 if (idpMetaAlias != null) { 101 if (!idpConfig.getMetaAlias().equals(idpMetaAlias)) { 226 idpMetaAlias = idp.substring(idx+1, idx1); 309 return (idpMetaAlias != null) && (idpMetaAlias.length() > 0); 313 if (idpMetaAlias != null) { 320 + URLEncoder.encode(idpMetaAlias, "UTF-8") 337 URLEncoder.encode(idpMetaAlias, "UTF-8") + 355 if (idpMetaAlias ! [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/servlet/ |
H A D | NameIDMappingServiceSOAP.java | 72 String idpMetaAlias = SAML2MetaUtils.getMetaAliasByUri( 75 getEntityByMetaAlias(idpMetaAlias); 76 String realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 87 "uri = " + req.getRequestURI() + ", idpMetaAlias = " + 88 idpMetaAlias + ", idpEntityID = " + idpEntityID);
|
H A D | IDPSingleLogoutServiceSOAP.java | 81 String idpMetaAlias = SAML2MetaUtils.getMetaAliasByUri( 84 getEntityByMetaAlias(idpMetaAlias); 85 String realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 95 req.getRequestURI() +", idpMetaAlias=" + idpMetaAlias
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/servlet/ |
H A D | NameIDMappingServiceSOAP.java | 72 String idpMetaAlias = SAML2MetaUtils.getMetaAliasByUri( 75 getEntityByMetaAlias(idpMetaAlias); 76 String realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 87 "uri = " + req.getRequestURI() + ", idpMetaAlias = " + 88 idpMetaAlias + ", idpEntityID = " + idpEntityID);
|
H A D | IDPSingleLogoutServiceSOAP.java | 81 String idpMetaAlias = SAML2MetaUtils.getMetaAliasByUri( 84 getEntityByMetaAlias(idpMetaAlias); 85 String realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 95 req.getRequestURI() +", idpMetaAlias=" + idpMetaAlias
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/wsfederation/servlet/ |
H A D | IPSigninRequest.java | 103 String idpMetaAlias = WSFederationMetaUtils.getMetaAliasByUri( 105 if ((idpMetaAlias == null) 106 || (idpMetaAlias.trim().length() == 0)) { 116 String idpEntityID = metaManager.getEntityByMetaAlias(idpMetaAlias); 126 WSFederationMetaUtils.getRealmByMetaAlias(idpMetaAlias); 170 sendResponse(session, idpEntityID, spEntityID, idpMetaAlias, realm); 255 String spEntityId, String idpMetaAlias, String realm) 308 String[] values = {idpMetaAlias}; 325 "error setting idpMetaAlias into the session: ", e); 254 sendResponse(Object session, String idpEntityId, String spEntityId, String idpMetaAlias, String realm) argument
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/wsfederation/servlet/ |
H A D | IPSigninRequest.java | 110 String idpMetaAlias = WSFederationMetaUtils.getMetaAliasByUri( 112 if ((idpMetaAlias == null) 113 || (idpMetaAlias.trim().length() == 0)) { 123 String idpEntityID = metaManager.getEntityByMetaAlias(idpMetaAlias); 133 WSFederationMetaUtils.getRealmByMetaAlias(idpMetaAlias); 177 sendResponse(session, idpEntityID, spEntityID, idpMetaAlias, realm); 262 String spEntityId, String idpMetaAlias, String realm) 429 String[] values = {idpMetaAlias}; 446 "error setting idpMetaAlias into the session: ", e); 261 sendResponse(Object session, String idpEntityId, String spEntityId, String idpMetaAlias, String realm) argument
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | IDPSSOFederate.java | 216 String idpMetaAlias = validator.getMetaAlias(request); 217 String realm = validator.getRealmByMetaAlias(idpMetaAlias); 218 String idpEntityID = validator.getIDPEntity(idpMetaAlias, realm); 224 IDPSSOFederateRequest reqData = new IDPSSOFederateRequest(reqID, realm, idpAdapter, idpMetaAlias, idpEntityID);
|
H A D | IDPArtifactResolution.java | 121 String idpMetaAlias = request.getParameter( 123 if ((idpMetaAlias == null) 124 || (idpMetaAlias.trim().length() == 0)) { 125 idpMetaAlias = SAML2MetaUtils.getMetaAliasByUri( 128 if ((idpMetaAlias == null) 129 || (idpMetaAlias.trim().length() == 0)) { 134 String[] data = { idpMetaAlias }; 149 idpMetaAlias); 163 realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 167 String[] data = { idpMetaAlias }; [all...] |
H A D | IDPSSOUtil.java | 179 * @param idpMetaAlias the meta alias of the identity provider 190 String idpMetaAlias, 196 spEntityID, idpMetaAlias, nameIDFormat, 208 * @param idpMetaAlias the meta alias of the identity provider 220 String idpMetaAlias, 253 String[] logdata = {spEntityID, idpMetaAlias, authnRequestStr}; 267 idpEntityID = metaManager.getEntityByMetaAlias(idpMetaAlias); 278 realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 282 String[] data = {idpMetaAlias}; 367 idpEntityID, idpMetaAlias, real 185 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, SAML2EventLogger auditor) argument 215 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, Object newSession, SAML2EventLogger auditor) argument 388 sendResponseToACS(HttpServletRequest request, HttpServletResponse response, PrintWriter out, Object session, AuthnRequest authnReq, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String relayState, AuthnContext matchingAuthnContext) argument 536 setCOTCookie( HttpServletRequest request, HttpServletResponse response, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 625 sendNoPassiveResponse(HttpServletRequest request, HttpServletResponse response, PrintWriter out, String idpMetaAlias, String idpEntityID, String realm, AuthnRequest authnReq, String relayState, String spEntityID) argument 692 sendResponse( HttpServletRequest request, HttpServletResponse response, PrintWriter out, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 783 getResponse( HttpServletRequest request, Object session, AuthnRequest authnReq, String recipientEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String acsURL, String affiliationID, AuthnContext matchingAuthnContext) argument 871 getAssertion( HttpServletRequest request, Object session, AuthnRequest authnReq, String recipientEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String acsURL, String affiliationID, AuthnContext matchingAuthnContext) argument [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml2/profile/ |
H A D | IDPSSOFederate.java | 216 String idpMetaAlias = validator.getMetaAlias(request); 217 String realm = validator.getRealmByMetaAlias(idpMetaAlias); 218 String idpEntityID = validator.getIDPEntity(idpMetaAlias, realm); 227 IDPSSOFederateRequest reqData = new IDPSSOFederateRequest(reqID, realm, idpAdapter, idpMetaAlias, idpEntityID);
|
H A D | IDPArtifactResolution.java | 123 String idpMetaAlias = request.getParameter( 125 if ((idpMetaAlias == null) 126 || (idpMetaAlias.trim().length() == 0)) { 127 idpMetaAlias = SAML2MetaUtils.getMetaAliasByUri( 130 if ((idpMetaAlias == null) 131 || (idpMetaAlias.trim().length() == 0)) { 136 String[] data = { idpMetaAlias }; 151 idpMetaAlias); 165 realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 169 String[] data = { idpMetaAlias }; [all...] |
H A D | IDPSSOUtil.java | 183 * @param idpMetaAlias the meta alias of the identity provider 194 String idpMetaAlias, 200 spEntityID, idpMetaAlias, nameIDFormat, 212 * @param idpMetaAlias the meta alias of the identity provider 224 String idpMetaAlias, 257 String[] logdata = {spEntityID, idpMetaAlias, authnRequestStr}; 271 idpEntityID = metaManager.getEntityByMetaAlias(idpMetaAlias); 282 realm = SAML2MetaUtils.getRealmByMetaAlias(idpMetaAlias); 286 String[] data = {idpMetaAlias}; 371 idpEntityID, idpMetaAlias, real 189 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, SAML2EventLogger auditor) argument 219 doSSOFederate(HttpServletRequest request, HttpServletResponse response, PrintWriter out, AuthnRequest authnReq, String spEntityID, String idpMetaAlias, String nameIDFormat, String relayState, Object newSession, SAML2EventLogger auditor) argument 392 sendResponseToACS(HttpServletRequest request, HttpServletResponse response, PrintWriter out, Object session, AuthnRequest authnReq, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String relayState, AuthnContext matchingAuthnContext) argument 540 setCOTCookie( HttpServletRequest request, HttpServletResponse response, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 632 sendResponseWithStatus(HttpServletRequest request, HttpServletResponse response, PrintWriter out, String idpMetaAlias, String idpEntityID, String realm, AuthnRequest authnReq, String relayState, String spEntityID, String firstlevelStatusCodeValue, String secondlevelStatusCodeValue) argument 701 sendResponse( HttpServletRequest request, HttpServletResponse response, PrintWriter out, String acsBinding, String spEntityID, String idpEntityID, String idpMetaAlias, String realm, String relayState, String acsURL, Response res, Object session) argument 792 getResponse( HttpServletRequest request, Object session, AuthnRequest authnReq, String recipientEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String acsURL, String affiliationID, AuthnContext matchingAuthnContext) argument 880 getAssertion( HttpServletRequest request, Object session, AuthnRequest authnReq, String recipientEntityID, String idpEntityID, String idpMetaAlias, String realm, String nameIDFormat, String acsURL, String affiliationID, AuthnContext matchingAuthnContext) argument [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/fedlet/ag/ |
H A D | MetaDataParser.java | 149 String idpMetaAlias = null; 155 idpMetaAlias = ssoURL.substring(loc + 10); 157 return idpMetaAlias;
|