/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/main/js/config/routes/ |
H A D | AdminRoutesConfig.js | 25 role: "ui-admin", 30 role: "ui-admin", 35 role: "ui-admin", 40 role: "ui-admin", 45 role: "ui-admin", 50 role: "ui-admin", 57 role: "ui-admin", 62 role: "ui-admin", 67 role: "ui-admin", 73 role [all...] |
/forgerock/openidm-v4/openidm-ui/openidm-ui-common/src/main/js/config/routes/ |
H A D | CommonIDMRoutesConfig.js | 26 role: "ui-admin"
|
/forgerock/openidm-v4/openidm-zip/src/main/resources/samples/usecase/script/ |
H A D | certificationEntitlements.js | 1 function startCertificationWorkflow(role) { 3 "roleId" : role._id, 5 "_businessKey" : "RoleId: " + role._id 11 var allRoles = openidm.query("managed/role", {
|
/forgerock/openam-v13/openam-ui/openam-ui-ria/src/main/js/config/routes/user/ |
H A D | UMARoutes.js | 25 role: "ui-uma-user", 34 role: "ui-uma-user", 47 role: "ui-uma-user", 55 role: "ui-uma-user", 68 role: "ui-uma-user", 76 role: "ui-uma-user", 89 role: "ui-uma-user", 98 role: "ui-uma-user", 108 role: "ui-uma-user", 116 role [all...] |
/forgerock/openam/openam-ui/openam-ui-ria/src/main/js/config/routes/user/ |
H A D | UMARoutes.js | 25 role: "ui-uma-user", 34 role: "ui-uma-user", 47 role: "ui-uma-user", 55 role: "ui-uma-user", 68 role: "ui-uma-user", 76 role: "ui-uma-user", 89 role: "ui-uma-user", 98 role: "ui-uma-user", 108 role: "ui-uma-user", 116 role [all...] |
/forgerock/openidm-v4/openidm-ui/openidm-ui-admin/src/main/js/org/forgerock/openidm/ui/admin/role/ |
H A D | EditRoleView.js | 19 define("org/forgerock/openidm/ui/admin/role/EditRoleView", [ 28 "org/forgerock/openidm/ui/admin/role/RoleUsersView", 29 "org/forgerock/openidm/ui/admin/role/RoleEntitlementsListView", 42 template: "templates/admin/role/EditRoleViewTemplate.html", 65 $.when(rolePromise, schemaPromise).then(_.bind(function(role, schema){ 66 if(role.length && !role[0].assignments) { 67 role[0].assignments = {}; 69 this.data.role = role[ [all...] |
H A D | RoleEntitlementsListView.js | 19 define("org/forgerock/openidm/ui/admin/role/RoleEntitlementsListView", [ 28 "org/forgerock/openidm/ui/admin/role/RoleEntitlementsEditView", 43 element: "#role-entitlements", 44 template: "templates/admin/role/RoleEntitlementsListViewTemplate.html", 54 roleEntitlementsEditView.render(this.data.args, this.data.role, null, this); 57 var assignmentName = $(e.target).closest(".role-assignment-item").attr("assignmentName"); 63 roleEntitlementsEditView.render(this.data.args, this.data.role, assignmentName, this); 66 var assignmentName = $(e.target).closest(".role-assignment-item").attr("assignmentName"); 70 delete this.data.role.assignments[assignmentName]; 74 resourceDelegate.updateResource(this.data.serviceUrl, this.data.role [all...] |
/forgerock/openidm-v4/openidm-ui/openidm-ui-enduser/src/main/js/config/routes/ |
H A D | SelfServiceRoutesConfig.js | 25 role: "ui-user",
|
/forgerock/openam-v13/openam-federation/OpenFM/src/main/scripts/bulkfed/id-ff/ |
H A D | amGenerateLDIF.pl | 99 $role = $ARGV[3]; 101 if($role ne 'IDP' && $role ne 'SP') { 102 print "$role: Invalid Provider Role. Role must be either IDP or SP\n"; 126 if($role eq 'SP') { 142 } elsif ($role eq 'IDP') {
|
/forgerock/openam-v13/openam-federation/OpenFM/src/main/scripts/bulkfed/saml2/ |
H A D | saml2GenerateLDIF.pl | 91 $role = $ARGV[3]; 93 if($role ne 'IDP' && $role ne 'SP') { 94 print "$role: Invalid Provider Role. Role must be either IDP or SP\n"; 120 if($role eq 'SP') { 127 if($role eq 'SP') {
|
H A D | saml2bulkfed | 87 $ECHO "`$gettext ' ' `$0 [ -u | --user ] [ -w | --passfile ] [ -h | --host ] [ -p | --port ] [ -t | --role ] [ -l | --hostid ] [ -r | --remoteid ] [-f | --file]" 98 $ECHO "`$gettext ' -t, --role` " 99 $ECHO "`$gettext ' Host entity role. It must be either IDP or SP` " 142 role="" 161 "-t" | "--role") 166 role=$2 298 $GENERATE_LDIF localnameidentifiers.txt $hostentityid $remoteentityid $role 312 if [ "$role" = "SP" ] 314 role="IDP" 316 role [all...] |
/forgerock/openam/openam-federation/OpenFM/src/main/scripts/bulkfed/id-ff/ |
H A D | amGenerateLDIF.pl | 99 $role = $ARGV[3]; 101 if($role ne 'IDP' && $role ne 'SP') { 102 print "$role: Invalid Provider Role. Role must be either IDP or SP\n"; 126 if($role eq 'SP') { 142 } elsif ($role eq 'IDP') {
|
/forgerock/openam/openam-federation/OpenFM/src/main/scripts/bulkfed/saml2/ |
H A D | saml2GenerateLDIF.pl | 91 $role = $ARGV[3]; 93 if($role ne 'IDP' && $role ne 'SP') { 94 print "$role: Invalid Provider Role. Role must be either IDP or SP\n"; 120 if($role eq 'SP') { 127 if($role eq 'SP') {
|
H A D | saml2bulkfed | 87 $ECHO "`$gettext ' ' `$0 [ -u | --user ] [ -w | --passfile ] [ -h | --host ] [ -p | --port ] [ -t | --role ] [ -l | --hostid ] [ -r | --remoteid ] [-f | --file]" 98 $ECHO "`$gettext ' -t, --role` " 99 $ECHO "`$gettext ' Host entity role. It must be either IDP or SP` " 142 role="" 161 "-t" | "--role") 166 role=$2 298 $GENERATE_LDIF localnameidentifiers.txt $hostentityid $remoteentityid $role 312 if [ "$role" = "SP" ] 314 role="IDP" 316 role [all...] |
/forgerock/openam/openam-ui/openam-ui-ria/src/main/js/config/routes/admin/ |
H A D | GlobalRoutes.js | 25 role: "ui-global-admin", 32 role: "ui-global-admin", 39 role: "ui-global-admin", 46 role: "ui-global-admin", 53 role: "ui-realm-admin", 61 role: "ui-realm-admin", 69 role: "ui-realm-admin", 77 role: "ui-global-admin", 84 role: "ui-global-admin", 91 role [all...] |
/forgerock/openam-v13/openam-ui/openam-ui-ria/src/main/js/config/routes/ |
H A D | AMRoutesConfig.js | 37 role: "ui-user", 43 role: "ui-self-service-user", 50 role: "ui-user",
|
/forgerock/openidm-v4/openidm-authnfilter/src/main/java/org/forgerock/openidm/auth/modules/ |
H A D | PropertyRoleCalculator.java | 30 * Provides automatic role calculation based from the authentication configuration to provide support for common 44 * @param userRoles the object attribute that represents the role definition in the retrieved object. 70 for (String role : userDetail.get(userRoles).asString().split(",")) { 71 securityContextMapper.addRole(role); 74 for (JsonValue role : userDetail.get(userRoles)) { 75 if (RelationshipUtil.isRelationship(role)) { 77 JsonPointer roleId = new JsonPointer(role.get(RelationshipUtil.REFERENCE_ID).asString()); 81 securityContextMapper.addRole(role.asString());
|
/forgerock/openam/openam-ui/openam-ui-ria/src/main/js/config/routes/ |
H A D | AMRoutesConfig.js | 37 role: "ui-user", 43 role: "ui-self-service-user", 50 role: "ui-user",
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/wsfederation/plugins/whitelist/ |
H A D | ValidWReplyExtractor.java | 47 if (SAML2Constants.SP_ROLE.equalsIgnoreCase(entityInfo.role)) { 82 private final String role; field in class:ValidWReplyExtractor.WSFederationEntityInfo 84 private WSFederationEntityInfo(final String realm, final String entityID, final String role) { argument 87 this.role = role; 95 * @param role The role of the hosted entity (e.g. SPRole or IDPRole). 98 public static WSFederationEntityInfo from(final String realm, final String entityID, final String role) { argument 99 return new WSFederationEntityInfo(realm, entityID, role); 104 return "WSFederationEntityInfo{" + "realm=" + realm + ", entityID=" + entityID + ", role [all...] |
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/org/forgerock/openam/saml2/plugins/ |
H A D | ValidRelayStateExtractor.java | 44 if (SAML2Constants.SP_ROLE.equalsIgnoreCase(entityInfo.role)) { 78 private final String role; field in class:ValidRelayStateExtractor.SAMLEntityInfo 80 private SAMLEntityInfo(final String realm, final String entityID, final String role) { argument 83 this.role = role; 91 * @param role The role of the hosted entity (e.g. SPRole or IDPRole). 94 public static SAMLEntityInfo from(final String realm, final String entityID, final String role) { argument 95 return new SAMLEntityInfo(realm, entityID, role); 100 return "SAMLEntityInfo{" + "realm=" + realm + ", entityID=" + entityID + ", role [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/wsfederation/plugins/whitelist/ |
H A D | ValidWReplyExtractor.java | 47 if (SAML2Constants.SP_ROLE.equalsIgnoreCase(entityInfo.role)) { 82 private final String role; field in class:ValidWReplyExtractor.WSFederationEntityInfo 84 private WSFederationEntityInfo(final String realm, final String entityID, final String role) { argument 87 this.role = role; 95 * @param role The role of the hosted entity (e.g. SPRole or IDPRole). 98 public static WSFederationEntityInfo from(final String realm, final String entityID, final String role) { argument 99 return new WSFederationEntityInfo(realm, entityID, role); 104 return "WSFederationEntityInfo{" + "realm=" + realm + ", entityID=" + entityID + ", role [all...] |
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/org/forgerock/openam/saml2/plugins/ |
H A D | ValidRelayStateExtractor.java | 44 if (SAML2Constants.SP_ROLE.equalsIgnoreCase(entityInfo.role)) { 78 private final String role; field in class:ValidRelayStateExtractor.SAMLEntityInfo 80 private SAMLEntityInfo(final String realm, final String entityID, final String role) { argument 83 this.role = role; 91 * @param role The role of the hosted entity (e.g. SPRole or IDPRole). 94 public static SAMLEntityInfo from(final String realm, final String entityID, final String role) { argument 95 return new SAMLEntityInfo(realm, entityID, role); 100 return "SAMLEntityInfo{" + "realm=" + realm + ", entityID=" + entityID + ", role [all...] |
/forgerock/openam-v13/openam-console/src/main/java/com/sun/identity/console/federation/ |
H A D | SAMLProperty.java | 62 private String role; field in class:SAMLProperty 69 String role, 75 this.role = role; 101 * @return role 104 return role; 67 SAMLProperty( String name, String role, String bindMethod, String[] attributeNames, String[] mandNames ) argument
|
/forgerock/openam/openam-console/src/main/java/com/sun/identity/console/federation/ |
H A D | SAMLProperty.java | 62 private String role; field in class:SAMLProperty 69 String role, 75 this.role = role; 101 * @return role 104 return role; 67 SAMLProperty( String name, String role, String bindMethod, String[] attributeNames, String[] mandNames ) argument
|
/forgerock/jee-agents-v3.5/jee-agents-jetty/jee-agents-jetty-v61/src/main/java/com/sun/identity/agents/jetty/v61/ |
H A D | AMJettyUserRealm.java | 76 public boolean isUserInRole(Principal jettyUser, String role) { argument 86 + " required role for the app " + role); 87 if ((role != null) && (username != null)) { 90 hasRole = setRoles.contains(role); 97 + " has secuity role " + role); 120 "AMJettyUserRealm: " + username + " does not have role " 121 + role); 178 String role [all...] |