/**
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2008 Sun Microsystems Inc. All Rights Reserved
*
* The contents of this file are subject to the terms
* of the Common Development and Distribution License
* (the License). You may not use this file except in
* compliance with the License.
*
* You can obtain a copy of the License at
* See the License for the specific language governing
* permission and limitations under the License.
*
* When distributing Covered Code, include this CDDL
* Header Notice in each file and include the License file
* at opensso/legal/CDDLv1.0.txt.
* If applicable, add the following below the CDDL Header,
* with the fields enclosed by brackets [] replaced by
* your own identifying information:
* "Portions Copyrighted [year] [name of copyright owner]"
*
* $Id: AmIdentityAsserterBase.java,v 1.4 2009/03/07 01:15:39 leiming Exp $
*
*/
/**
*/
implements IAmIdentityAsserter {
super(manager);
}
}
setActiveFlag(true);
} else {
setActiveFlag(false);
}
// Regardless of which mode the runtime is configured for, the
// TAI implementation only requries SSO functionality. The rest
// is delegated to the regular filter.
//
// Note that this filter is not an independent filter, but is
// created within the websphere module.
// Realm is used for memberships
if (isLogMessageEnabled()) {
logMessage("AmIdentityAsserter: initilaized");
}
}
throws WebTrustAssociationException {
boolean result = false;
if (isActive()) {
}
if (isLogMessageEnabled()) {
logMessage("AmIdentityAsserter: request uri: "
}
return result;
}
throws WebTrustAssociationFailedException {
try {
if (ssoValidationResult != null
&& ssoValidationResult.isValid()) {
} else {
}
break;
break;
break;
break;
default:
throw new AgentException("Invalid filter result: "
+ filterResult);
}
logError("AmIdentityAsserter: Exception caught, denying access",
ex);
}
if (isLogMessageEnabled()) {
}
return result;
}
throws Exception;
throws Exception {
}
throws WebTrustAssociationFailedException {
try {
} catch (IOException ex) {
throw new WebTrustAssociationFailedException(
"Invalid response state");
}
}
throws Exception {
}
throws Exception {
try {
} catch(IOException ex) {
throw ex;
} finally {
}
}
}
boolean pathInfoIgnored = getConfigurationBoolean(
if (pathInfoIgnored) {
} else {
}
if (isLogMessageEnabled()) {
logMessage("AmIdentityAsserter.isNotenforcedRequest() - " +
"requested URL=> " + requestURL);
}
return (getNotEnforcedListURIHelper().isNotEnforced(
}
/*
* create RequestContext just to get absolute requested URL.
*/
return requestContext;
}
}
return agentHost;
}
if (agentProtocol == null) {
}
return agentProtocol;
}
int agentPort = getConfigurationInt(
if (agentPort <= 0) {
}
return agentPort;
}
} else {
}
return appName;
}
return getManager().getApplicationConfigurationString(
}
}
}
return _amFilter;
}
}
return _amRealm;
}
}
return _ssoTokenValidator;
}
}
return _notEnforcedIPHelper;
}
}
return _notEnforcedListURIHelper;
}
if (isLogMessageEnabled()) {
}
}
private boolean isActive() {
return _isActive;
}
private boolean _isActive;
}