/**
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2008 Sun Microsystems Inc. All Rights Reserved
*
* The contents of this file are subject to the terms
* of the Common Development and Distribution License
* (the License). You may not use this file except in
* compliance with the License.
*
* You can obtain a copy of the License at
* See the License for the specific language governing
* permission and limitations under the License.
*
* When distributing Covered Code, include this CDDL
* Header Notice in each file and include the License file
* at opensso/legal/CDDLv1.0.txt.
* If applicable, add the following below the CDDL Header,
* with the fields enclosed by brackets [] replaced by
* your own identifying information:
* "Portions Copyrighted [year] [name of copyright owner]"
*
* $Id: SAMLv2IDPAssertionContentViewBean.java,v 1.5 2008/09/25 01:52:20 babysunil Exp $
*
* Portions Copyrighted 2013-2015 ForgeRock AS.
*/
public SAMLv2IDPAssertionContentViewBean() {
super("SAMLv2IDPAssertionContent");
}
protected void registerChildren() {
super.registerChildren();
if (isHosted()) {
AMTableTiledView.class);
}
}
this, tblAuthContextsModel, name);
} else {
}
return view;
}
throws ModelControlException {
super.beginDisplay(event);
if (isHosted()) {
try {
} catch (AMConsoleException e){
e.getMessage());
}
}
}
protected void createPropertyModel() {
if (isHosted()) {
psModel = new AMPropertySheetModel(
} else {
psModel = new AMPropertySheetModel(
}
}
private void createAuthContextsModel() {
"samlv2.idp.authenticationContext.table.name.contextReference.name");
"samlv2.idp.authenticationContext.table.name.supported.name");
"samlv2.idp.authenticationContext.table.name.key.name");
"samlv2.idp.authenticationContext.table.name.value.name");
"samlv2.idp.authenticationContext.table.name.level.name");
}
throws ModelControlException
{
boolean isDefault = false;
isDefault = true;
supported = "true";
}
}
return authContexts;
}
throws ModelControlException {
try {
//retrieve the standard metadata values from the property sheet
//retrieve the extended metadata values from the property sheet
// Check if the signing keypass has been updated, if it hasn't then remove it from the update since
// password fields are set to AMPropertySheetModel.passwordRandom before they are displayed to the user.
// User did not change the password => remove fake value to avoid it overriding the stored value
} else {
// The value has been updated
// If the value is blank, don't encode
} else {
//Since it is plain text we need to encrypt it before storing
}
}
}
}
//save the standard metadata values for the Idp
//save the extended metadata values for the Idp
if (isHosted()) {
//update Authentication Contexts
//save the encryption and signing info
}
} catch (AMConsoleException e) {
}
forwardTo();
}
try {
//gets standard metadata values
realm, entityName);
} catch (AMConsoleException e) {
e.getMessage() );
}
return map;
}
try {
}
} catch (AMConsoleException e) {
}
return extendedValues;
}
}