|
||||||||||
PREV NEXT | FRAMES NO FRAMES |
Uses of IdentityProviderException in org.wso2.solutions.identity |
---|
Methods in org.wso2.solutions.identity that throw IdentityProviderException | |
---|---|
void |
UserStore.changeRalm(java.lang.String realmConfigName)
Update the realm used to the given instance |
java.util.List<java.lang.String> |
UserStore.getAllUserNames()
Access the names of all users in the store. |
java.util.Map<java.lang.String,java.lang.String> |
UserStore.getClaimValues(java.lang.String username,
java.util.List<java.lang.String> propertyNames)
Return the list of claim values of the given user. |
java.util.Map<java.lang.String,java.lang.String> |
UserStore.getClaimValues(java.lang.String username,
java.lang.String profileName,
java.util.List<java.lang.String> propertyNames)
|
static UserStore |
UserStore.getInstance()
|
java.util.List<java.lang.String> |
UserStore.getPropertyNames()
Access the name of user properties in the store. |
void |
InitialClaimsProcessor.process(org.apache.axiom.om.OMElement initialClaims)
|
void |
InitialClaimsProcessor.process(java.lang.String filePath)
|
Uses of IdentityProviderException in org.wso2.solutions.identity.admin |
---|
Methods in org.wso2.solutions.identity.admin that throw IdentityProviderException | |
---|---|
static void |
STSConfigAdmin.configuraServices(boolean initial)
|
void |
ClaimsAdmin.createClaim(java.lang.String dialectUri,
java.lang.String uri,
java.lang.String displayTag,
java.lang.String description)
|
void |
ClaimsAdmin.createClaim(java.lang.String dialectUri,
java.lang.String uri,
java.lang.String displayTag,
java.lang.String description,
java.lang.String openIDTag)
|
void |
ClaimsAdmin.createDialect(java.lang.String dialectUri,
java.lang.String dialectInfo)
|
void |
RealmConfigAdmin.createNewRealmConfiguration(java.lang.String realmClassName,
java.lang.String configName,
java.util.Map properties)
|
void |
ParameterAdmin.createOrUpdatearameter(java.lang.String name,
java.lang.String value)
|
void |
EmailActivatorAdmin.createParamsAndInstanciateEmailVerifier(java.lang.String port,
java.lang.String host,
java.lang.String fromAddress,
java.lang.String username,
java.lang.String password)
|
void |
RealmConfigAdmin.deleteRealmConfiguration(RealmConfigurationDO config)
|
void |
RelyingPartyAdmin.deleteRelyingParty(RelyingPartyDO rp)
|
void |
KeystoreUtilAdmin.deleteRelyingParty(java.lang.String alias)
Removes the Certificate from default store |
java.lang.String |
RegisteredInfoCardInfoAdmin.extractPrimaryUserName(java.lang.String ppid)
This method extracts the primary username if there is one. |
java.util.List |
RegisteredInfoCardInfoAdmin.getAllRegisteredInfoCards(java.lang.String userId)
|
java.util.List |
ReportAdmin.getCardDetailsForUser(java.lang.String userId)
|
java.util.List |
ReportAdmin.getCardIdsGroupedByUser()
|
java.security.cert.X509Certificate |
KeystoreUtilAdmin.getCertificateFromUserTrustedRP(java.lang.String alias)
|
java.util.List |
ReportAdmin.getFailedCardIssueActions(java.util.Date fromDate,
java.util.Date toDate)
|
java.util.List |
ReportAdmin.getFailedTokenIssueActions(java.util.Date fromDate,
java.util.Date toDate)
|
RegisteredInfoCardInfoDO |
RegisteredInfoCardInfoAdmin.getInfo(java.lang.String ppid)
|
java.util.List<OpenIDSummaryReportData> |
ReportAdmin.getOpenIDsGroupedByUser()
|
RealmConfigurationDO |
RealmConfigAdmin.getRealmConfiguration(java.lang.String name)
|
java.util.List |
ReportAdmin.getTokenDetailsForCardAndUser(java.lang.String cardId,
java.lang.String userId)
|
java.util.List |
ReportAdmin.getTokenDetailsForCardId(java.lang.String cardId)
|
java.util.List |
ReportAdmin.getTokenDetailsForUser(java.lang.String userId)
|
java.util.List |
ReportAdmin.getTokensGroupedByCardAndUser()
|
java.util.List |
ReportAdmin.getTokensGroupedByCardId()
|
java.util.List |
ReportAdmin.getTokensGroupedByUser()
|
java.util.List |
ReportAdmin.getUserActionsByUser(java.lang.String username,
java.util.Date fromDate,
java.util.Date toDate)
|
java.lang.String |
KeystoreUtilAdmin.importCert(java.security.cert.X509Certificate cert)
|
java.lang.String |
KeystoreUtilAdmin.importCertToUserPersonalCertStore(java.security.cert.X509Certificate cert)
Imports the Certificate to user personal cert store. |
java.lang.String |
KeystoreUtilAdmin.importCertToUserTrustStore(java.security.cert.X509Certificate cert)
This method imports the Certificate to Trust store if it present already. |
boolean |
KeystoreUtilAdmin.isCertExists(java.security.cert.X509Certificate cert)
|
boolean |
RegisteredInfoCardInfoAdmin.isRegistedInformationCard(java.lang.String ppid)
Check whether there is a registered information card with the given ppid. |
static void |
ReportAdmin.record(java.lang.String username,
java.lang.String actionId,
java.lang.String details)
|
void |
RegisteredInfoCardInfoAdmin.registerNewInfoCardInformation(java.lang.String ppid,
java.lang.String userId,
java.lang.String issuerInfo)
|
void |
KeystoreUtilAdmin.removeCertEntryFromUserTrustedRP(java.lang.String alias)
Removes the Certificate from User trusted RP store |
void |
ParameterAdmin.removeParam(java.lang.String name)
|
void |
RelyingPartyAdmin.removePersonalRelyingParty(java.lang.String user,
java.lang.String hostName)
Remove a personal relying party |
void |
RegisteredInfoCardInfoAdmin.removeRegisteredInfoCard(java.lang.String ppid)
|
void |
InfoCardTokenAdmin.revokeInformationCard(java.lang.String cardId)
|
boolean |
RealmConfigAdmin.setDefaultRealmConfiguration(java.lang.String configName)
|
void |
RealmConfigAdmin.updateRealmConfigurationProperties(java.util.Set properties)
|
Constructors in org.wso2.solutions.identity.admin that throw IdentityProviderException | |
---|---|
ClaimsAdmin()
|
|
InfoCardTokenAdmin()
|
|
ParameterAdmin()
|
|
PPIDValueAdmin()
|
|
RelyingPartyAdmin()
|
Uses of IdentityProviderException in org.wso2.solutions.identity.cards |
---|
Methods in org.wso2.solutions.identity.cards that throw IdentityProviderException | |
---|---|
static CardIssuerConfig |
CardIssuerConfig.getInstance()
|
org.w3c.dom.Element |
CardIssuer.issueCardForSelfIssuedCard(java.lang.String ppid,
boolean requireAppliesTo)
|
org.w3c.dom.Element |
CardIssuer.issueCardForUsername(java.lang.String username,
boolean requireAppliesTo)
|
org.w3c.dom.Element |
CardIssuer.issueCardForX509V3Certificate(java.lang.String userName,
java.lang.String cert,
boolean requireAppliesTo)
|
static CardIssuerConfig |
CardIssuerConfig.updateConfig()
|
Constructors in org.wso2.solutions.identity.cards that throw IdentityProviderException | |
---|---|
CardIssuer()
|
Uses of IdentityProviderException in org.wso2.solutions.identity.openid |
---|
Methods in org.wso2.solutions.identity.openid that throw IdentityProviderException | |
---|---|
static java.lang.String |
OpenIDUtil.generateOpenID(java.lang.String user)
Generate OpenID for a given user. |
static java.lang.String |
OpenIDUtil.getOpenID(java.lang.String userName)
Find the OpenID corresponding to the given user name. |
static java.lang.String |
OpenIDUtil.getRelyingPartyUrl(java.lang.String rpUrl)
Normalize the provided relying party URL |
static java.lang.String[] |
OpenIDUtil.getRequestedAuthenticationPolicies(org.openid4java.message.ParameterList params)
Extracts authentication policies from the PAPE request |
static java.lang.String |
OpenIDUtil.getUserName(java.lang.String openId)
Find the user name corresponding to the given OpenID. |
java.lang.String |
OpenIDProvider.processRequest(javax.servlet.http.HttpServletRequest httpReq,
javax.servlet.http.HttpServletResponse httpResp)
Process the Relying Party request at the OpenID Provider end. |
Uses of IdentityProviderException in org.wso2.solutions.identity.openid.extensions |
---|
Methods in org.wso2.solutions.identity.openid.extensions that throw IdentityProviderException | |
---|---|
void |
OpenIDAttributeExchange.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
|
void |
OpenIDPape.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
|
void |
OpenIDSimpleReg.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
|
abstract void |
OpenIDExtension.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
|
static java.lang.String[] |
OpenIDPape.getAuthenticationPolicies(org.openid4java.message.AuthRequest authRequest)
|
protected java.lang.String |
OpenIDAttributeExchange.getMappedAxSchema(java.lang.String val)
This provides a mapping between http://schema.openid.net/ and http://axschema.org |
org.openid4java.message.MessageExtension |
OpenIDAttributeExchange.getMessageExtension(java.lang.String userId,
java.lang.String profileName)
Creates an instance of MessageExtension for the OpenID authentication response |
org.openid4java.message.MessageExtension |
OpenIDPape.getMessageExtension(java.lang.String userId,
java.lang.String profileName)
Creates an instance of MessageExtension for the OpenID authentication response |
org.openid4java.message.MessageExtension |
OpenIDSimpleReg.getMessageExtension(java.lang.String userId,
java.lang.String profileName)
Creates an instance of MessageExtension for the OpenID authentication response |
abstract org.openid4java.message.MessageExtension |
OpenIDExtension.getMessageExtension(java.lang.String userId,
java.lang.String profileName)
Creates an instance of MessageExtension for the OpenID authentication response |
protected java.util.Map<java.lang.String,OpenIDClaim> |
OpenIDExtension.populateAttributeValues(java.util.Collection<java.lang.String> requiredClaims,
java.lang.String userId,
java.util.Map<java.lang.String,ClaimDO> claims,
java.util.Map<java.lang.String,java.lang.String> openIDTagMapping,
java.lang.String profileName)
Populate the required claims with claim values. |
protected java.util.Map<java.lang.String,OpenIDClaim> |
OpenIDSimpleReg.populateAttributeValues(java.util.List<java.lang.String> requiredClaims,
java.lang.String userId,
java.lang.String profileName)
Populate the required claims with claim values. |
protected java.util.Map<java.lang.String,OpenIDClaim> |
OpenIDAttributeExchange.populateAttributeValues(java.util.Map<java.lang.String,java.lang.String> requiredClaims,
java.lang.String userId,
java.lang.String profileName)
Populate the required claims with claim values. |
Uses of IdentityProviderException in org.wso2.solutions.identity.openid.infocard |
---|
Methods in org.wso2.solutions.identity.openid.infocard that throw IdentityProviderException | |
---|---|
org.openid4java.message.ParameterList |
OpenIDInfoCardHeader.buildHeader(java.lang.String openID,
java.lang.String opAddress,
java.lang.String appliesTo)
Build the OpenIDToken header with the provided parameters. |
protected void |
OpenIDInfoCardProviderData.populateClaimValues(org.apache.rahas.RahasData rahasData)
This overrides the base class functionality to suit the OpenID related functionality. |
Constructors in org.wso2.solutions.identity.openid.infocard that throw IdentityProviderException | |
---|---|
OpenIDInfoCardProviderData(org.apache.rahas.RahasData data)
Populate CardSpace specific meta-data. |
Uses of IdentityProviderException in org.wso2.solutions.identity.persistence |
---|
Methods in org.wso2.solutions.identity.persistence that throw IdentityProviderException | |
---|---|
java.lang.Long |
IPPersistenceManager.create(AbstractDataObject abstractDO)
Create a new entry with the given data object. |
static IPPersistenceManager |
IPPersistenceManager.getPersistanceManager()
|
IssuedTokensDO[] |
IPPersistenceManager.getTokenDetailsForCardAndUser(java.lang.String cardId,
java.lang.String userId)
|
IssuedTokensDO[] |
IPPersistenceManager.getTokenDetailsForCardId(java.lang.String cardId)
|
void |
IPPersistenceManager.revokeInfoCard(InfoCardDO infoCard)
|
Constructors in org.wso2.solutions.identity.persistence that throw IdentityProviderException | |
---|---|
HibernateConfig(java.lang.String fileName)
|
Uses of IdentityProviderException in org.wso2.solutions.identity.persistence.dao |
---|
Methods in org.wso2.solutions.identity.persistence.dao that throw IdentityProviderException | |
---|---|
IssuedTokensDO[] |
IssuedTokenDAO.getTokenDetailsForCardAndUser(java.lang.String cardId,
java.lang.String userId)
|
Uses of IdentityProviderException in org.wso2.solutions.identity.sts |
---|
Methods in org.wso2.solutions.identity.sts that throw IdentityProviderException | |
---|---|
protected boolean |
IdentityTokenIssuer.checkIsValidTokenType(IdentityProviderData data)
|
protected org.apache.axiom.om.OMElement |
IdentityTokenIssuer.createDisplayToken(org.apache.axiom.om.OMElement rstrElem,
IdentityProviderData ipData)
Create the DisplayToken element according to CardSpace specifications. |
protected org.apache.axiom.om.OMElement |
OpenIDTokenIssuer.createOpenIdToken(org.apache.axiom.om.OMElement rstrElem)
Creates an OpenID token. |
protected org.apache.axiom.om.OMElement |
IdentityTokenIssuer.createRSTR(org.apache.rahas.RahasData data,
java.util.Date notBefore,
java.util.Date notAfter,
org.apache.axiom.soap.SOAPEnvelope env,
org.w3c.dom.Document doc,
org.w3c.dom.Node assertionElem,
java.lang.String assertionId,
org.apache.ws.security.message.WSSecEncryptedKey encryptedKey)
Create the wst:RequstedSecurityTokenRespoonse element. |
protected org.apache.axiom.om.OMElement |
OpenIDTokenIssuer.createRSTR(org.apache.rahas.RahasData data,
java.util.Date notBefore,
java.util.Date notAfter,
org.apache.axiom.soap.SOAPEnvelope env,
org.w3c.dom.Document doc,
org.w3c.dom.Node assertionElem,
java.lang.String assertionId,
org.apache.ws.security.message.WSSecEncryptedKey encryptedKey)
Overrides the base functionality to cater OpenID related functionality. |
protected org.w3c.dom.Element |
IdentityTokenIssuer.createSAMLAssertionAsDOM(IdentityProviderData ipData,
org.apache.rahas.RahasData rahasData,
org.joda.time.DateTime notBefore,
org.joda.time.DateTime notAfter,
java.lang.String assertionId)
|
protected org.w3c.dom.Element |
OpenIDTokenIssuer.createSAMLAssertionAsDOM(IdentityProviderData ipData,
org.apache.rahas.RahasData rahasData,
org.joda.time.DateTime notBefore,
org.joda.time.DateTime notAfter,
java.lang.String assertionId)
Override this method from the base class : we don't need SAML :) |
static java.lang.String |
IdentityProviderUtil.getAppliesToHostName(org.apache.rahas.RahasData data)
Obtain the applies to host name from the WS-Trust request. |
static java.security.cert.X509Certificate |
KeyUtil.getCertificate(java.lang.String keyStoreName,
java.lang.String alais)
|
static java.security.cert.X509Certificate |
KeyUtil.getCertificateToIncludeInMex(java.lang.String serviceName)
|
static java.security.Key |
KeyUtil.getPrivateKey(java.lang.String alias)
|
static java.security.cert.X509Certificate[] |
KeyUtil.getServiceCertificateChain(java.lang.String alias)
|
protected void |
IdentityProviderData.loadClaims()
|
protected void |
IdentityProviderData.populateClaimValues(org.apache.rahas.RahasData rahasData)
|
protected void |
IdentityProviderData.processUserIdentifier(org.apache.rahas.RahasData rahasData)
Obtain the user identifier depending on the authentication mechanism used. |
protected void |
IdentityProviderData.readAuthenticationMechanism(org.apache.rahas.RahasData data)
|
Constructors in org.wso2.solutions.identity.sts that throw IdentityProviderException | |
---|---|
IdentityProviderData(org.apache.rahas.RahasData data)
Populate CardSpace specific meta-data. |
Uses of IdentityProviderException in org.wso2.solutions.identity.sts.saml |
---|
Methods in org.wso2.solutions.identity.sts.saml that throw IdentityProviderException | |
---|---|
protected static org.opensaml.xml.XMLObject |
SAML2TokenBuilder.buildXMLObject(javax.xml.namespace.QName objectQName)
|
protected static org.opensaml.xml.XMLObject |
SAML1TokenBuilder.buildXMLObject(javax.xml.namespace.QName objectQName)
|
void |
SAML2TokenBuilder.createSAMLAssertion(org.joda.time.DateTime notAfter,
org.joda.time.DateTime notBefore,
java.lang.String assertionId)
|
void |
SAMLTokenBuilder.createSAMLAssertion(org.joda.time.DateTime notAfter,
org.joda.time.DateTime notBefore,
java.lang.String assertionId)
|
void |
SAML1TokenBuilder.createSAMLAssertion(org.joda.time.DateTime notAfter,
org.joda.time.DateTime notBefore,
java.lang.String assertionId)
|
org.w3c.dom.Element |
SAMLTokenDirector.createSAMLToken(org.joda.time.DateTime notBefore,
org.joda.time.DateTime notAfter,
java.lang.String assertionId)
|
void |
SAML2TokenBuilder.createStatement(IdentityProviderData ipData,
org.apache.rahas.RahasData rahasData)
|
void |
SAMLTokenBuilder.createStatement(IdentityProviderData ipData,
org.apache.rahas.RahasData rahasData)
|
void |
SAML1TokenBuilder.createStatement(IdentityProviderData ipData,
org.apache.rahas.RahasData rahasData)
|
static SignKeyDataHolder |
SignKeyDataHolder.getInstance()
|
static java.lang.String |
SAMLTokenDirector.getPPID(org.apache.rahas.RahasData rahasData,
java.lang.String name,
org.apache.axiom.om.OMElement appliesToEpr)
Obtain the ppid for the given user for the given rp. |
org.w3c.dom.Element |
SAML2TokenBuilder.getSAMLasDOM()
|
org.w3c.dom.Element |
SAMLTokenBuilder.getSAMLasDOM()
|
org.w3c.dom.Element |
SAML1TokenBuilder.getSAMLasDOM()
|
void |
SAML2TokenBuilder.marshellAndSign()
|
void |
SAMLTokenBuilder.marshellAndSign()
|
void |
SAML1TokenBuilder.marshellAndSign()
|
void |
SAML2TokenBuilder.setSignature(java.lang.String signatureAlgorithm,
org.opensaml.xml.security.x509.X509Credential cred)
|
void |
SAMLTokenBuilder.setSignature(java.lang.String signatureAlgorithm,
org.opensaml.xml.security.x509.X509Credential cred)
|
void |
SAML1TokenBuilder.setSignature(java.lang.String signatureAlgorithm,
org.opensaml.xml.security.x509.X509Credential cred)
|
Constructors in org.wso2.solutions.identity.sts.saml that throw IdentityProviderException | |
---|---|
SAMLTokenDirector(SAMLTokenBuilder builder,
org.apache.rahas.RahasData rData,
IdentityProviderData iData)
|
|
||||||||||
PREV NEXT | FRAMES NO FRAMES |