Uses of Class
org.wso2.solutions.identity.IdentityProviderException

Packages that use IdentityProviderException
org.wso2.solutions.identity   
org.wso2.solutions.identity.admin   
org.wso2.solutions.identity.cards   
org.wso2.solutions.identity.openid   
org.wso2.solutions.identity.openid.extensions   
org.wso2.solutions.identity.openid.infocard   
org.wso2.solutions.identity.persistence   
org.wso2.solutions.identity.persistence.dao   
org.wso2.solutions.identity.sts   
org.wso2.solutions.identity.sts.saml   
 

Uses of IdentityProviderException in org.wso2.solutions.identity
 

Methods in org.wso2.solutions.identity that throw IdentityProviderException
 void UserStore.changeRalm(java.lang.String realmConfigName)
          Update the realm used to the given instance
 java.util.List<java.lang.String> UserStore.getAllUserNames()
          Access the names of all users in the store.
 java.util.Map<java.lang.String,java.lang.String> UserStore.getClaimValues(java.lang.String username, java.util.List<java.lang.String> propertyNames)
          Return the list of claim values of the given user.
 java.util.Map<java.lang.String,java.lang.String> UserStore.getClaimValues(java.lang.String username, java.lang.String profileName, java.util.List<java.lang.String> propertyNames)
           
static UserStore UserStore.getInstance()
           
 java.util.List<java.lang.String> UserStore.getPropertyNames()
          Access the name of user properties in the store.
 void InitialClaimsProcessor.process(org.apache.axiom.om.OMElement initialClaims)
           
 void InitialClaimsProcessor.process(java.lang.String filePath)
           
 

Uses of IdentityProviderException in org.wso2.solutions.identity.admin
 

Methods in org.wso2.solutions.identity.admin that throw IdentityProviderException
static void STSConfigAdmin.configuraServices(boolean initial)
           
 void ClaimsAdmin.createClaim(java.lang.String dialectUri, java.lang.String uri, java.lang.String displayTag, java.lang.String description)
           
 void ClaimsAdmin.createClaim(java.lang.String dialectUri, java.lang.String uri, java.lang.String displayTag, java.lang.String description, java.lang.String openIDTag)
           
 void ClaimsAdmin.createDialect(java.lang.String dialectUri, java.lang.String dialectInfo)
           
 void RealmConfigAdmin.createNewRealmConfiguration(java.lang.String realmClassName, java.lang.String configName, java.util.Map properties)
           
 void ParameterAdmin.createOrUpdatearameter(java.lang.String name, java.lang.String value)
           
 void EmailActivatorAdmin.createParamsAndInstanciateEmailVerifier(java.lang.String port, java.lang.String host, java.lang.String fromAddress, java.lang.String username, java.lang.String password)
           
 void RealmConfigAdmin.deleteRealmConfiguration(RealmConfigurationDO config)
           
 void RelyingPartyAdmin.deleteRelyingParty(RelyingPartyDO rp)
           
 void KeystoreUtilAdmin.deleteRelyingParty(java.lang.String alias)
          Removes the Certificate from default store
 java.lang.String RegisteredInfoCardInfoAdmin.extractPrimaryUserName(java.lang.String ppid)
          This method extracts the primary username if there is one.
 java.util.List RegisteredInfoCardInfoAdmin.getAllRegisteredInfoCards(java.lang.String userId)
           
 java.util.List ReportAdmin.getCardDetailsForUser(java.lang.String userId)
           
 java.util.List ReportAdmin.getCardIdsGroupedByUser()
           
 java.security.cert.X509Certificate KeystoreUtilAdmin.getCertificateFromUserTrustedRP(java.lang.String alias)
           
 java.util.List ReportAdmin.getFailedCardIssueActions(java.util.Date fromDate, java.util.Date toDate)
           
 java.util.List ReportAdmin.getFailedTokenIssueActions(java.util.Date fromDate, java.util.Date toDate)
           
 RegisteredInfoCardInfoDO RegisteredInfoCardInfoAdmin.getInfo(java.lang.String ppid)
           
 java.util.List<OpenIDSummaryReportData> ReportAdmin.getOpenIDsGroupedByUser()
           
 RealmConfigurationDO RealmConfigAdmin.getRealmConfiguration(java.lang.String name)
           
 java.util.List ReportAdmin.getTokenDetailsForCardAndUser(java.lang.String cardId, java.lang.String userId)
           
 java.util.List ReportAdmin.getTokenDetailsForCardId(java.lang.String cardId)
           
 java.util.List ReportAdmin.getTokenDetailsForUser(java.lang.String userId)
           
 java.util.List ReportAdmin.getTokensGroupedByCardAndUser()
           
 java.util.List ReportAdmin.getTokensGroupedByCardId()
           
 java.util.List ReportAdmin.getTokensGroupedByUser()
           
 java.util.List ReportAdmin.getUserActionsByUser(java.lang.String username, java.util.Date fromDate, java.util.Date toDate)
           
 java.lang.String KeystoreUtilAdmin.importCert(java.security.cert.X509Certificate cert)
           
 java.lang.String KeystoreUtilAdmin.importCertToUserPersonalCertStore(java.security.cert.X509Certificate cert)
          Imports the Certificate to user personal cert store.
 java.lang.String KeystoreUtilAdmin.importCertToUserTrustStore(java.security.cert.X509Certificate cert)
          This method imports the Certificate to Trust store if it present already.
 boolean KeystoreUtilAdmin.isCertExists(java.security.cert.X509Certificate cert)
           
 boolean RegisteredInfoCardInfoAdmin.isRegistedInformationCard(java.lang.String ppid)
          Check whether there is a registered information card with the given ppid.
static void ReportAdmin.record(java.lang.String username, java.lang.String actionId, java.lang.String details)
           
 void RegisteredInfoCardInfoAdmin.registerNewInfoCardInformation(java.lang.String ppid, java.lang.String userId, java.lang.String issuerInfo)
           
 void KeystoreUtilAdmin.removeCertEntryFromUserTrustedRP(java.lang.String alias)
          Removes the Certificate from User trusted RP store
 void ParameterAdmin.removeParam(java.lang.String name)
           
 void RelyingPartyAdmin.removePersonalRelyingParty(java.lang.String user, java.lang.String hostName)
          Remove a personal relying party
 void RegisteredInfoCardInfoAdmin.removeRegisteredInfoCard(java.lang.String ppid)
           
 void InfoCardTokenAdmin.revokeInformationCard(java.lang.String cardId)
           
 boolean RealmConfigAdmin.setDefaultRealmConfiguration(java.lang.String configName)
           
 void RealmConfigAdmin.updateRealmConfigurationProperties(java.util.Set properties)
           
 

Constructors in org.wso2.solutions.identity.admin that throw IdentityProviderException
ClaimsAdmin()
           
InfoCardTokenAdmin()
           
ParameterAdmin()
           
PPIDValueAdmin()
           
RelyingPartyAdmin()
           
 

Uses of IdentityProviderException in org.wso2.solutions.identity.cards
 

Methods in org.wso2.solutions.identity.cards that throw IdentityProviderException
static CardIssuerConfig CardIssuerConfig.getInstance()
           
 org.w3c.dom.Element CardIssuer.issueCardForSelfIssuedCard(java.lang.String ppid, boolean requireAppliesTo)
           
 org.w3c.dom.Element CardIssuer.issueCardForUsername(java.lang.String username, boolean requireAppliesTo)
           
 org.w3c.dom.Element CardIssuer.issueCardForX509V3Certificate(java.lang.String userName, java.lang.String cert, boolean requireAppliesTo)
           
static CardIssuerConfig CardIssuerConfig.updateConfig()
           
 

Constructors in org.wso2.solutions.identity.cards that throw IdentityProviderException
CardIssuer()
           
 

Uses of IdentityProviderException in org.wso2.solutions.identity.openid
 

Methods in org.wso2.solutions.identity.openid that throw IdentityProviderException
static java.lang.String OpenIDUtil.generateOpenID(java.lang.String user)
          Generate OpenID for a given user.
static java.lang.String OpenIDUtil.getOpenID(java.lang.String userName)
          Find the OpenID corresponding to the given user name.
static java.lang.String OpenIDUtil.getRelyingPartyUrl(java.lang.String rpUrl)
          Normalize the provided relying party URL
static java.lang.String[] OpenIDUtil.getRequestedAuthenticationPolicies(org.openid4java.message.ParameterList params)
          Extracts authentication policies from the PAPE request
static java.lang.String OpenIDUtil.getUserName(java.lang.String openId)
          Find the user name corresponding to the given OpenID.
 java.lang.String OpenIDProvider.processRequest(javax.servlet.http.HttpServletRequest httpReq, javax.servlet.http.HttpServletResponse httpResp)
          Process the Relying Party request at the OpenID Provider end.
 

Uses of IdentityProviderException in org.wso2.solutions.identity.openid.extensions
 

Methods in org.wso2.solutions.identity.openid.extensions that throw IdentityProviderException
 void OpenIDAttributeExchange.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
           
 void OpenIDPape.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
           
 void OpenIDSimpleReg.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
           
abstract  void OpenIDExtension.addRequiredAttributes(java.util.List<java.lang.String> requiredAttributes)
           
static java.lang.String[] OpenIDPape.getAuthenticationPolicies(org.openid4java.message.AuthRequest authRequest)
           
protected  java.lang.String OpenIDAttributeExchange.getMappedAxSchema(java.lang.String val)
          This provides a mapping between http://schema.openid.net/ and http://axschema.org
 org.openid4java.message.MessageExtension OpenIDAttributeExchange.getMessageExtension(java.lang.String userId, java.lang.String profileName)
          Creates an instance of MessageExtension for the OpenID authentication response
 org.openid4java.message.MessageExtension OpenIDPape.getMessageExtension(java.lang.String userId, java.lang.String profileName)
          Creates an instance of MessageExtension for the OpenID authentication response
 org.openid4java.message.MessageExtension OpenIDSimpleReg.getMessageExtension(java.lang.String userId, java.lang.String profileName)
          Creates an instance of MessageExtension for the OpenID authentication response
abstract  org.openid4java.message.MessageExtension OpenIDExtension.getMessageExtension(java.lang.String userId, java.lang.String profileName)
          Creates an instance of MessageExtension for the OpenID authentication response
protected  java.util.Map<java.lang.String,OpenIDClaim> OpenIDExtension.populateAttributeValues(java.util.Collection<java.lang.String> requiredClaims, java.lang.String userId, java.util.Map<java.lang.String,ClaimDO> claims, java.util.Map<java.lang.String,java.lang.String> openIDTagMapping, java.lang.String profileName)
          Populate the required claims with claim values.
protected  java.util.Map<java.lang.String,OpenIDClaim> OpenIDSimpleReg.populateAttributeValues(java.util.List<java.lang.String> requiredClaims, java.lang.String userId, java.lang.String profileName)
          Populate the required claims with claim values.
protected  java.util.Map<java.lang.String,OpenIDClaim> OpenIDAttributeExchange.populateAttributeValues(java.util.Map<java.lang.String,java.lang.String> requiredClaims, java.lang.String userId, java.lang.String profileName)
          Populate the required claims with claim values.
 

Uses of IdentityProviderException in org.wso2.solutions.identity.openid.infocard
 

Methods in org.wso2.solutions.identity.openid.infocard that throw IdentityProviderException
 org.openid4java.message.ParameterList OpenIDInfoCardHeader.buildHeader(java.lang.String openID, java.lang.String opAddress, java.lang.String appliesTo)
          Build the OpenIDToken header with the provided parameters.
protected  void OpenIDInfoCardProviderData.populateClaimValues(org.apache.rahas.RahasData rahasData)
          This overrides the base class functionality to suit the OpenID related functionality.
 

Constructors in org.wso2.solutions.identity.openid.infocard that throw IdentityProviderException
OpenIDInfoCardProviderData(org.apache.rahas.RahasData data)
          Populate CardSpace specific meta-data.
 

Uses of IdentityProviderException in org.wso2.solutions.identity.persistence
 

Methods in org.wso2.solutions.identity.persistence that throw IdentityProviderException
 java.lang.Long IPPersistenceManager.create(AbstractDataObject abstractDO)
          Create a new entry with the given data object.
static IPPersistenceManager IPPersistenceManager.getPersistanceManager()
           
 IssuedTokensDO[] IPPersistenceManager.getTokenDetailsForCardAndUser(java.lang.String cardId, java.lang.String userId)
           
 IssuedTokensDO[] IPPersistenceManager.getTokenDetailsForCardId(java.lang.String cardId)
           
 void IPPersistenceManager.revokeInfoCard(InfoCardDO infoCard)
           
 

Constructors in org.wso2.solutions.identity.persistence that throw IdentityProviderException
HibernateConfig(java.lang.String fileName)
           
 

Uses of IdentityProviderException in org.wso2.solutions.identity.persistence.dao
 

Methods in org.wso2.solutions.identity.persistence.dao that throw IdentityProviderException
 IssuedTokensDO[] IssuedTokenDAO.getTokenDetailsForCardAndUser(java.lang.String cardId, java.lang.String userId)
           
 

Uses of IdentityProviderException in org.wso2.solutions.identity.sts
 

Methods in org.wso2.solutions.identity.sts that throw IdentityProviderException
protected  boolean IdentityTokenIssuer.checkIsValidTokenType(IdentityProviderData data)
           
protected  org.apache.axiom.om.OMElement IdentityTokenIssuer.createDisplayToken(org.apache.axiom.om.OMElement rstrElem, IdentityProviderData ipData)
          Create the DisplayToken element according to CardSpace specifications.
protected  org.apache.axiom.om.OMElement OpenIDTokenIssuer.createOpenIdToken(org.apache.axiom.om.OMElement rstrElem)
          Creates an OpenID token.
protected  org.apache.axiom.om.OMElement IdentityTokenIssuer.createRSTR(org.apache.rahas.RahasData data, java.util.Date notBefore, java.util.Date notAfter, org.apache.axiom.soap.SOAPEnvelope env, org.w3c.dom.Document doc, org.w3c.dom.Node assertionElem, java.lang.String assertionId, org.apache.ws.security.message.WSSecEncryptedKey encryptedKey)
          Create the wst:RequstedSecurityTokenRespoonse element.
protected  org.apache.axiom.om.OMElement OpenIDTokenIssuer.createRSTR(org.apache.rahas.RahasData data, java.util.Date notBefore, java.util.Date notAfter, org.apache.axiom.soap.SOAPEnvelope env, org.w3c.dom.Document doc, org.w3c.dom.Node assertionElem, java.lang.String assertionId, org.apache.ws.security.message.WSSecEncryptedKey encryptedKey)
          Overrides the base functionality to cater OpenID related functionality.
protected  org.w3c.dom.Element IdentityTokenIssuer.createSAMLAssertionAsDOM(IdentityProviderData ipData, org.apache.rahas.RahasData rahasData, org.joda.time.DateTime notBefore, org.joda.time.DateTime notAfter, java.lang.String assertionId)
           
protected  org.w3c.dom.Element OpenIDTokenIssuer.createSAMLAssertionAsDOM(IdentityProviderData ipData, org.apache.rahas.RahasData rahasData, org.joda.time.DateTime notBefore, org.joda.time.DateTime notAfter, java.lang.String assertionId)
          Override this method from the base class : we don't need SAML :)
static java.lang.String IdentityProviderUtil.getAppliesToHostName(org.apache.rahas.RahasData data)
          Obtain the applies to host name from the WS-Trust request.
static java.security.cert.X509Certificate KeyUtil.getCertificate(java.lang.String keyStoreName, java.lang.String alais)
           
static java.security.cert.X509Certificate KeyUtil.getCertificateToIncludeInMex(java.lang.String serviceName)
           
static java.security.Key KeyUtil.getPrivateKey(java.lang.String alias)
           
static java.security.cert.X509Certificate[] KeyUtil.getServiceCertificateChain(java.lang.String alias)
           
protected  void IdentityProviderData.loadClaims()
           
protected  void IdentityProviderData.populateClaimValues(org.apache.rahas.RahasData rahasData)
           
protected  void IdentityProviderData.processUserIdentifier(org.apache.rahas.RahasData rahasData)
          Obtain the user identifier depending on the authentication mechanism used.
protected  void IdentityProviderData.readAuthenticationMechanism(org.apache.rahas.RahasData data)
           
 

Constructors in org.wso2.solutions.identity.sts that throw IdentityProviderException
IdentityProviderData(org.apache.rahas.RahasData data)
          Populate CardSpace specific meta-data.
 

Uses of IdentityProviderException in org.wso2.solutions.identity.sts.saml
 

Methods in org.wso2.solutions.identity.sts.saml that throw IdentityProviderException
protected static org.opensaml.xml.XMLObject SAML2TokenBuilder.buildXMLObject(javax.xml.namespace.QName objectQName)
           
protected static org.opensaml.xml.XMLObject SAML1TokenBuilder.buildXMLObject(javax.xml.namespace.QName objectQName)
           
 void SAML2TokenBuilder.createSAMLAssertion(org.joda.time.DateTime notAfter, org.joda.time.DateTime notBefore, java.lang.String assertionId)
           
 void SAMLTokenBuilder.createSAMLAssertion(org.joda.time.DateTime notAfter, org.joda.time.DateTime notBefore, java.lang.String assertionId)
           
 void SAML1TokenBuilder.createSAMLAssertion(org.joda.time.DateTime notAfter, org.joda.time.DateTime notBefore, java.lang.String assertionId)
           
 org.w3c.dom.Element SAMLTokenDirector.createSAMLToken(org.joda.time.DateTime notBefore, org.joda.time.DateTime notAfter, java.lang.String assertionId)
           
 void SAML2TokenBuilder.createStatement(IdentityProviderData ipData, org.apache.rahas.RahasData rahasData)
           
 void SAMLTokenBuilder.createStatement(IdentityProviderData ipData, org.apache.rahas.RahasData rahasData)
           
 void SAML1TokenBuilder.createStatement(IdentityProviderData ipData, org.apache.rahas.RahasData rahasData)
           
static SignKeyDataHolder SignKeyDataHolder.getInstance()
           
static java.lang.String SAMLTokenDirector.getPPID(org.apache.rahas.RahasData rahasData, java.lang.String name, org.apache.axiom.om.OMElement appliesToEpr)
          Obtain the ppid for the given user for the given rp.
 org.w3c.dom.Element SAML2TokenBuilder.getSAMLasDOM()
           
 org.w3c.dom.Element SAMLTokenBuilder.getSAMLasDOM()
           
 org.w3c.dom.Element SAML1TokenBuilder.getSAMLasDOM()
           
 void SAML2TokenBuilder.marshellAndSign()
           
 void SAMLTokenBuilder.marshellAndSign()
           
 void SAML1TokenBuilder.marshellAndSign()
           
 void SAML2TokenBuilder.setSignature(java.lang.String signatureAlgorithm, org.opensaml.xml.security.x509.X509Credential cred)
           
 void SAMLTokenBuilder.setSignature(java.lang.String signatureAlgorithm, org.opensaml.xml.security.x509.X509Credential cred)
           
 void SAML1TokenBuilder.setSignature(java.lang.String signatureAlgorithm, org.opensaml.xml.security.x509.X509Credential cred)
           
 

Constructors in org.wso2.solutions.identity.sts.saml that throw IdentityProviderException
SAMLTokenDirector(SAMLTokenBuilder builder, org.apache.rahas.RahasData rData, IdentityProviderData iData)