Modifier and Type | Class and Description |
---|---|
class |
SimpleSecurityContext |
Modifier and Type | Class and Description |
---|---|
class |
DefaultSecurityContext
SecurityContext which implements isUserInRole using the
following approach : skip the first Subject principal, and then checks
Groups the principal is a member of
|
class |
RolePrefixSecurityContextImpl |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
AbstractSecurityContextInInterceptor.createSecurityContext(Principal p,
Subject subject) |
protected SecurityContext |
JAASLoginInterceptor.createSecurityContext(String name,
Subject subject) |
Modifier and Type | Method and Description |
---|---|
protected boolean |
AbstractAuthorizingInInterceptor.authorize(SecurityContext sc,
Method method) |
protected boolean |
OperationInfoAuthorizingInterceptor.authorize(SecurityContext sc,
String key) |
protected boolean |
SimpleAuthorizingInterceptor.isUserInRole(SecurityContext sc,
List<String> roles,
boolean deny) |
protected boolean |
AbstractAuthorizingInInterceptor.isUserInRole(SecurityContext sc,
List<String> roles,
boolean deny) |
Modifier and Type | Class and Description |
---|---|
static class |
KerberosAuthenticationFilter.KerberosSecurityContext |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
KerberosAuthenticationFilter.createSecurityContext(String simpleUserName,
String complexUserName,
GSSContext gssContext) |
Modifier and Type | Class and Description |
---|---|
class |
JwtTokenSecurityContext |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
JwsContainerRequestFilter.configureSecurityContext(JwsSignatureVerifier sigVerifier) |
protected SecurityContext |
AbstractJwtAuthenticationFilter.configureSecurityContext(JwtToken jwt) |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
OAuthRequestFilter.createSecurityContext(javax.servlet.http.HttpServletRequest request,
AccessTokenValidation accessTokenV) |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
JwtBearerAuthHandler.configureSecurityContext(JwtToken token) |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
RedirectionBasedGrantService.getAndValidateSecurityContext(javax.ws.rs.core.MultivaluedMap<String,String> params) |
protected SecurityContext |
DirectAuthorizationService.getAndValidateSecurityContext(javax.ws.rs.core.MultivaluedMap<String,String> params) |
Modifier and Type | Method and Description |
---|---|
protected UserSubject |
RedirectionBasedGrantService.createUserSubject(SecurityContext securityContext,
javax.ws.rs.core.MultivaluedMap<String,String> params) |
protected UserSubject |
DirectAuthorizationService.createUserSubject(SecurityContext securityContext,
javax.ws.rs.core.MultivaluedMap<String,String> params) |
Modifier and Type | Method and Description |
---|---|
static UserSubject |
OAuthUtils.createSubject(MessageContext mc,
SecurityContext sc) |
static UserSubject |
OAuthUtils.createSubject(SecurityContext securityContext) |
Modifier and Type | Class and Description |
---|---|
class |
OidcSecurityContext |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
SecurityContextProviderImpl.doGetSecurityContext(Message message,
Subject subject,
ClaimCollection claims) |
SecurityContext |
SecurityContextProvider.getSecurityContext(Message message,
org.apache.wss4j.common.saml.SamlAssertionWrapper wrapper) |
SecurityContext |
SecurityContextProviderImpl.getSecurityContext(Message message,
org.apache.wss4j.common.saml.SamlAssertionWrapper wrapper) |
Modifier and Type | Method and Description |
---|---|
LogoutResponse |
LogoutService.logout(javax.ws.rs.core.Cookie context,
SecurityContext sc) |
LogoutResponse |
LogoutService.postLogout(javax.ws.rs.core.Cookie context,
SecurityContext sc) |
Modifier and Type | Interface and Description |
---|---|
interface |
ClaimsSecurityContext |
Modifier and Type | Class and Description |
---|---|
class |
SAMLSecurityContext |
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
WSS4JBasicAuthValidator.createSecurityContext(Message msg,
org.apache.wss4j.dom.validate.Credential credential) |
protected SecurityContext |
WSS4JBasicAuthValidator.createSecurityContext(Principal p) |
Modifier and Type | Interface and Description |
---|---|
interface |
LoginSecurityContext
LoginSecurityContext provides additional information about the
authenticated principal.
|
Constructor and Description |
---|
PrincipalAuthorizationPolicy(SecurityContext sc) |
Modifier and Type | Method and Description |
---|---|
static SecurityContext |
SecurityContextFactory.buildSecurityContext(javax.jms.Message message,
JMSConfiguration config)
Extract the property JMSXUserID or JMS_TIBCO_SENDER from the jms message and
create a SecurityContext from it.
|
Modifier and Type | Method and Description |
---|---|
SecurityContext |
SecurityToken.getSecurityContext()
Get the SecurityContext associated with this SecurityToken
|
Modifier and Type | Method and Description |
---|---|
void |
SecurityToken.setSecurityContext(SecurityContext securityContext)
Set the SecurityContext associated with this SecurityToken
|
Modifier and Type | Method and Description |
---|---|
protected SecurityContext |
DefaultWSS4JSecurityContextCreator.createSecurityContext(Principal p) |
protected SecurityContext |
UsernameTokenInterceptor.createSecurityContext(Principal p,
Subject subject) |
protected SecurityContext |
DefaultWSS4JSecurityContextCreator.createSecurityContext(SoapMessage msg,
boolean useJAASSubject,
org.apache.wss4j.dom.engine.WSSecurityEngineResult wsResult) |
protected SecurityContext |
AbstractUsernameTokenAuthenticatingInterceptor.doCreateSecurityContext(Principal p,
Subject subject)
Creates default SecurityContext which implements isUserInRole using the
following approach : skip the first Subject principal, and then check optional
Groups the principal is a member of.
|
Apache CXF