パッケージ | 説明 |
---|---|
edu.internet2.middleware.shibboleth.idp.profile.saml2 |
修飾子とタイプ | クラスと説明 |
---|---|
class |
ArtifactResolution.ArtifactResolutionRequestContext
Represents the internal state of a SAML 2.0 Artifact resolver request while it's being processed by the IdP.
|
protected class |
AttributeQueryProfileHandler.AttributeQueryContext
Basic data structure used to accumulate information as a request is being processed.
|
protected class |
SAML2ECPProfileHandler.ECPRequestContext
In case we ever add something to the base context
|
class |
SLOProfileHandler.SLORequestContext
Represents the internal state of a Logout Request while it's being processed by the IdP.
|
protected class |
SSOProfileHandler.SSORequestContext
Represents the internal state of a SAML 2.0 SSO Request while it's being processed by the IdP.
|
修飾子とタイプ | メソッドと説明 |
---|---|
protected Assertion |
AbstractSAML2ProfileHandler.buildAssertion(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
org.joda.time.DateTime issueInstant)
Builds a basic assertion with its id, issue instant, SAML version, issuer, subject, and conditions populated.
|
protected AttributeStatement |
AbstractSAML2ProfileHandler.buildAttributeStatement(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Executes a query for attributes and builds a SAML attribute statement from the results.
|
protected Conditions |
AbstractSAML2ProfileHandler.buildConditions(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
org.joda.time.DateTime issueInstant)
Builds a SAML assertion condition set.
|
protected Issuer |
AbstractSAML2ProfileHandler.buildEntityIssuer(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Creates an
Issuer populated with information about the relying party. |
protected Response |
AbstractSAML2ProfileHandler.buildErrorResponse(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Constructs an SAML response message carrying a request error.
|
protected NameID |
AttributeQueryProfileHandler.buildNameId(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Builds a NameID appropriate for this request.
|
protected NameID |
AbstractSAML2ProfileHandler.buildNameId(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Builds a NameID appropriate for this request.
|
protected NameID |
SSOProfileHandler.buildNameId(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Builds a NameID appropriate for this request.
|
protected Response |
AbstractSAML2ProfileHandler.buildResponse(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
String subjectConfirmationMethod,
List<Statement> statements)
Builds a response to the attribute query within the request context.
|
protected Subject |
AbstractSAML2ProfileHandler.buildSubject(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
String confirmationMethod,
org.joda.time.DateTime issueInstant)
Builds the SAML subject for the user for the service provider.
|
protected SubjectConfirmation |
AbstractSAML2ProfileHandler.buildSubjectConfirmation(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
String confirmationMethod,
org.joda.time.DateTime issueInstant)
Builds the SubjectConfirmation appropriate for this request.
|
protected void |
AbstractSAML2ProfileHandler.checkSamlVersion(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Checks that the SAML major version for a request is 2.
|
protected boolean |
AbstractSAML2ProfileHandler.isEncryptAssertion(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Determine whether issued assertions should be encrypted.
|
protected boolean |
AbstractSAML2ProfileHandler.isEncryptNameID(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Determine whether NameID's should be encrypted.
|
protected boolean |
AbstractSAML2ProfileHandler.isRequestRequiresEncryptNameID(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Determine whether information in the SAML request requires the issued NameID to be encrypted.
|
protected boolean |
AbstractSAML2ProfileHandler.isSignAssertion(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Determine whether issued assertions should be signed.
|
protected void |
AbstractSAML2ProfileHandler.populateStatusResponse(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
StatusResponseType response)
Populates the response's id, in response to, issue instant, version, and issuer properties.
|
protected void |
AbstractSAML2ProfileHandler.postProcessAssertion(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
Assertion assertion)
Extension point for for subclasses to post-process the Assertion before it is signed and encrypted.
|
protected void |
SSOProfileHandler.postProcessAssertion(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
Assertion assertion)
Extension point for for subclasses to post-process the Assertion before it is signed and encrypted.
|
protected void |
AbstractSAML2ProfileHandler.postProcessResponse(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
Response samlResponse)
Extension point for for subclasses to post-process the Response before it is signed and encoded.
|
protected void |
SSOProfileHandler.postProcessResponse(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
Response samlResponse)
Extension point for for subclasses to post-process the Response before it is signed and encoded.
|
protected void |
AbstractSAML2ProfileHandler.resolveAttributes(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Resolves the attributes for the principal.
|
protected void |
AbstractSAML2ProfileHandler.resolvePrincipal(BaseSAML2ProfileRequestContext<?,?,?> requestContext)
Resolves the principal name of the subject of the request.
|
protected void |
AbstractSAML2ProfileHandler.signAssertion(BaseSAML2ProfileRequestContext<?,?,?> requestContext,
Assertion assertion)
Signs the given assertion if either the current profile configuration or the relying party configuration contains
signing credentials.
|
Copyright © 2012. All Rights Reserved.