use of org.wso2.carbon.identity.application.common.model.RequestPathAuthenticatorConfig in project identity-api-server by wso2.
the class ServerAuthenticatorManagementService method getAuthenticators.
/**
* Retrieves the list of available authenticators.
*
* @param filter The filter string.
* @param limit The items per page. **Not supported at the moment.**
* @param offset The offset to be used with the limit parameter. **Not supported at the moment.**
* @return The list of authenticators
*/
public List<Authenticator> getAuthenticators(String filter, Integer limit, Integer offset) {
handleNotImplementedCapabilities(limit, offset);
try {
String filterAuthenticatorName = null;
String filterOperationForName = null;
ArrayList<String> filterTagsList = null;
int maximumItemPerPage = IdentityUtil.getMaximumItemPerPage();
if (StringUtils.isNotBlank(filter)) {
List<ExpressionNode> expressionNodes = getExpressionNodesForAuthenticator(filter);
if (CollectionUtils.isNotEmpty(expressionNodes)) {
NameFilter nameFilter = getFilterAuthenticatorNameAndOperation(expressionNodes);
if (nameFilter != null) {
filterAuthenticatorName = nameFilter.getName();
filterOperationForName = nameFilter.getOperation();
}
filterTagsList = getFilterTagsList(expressionNodes);
}
}
LocalAuthenticatorConfig[] localAuthenticatorConfigs = AuthenticatorsServiceHolder.getInstance().getApplicationManagementService().getAllLocalAuthenticators(ContextLoader.getTenantDomainFromContext());
int localAuthenticatorsCount = localAuthenticatorConfigs.length;
RequestPathAuthenticatorConfig[] requestPathAuthenticatorConfigs = new RequestPathAuthenticatorConfig[0];
/* If there is no filter string available in the request, the request path authenticators are required to
be fetched only if the no. of local authenticators retrieved are less than the maximum items per page
count as the no. of items returned in the response will be capped at the maximum items per page count. */
if (StringUtils.isNotBlank(filter) || (StringUtils.isBlank(filter) && localAuthenticatorsCount < maximumItemPerPage)) {
requestPathAuthenticatorConfigs = AuthenticatorsServiceHolder.getInstance().getApplicationManagementService().getAllRequestPathAuthenticators(ContextLoader.getTenantDomainFromContext());
}
List<String> requestedAttributeList = new ArrayList<>();
requestedAttributeList.add(Constants.FEDERATED_AUTHENTICATORS);
int idPCountToBeRetrieved = maximumItemPerPage - (localAuthenticatorsCount + requestPathAuthenticatorConfigs.length);
List<IdentityProvider> identityProviders = null;
/* If there is no filter string available in the request, the identity providers are required to
be fetched only if the total of local authenticators and request path authenticators retrieved above is
less than the maximum items per page count as the no. of items returned in the response will be capped
at the maximum items per page count. */
if (idPCountToBeRetrieved > 0 && StringUtils.isBlank(filter)) {
IdpSearchResult idpSearchResult = AuthenticatorsServiceHolder.getInstance().getIdentityProviderManager().getIdPs(idPCountToBeRetrieved, null, null, null, null, ContextLoader.getTenantDomainFromContext(), requestedAttributeList);
identityProviders = idpSearchResult.getIdPs();
}
return buildAuthenticatorsListResponse(filter, requestedAttributeList, filterAuthenticatorName, filterOperationForName, filterTagsList, localAuthenticatorConfigs, requestPathAuthenticatorConfigs, identityProviders);
} catch (IdentityApplicationManagementException e) {
throw handleApplicationMgtException(e, Constants.ErrorMessage.ERROR_CODE_ERROR_LISTING_AUTHENTICATORS, null);
} catch (IdentityProviderManagementException e) {
throw handleIdPException(e, Constants.ErrorMessage.ERROR_CODE_ERROR_LISTING_IDPS, null);
}
}
use of org.wso2.carbon.identity.application.common.model.RequestPathAuthenticatorConfig in project carbon-identity-framework by wso2.
the class ApplicationDAOImpl method getApplication.
@Override
public ServiceProvider getApplication(int applicationId) throws IdentityApplicationManagementException {
Connection connection = IdentityDatabaseUtil.getDBConnection(false);
try {
// Load basic application data
ServiceProvider serviceProvider = getBasicApplicationData(applicationId, connection);
if (serviceProvider == null) {
return null;
}
int tenantID = IdentityTenantUtil.getTenantId(serviceProvider.getOwner().getTenantDomain());
List<ServiceProviderProperty> propertyList = getServicePropertiesBySpId(connection, applicationId);
serviceProvider.setJwksUri(getJwksUri(propertyList));
serviceProvider.setTemplateId(getTemplateId(propertyList));
serviceProvider.setInboundAuthenticationConfig(getInboundAuthenticationConfig(applicationId, connection, tenantID));
serviceProvider.setLocalAndOutBoundAuthenticationConfig(getLocalAndOutboundAuthenticationConfig(applicationId, connection, tenantID, propertyList));
serviceProvider.setInboundProvisioningConfig(getInboundProvisioningConfiguration(applicationId, connection, tenantID));
serviceProvider.setOutboundProvisioningConfig(getOutboundProvisioningConfiguration(applicationId, connection, tenantID));
// Load Claim Mapping
serviceProvider.setClaimConfig(getClaimConfiguration(applicationId, connection, tenantID));
// Load Role Mappings
List<RoleMapping> roleMappings = getRoleMappingOfApplication(applicationId, connection, tenantID);
PermissionsAndRoleConfig permissionAndRoleConfig = new PermissionsAndRoleConfig();
permissionAndRoleConfig.setRoleMappings(roleMappings.toArray(new RoleMapping[0]));
serviceProvider.setPermissionAndRoleConfig(permissionAndRoleConfig);
RequestPathAuthenticatorConfig[] requestPathAuthenticators = getRequestPathAuthenticators(applicationId, connection, tenantID);
serviceProvider.setRequestPathAuthenticatorConfigs(requestPathAuthenticators);
serviceProvider.setSpProperties(propertyList.toArray(new ServiceProviderProperty[0]));
serviceProvider.setCertificateContent(getCertificateContent(propertyList, connection));
// Will be supported with 'Advance Consent Management Feature'.
/*
ConsentConfig consentConfig = serviceProvider.getConsentConfig();
if (isNull(consentConfig)) {
consentConfig = new ConsentConfig();
}
consentConfig.setConsentPurposeConfigs(getConsentPurposeConfigs(connection, applicationId, tenantID));
serviceProvider.setConsentConfig(consentConfig);
*/
String serviceProviderName = serviceProvider.getApplicationName();
loadApplicationPermissions(serviceProviderName, serviceProvider);
return serviceProvider;
} catch (SQLException | CertificateRetrievingException e) {
throw new IdentityApplicationManagementException("Failed to get service provider with id: " + applicationId, e);
} finally {
IdentityApplicationManagementUtil.closeConnection(connection);
}
}
use of org.wso2.carbon.identity.application.common.model.RequestPathAuthenticatorConfig in project carbon-identity-framework by wso2.
the class ApplicationBean method update.
/**
* @param request
*/
public void update(HttpServletRequest request) {
// update basic info.
serviceProvider.setApplicationName(request.getParameter("spName"));
serviceProvider.setDescription(request.getParameter("sp-description"));
serviceProvider.setCertificateContent(request.getParameter("sp-certificate"));
String jwks = request.getParameter("jwksUri");
serviceProvider.setJwksUri(jwks);
if (Boolean.parseBoolean(request.getParameter("deletePublicCert"))) {
serviceProvider.setCertificateContent("");
}
String isSasApp = request.getParameter("isSaasApp");
serviceProvider.setSaasApp((isSasApp != null && "on".equals(isSasApp)) ? true : false);
String isDiscoverableApp = request.getParameter("isDiscoverableApp");
serviceProvider.setDiscoverable("on".equals(isDiscoverableApp));
String accessUrl = request.getParameter("accessURL");
serviceProvider.setAccessUrl(accessUrl);
String imageUrl = request.getParameter("imageURL");
serviceProvider.setImageUrl(imageUrl);
String logoutReturnUrl = request.getParameter(LOGOUT_RETURN_URL);
if (StringUtils.isNotBlank(logoutReturnUrl)) {
boolean logoutReturnUrlDefined = false;
if (serviceProvider.getSpProperties() != null) {
for (ServiceProviderProperty property : serviceProvider.getSpProperties()) {
if (property.getName() != null && LOGOUT_RETURN_URL.equals(property.getName())) {
property.setValue(logoutReturnUrl);
logoutReturnUrlDefined = true;
break;
}
}
}
if (!logoutReturnUrlDefined) {
ServiceProviderProperty property = new ServiceProviderProperty();
property.setName(LOGOUT_RETURN_URL);
property.setDisplayName("Logout Return URL");
property.setValue(logoutReturnUrl);
serviceProvider.addSpProperties(property);
}
}
if (serviceProvider.getLocalAndOutBoundAuthenticationConfig() == null) {
// create fresh one.
serviceProvider.setLocalAndOutBoundAuthenticationConfig(new LocalAndOutboundAuthenticationConfig());
}
// authentication type : default, local, federated or advanced.
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAuthenticationType(request.getParameter("auth_type"));
// update inbound provisioning data.
String provisioningUserStore = request.getParameter("scim-inbound-userstore");
InboundProvisioningConfig inBoundProConfig = new InboundProvisioningConfig();
inBoundProConfig.setProvisioningUserStore(provisioningUserStore);
inBoundProConfig.setDumbMode(Boolean.parseBoolean(request.getParameter(DUMB)));
serviceProvider.setInboundProvisioningConfig(inBoundProConfig);
// update outbound provisioning data.
String[] provisioningProviders = request.getParameterValues("provisioning_idp");
if (provisioningProviders != null && provisioningProviders.length > 0) {
List<IdentityProvider> provisioningIdps = new ArrayList<IdentityProvider>();
for (String proProvider : provisioningProviders) {
String connector = request.getParameter("provisioning_con_idp_" + proProvider);
String jitEnabled = request.getParameter("provisioning_jit_" + proProvider);
String blocking = request.getParameter("blocking_prov_" + proProvider);
String ruleEnabled = request.getParameter("rules_enabled_" + proProvider);
if (connector != null) {
IdentityProvider proIdp = new IdentityProvider();
proIdp.setIdentityProviderName(proProvider);
JustInTimeProvisioningConfig jitpro = new JustInTimeProvisioningConfig();
if ("on".equals(jitEnabled)) {
jitpro.setProvisioningEnabled(true);
}
proIdp.setJustInTimeProvisioningConfig(jitpro);
ProvisioningConnectorConfig proCon = new ProvisioningConnectorConfig();
if ("on".equals(ruleEnabled)) {
proCon.setRulesEnabled(true);
} else {
proCon.setRulesEnabled(false);
}
if ("on".equals(blocking)) {
proCon.setBlocking(true);
} else {
proCon.setBlocking(false);
}
proCon.setName(connector);
proIdp.setDefaultProvisioningConnectorConfig(proCon);
provisioningIdps.add(proIdp);
}
}
if (CollectionUtils.isNotEmpty(provisioningIdps)) {
OutboundProvisioningConfig outboundProConfig = new OutboundProvisioningConfig();
outboundProConfig.setProvisioningIdentityProviders(provisioningIdps.toArray(new IdentityProvider[provisioningIdps.size()]));
serviceProvider.setOutboundProvisioningConfig(outboundProConfig);
}
} else {
serviceProvider.setOutboundProvisioningConfig(new OutboundProvisioningConfig());
}
// get all request-path authenticators.
String[] requestPathAuthenticators = request.getParameterValues("req_path_auth");
if (requestPathAuthenticators != null && requestPathAuthenticators.length > 0) {
List<RequestPathAuthenticatorConfig> reqAuthList = new ArrayList<RequestPathAuthenticatorConfig>();
for (String name : requestPathAuthenticators) {
if (name != null) {
RequestPathAuthenticatorConfig reqAuth = new RequestPathAuthenticatorConfig();
reqAuth.setName(name);
reqAuth.setDisplayName(request.getParameter("req_path_auth_" + name));
reqAuthList.add(reqAuth);
}
}
if (CollectionUtils.isNotEmpty(reqAuthList)) {
serviceProvider.setRequestPathAuthenticatorConfigs(reqAuthList.toArray(new RequestPathAuthenticatorConfig[reqAuthList.size()]));
} else {
serviceProvider.setRequestPathAuthenticatorConfigs(null);
}
} else {
serviceProvider.setRequestPathAuthenticatorConfigs(null);
}
List<InboundAuthenticationRequestConfig> authRequestList = new ArrayList<InboundAuthenticationRequestConfig>();
if (samlIssuer != null) {
InboundAuthenticationRequestConfig samlAuthenticationRequest = new InboundAuthenticationRequestConfig();
samlAuthenticationRequest.setInboundAuthKey(samlIssuer);
samlAuthenticationRequest.setInboundAuthType("samlsso");
if (attrConsumServiceIndex != null && !attrConsumServiceIndex.isEmpty()) {
Property property = new Property();
property.setName("attrConsumServiceIndex");
property.setValue(attrConsumServiceIndex);
Property[] properties = { property };
samlAuthenticationRequest.setProperties(properties);
}
authRequestList.add(samlAuthenticationRequest);
}
if (kerberosServiceName != null) {
InboundAuthenticationRequestConfig kerberosAuthenticationRequest = new InboundAuthenticationRequestConfig();
kerberosAuthenticationRequest.setInboundAuthKey(kerberosServiceName);
kerberosAuthenticationRequest.setInboundAuthType("kerberos");
authRequestList.add(kerberosAuthenticationRequest);
}
if (oauthAppName != null) {
InboundAuthenticationRequestConfig opicAuthenticationRequest = new InboundAuthenticationRequestConfig();
opicAuthenticationRequest.setInboundAuthKey(oauthAppName);
opicAuthenticationRequest.setInboundAuthType("oauth2");
if (oauthConsumerSecret != null && !oauthConsumerSecret.isEmpty()) {
Property property = new Property();
property.setName("oauthConsumerSecret");
property.setValue(oauthConsumerSecret);
Property[] properties = { property };
opicAuthenticationRequest.setProperties(properties);
}
authRequestList.add(opicAuthenticationRequest);
}
if (CollectionUtils.isNotEmpty(wstrustEp)) {
wstrustEp.forEach(entry -> {
InboundAuthenticationRequestConfig opicAuthenticationRequest = new InboundAuthenticationRequestConfig();
opicAuthenticationRequest.setInboundAuthKey(entry);
opicAuthenticationRequest.setInboundAuthType("wstrust");
authRequestList.add(opicAuthenticationRequest);
});
}
String passiveSTSRealm = request.getParameter("passiveSTSRealm");
String passiveSTSWReply = request.getParameter("passiveSTSWReply");
if (StringUtils.isNotBlank(passiveSTSRealm)) {
InboundAuthenticationRequestConfig opicAuthenticationRequest = new InboundAuthenticationRequestConfig();
opicAuthenticationRequest.setInboundAuthKey(passiveSTSRealm);
opicAuthenticationRequest.setInboundAuthType("passivests");
if (passiveSTSWReply != null && !passiveSTSWReply.isEmpty()) {
Property property = new Property();
property.setName("passiveSTSWReply");
property.setValue(passiveSTSWReply);
Property[] properties = { property };
opicAuthenticationRequest.setProperties(properties);
}
authRequestList.add(opicAuthenticationRequest);
}
String openidRealm = request.getParameter("openidRealm");
if (StringUtils.isNotBlank(openidRealm)) {
InboundAuthenticationRequestConfig opicAuthenticationRequest = new InboundAuthenticationRequestConfig();
opicAuthenticationRequest.setInboundAuthKey(openidRealm);
opicAuthenticationRequest.setInboundAuthType("openid");
authRequestList.add(opicAuthenticationRequest);
}
if (!CollectionUtils.isEmpty(inboundAuthenticationRequestConfigs)) {
for (InboundAuthenticationRequestConfig customAuthConfig : inboundAuthenticationRequestConfigs) {
String type = customAuthConfig.getInboundAuthType();
Property[] properties = customAuthConfig.getProperties();
if (!ArrayUtils.isEmpty(properties)) {
for (Property prop : properties) {
String propVal = request.getParameter("custom_auth_prop_name_" + type + "_" + prop.getName());
prop.setValue(propVal);
}
}
authRequestList.add(customAuthConfig);
}
}
if (serviceProvider.getInboundAuthenticationConfig() == null) {
serviceProvider.setInboundAuthenticationConfig(new InboundAuthenticationConfig());
}
if (CollectionUtils.isNotEmpty(authRequestList)) {
serviceProvider.getInboundAuthenticationConfig().setInboundAuthenticationRequestConfigs(authRequestList.toArray(new InboundAuthenticationRequestConfig[authRequestList.size()]));
}
// update local and out-bound authentication.
if (AUTH_TYPE_DEFAULT.equalsIgnoreCase(serviceProvider.getLocalAndOutBoundAuthenticationConfig().getAuthenticationType())) {
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAuthenticationSteps(null);
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAuthenticationScriptConfig(null);
} else if (AUTH_TYPE_LOCAL.equalsIgnoreCase(serviceProvider.getLocalAndOutBoundAuthenticationConfig().getAuthenticationType())) {
AuthenticationStep authStep = new AuthenticationStep();
LocalAuthenticatorConfig localAuthenticator = new LocalAuthenticatorConfig();
localAuthenticator.setName(request.getParameter("local_authenticator"));
if (localAuthenticator.getName() != null && localAuthenticatorConfigs != null) {
for (LocalAuthenticatorConfig config : localAuthenticatorConfigs) {
if (config.getName().equals(localAuthenticator.getName())) {
localAuthenticator.setDisplayName(config.getDisplayName());
break;
}
}
}
authStep.setLocalAuthenticatorConfigs(new LocalAuthenticatorConfig[] { localAuthenticator });
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAuthenticationSteps(new AuthenticationStep[] { authStep });
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAuthenticationScriptConfig(null);
} else if (AUTH_TYPE_FEDERATED.equalsIgnoreCase(serviceProvider.getLocalAndOutBoundAuthenticationConfig().getAuthenticationType())) {
AuthenticationStep authStep = new AuthenticationStep();
IdentityProvider idp = new IdentityProvider();
idp.setIdentityProviderName(request.getParameter("fed_idp"));
authStep.setFederatedIdentityProviders(new IdentityProvider[] { idp });
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAuthenticationSteps(new AuthenticationStep[] { authStep });
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAuthenticationScriptConfig(null);
} else if (AUTH_TYPE_FLOW.equalsIgnoreCase(serviceProvider.getLocalAndOutBoundAuthenticationConfig().getAuthenticationType())) {
// already updated.
}
String alwaysSendAuthListOfIdPs = request.getParameter("always_send_auth_list_of_idps");
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setAlwaysSendBackAuthenticatedListOfIdPs(alwaysSendAuthListOfIdPs != null && "on".equals(alwaysSendAuthListOfIdPs) ? true : false);
String useTenantDomainInLocalSubjectIdentifier = request.getParameter("use_tenant_domain_in_local_subject_identifier");
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setUseTenantDomainInLocalSubjectIdentifier(useTenantDomainInLocalSubjectIdentifier != null && "on".equals(useTenantDomainInLocalSubjectIdentifier) ? true : false);
String useUserstoreDomainInLocalSubjectIdentifier = request.getParameter("use_userstore_domain_in_local_subject_identifier");
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setUseUserstoreDomainInLocalSubjectIdentifier(useUserstoreDomainInLocalSubjectIdentifier != null && "on".equals(useUserstoreDomainInLocalSubjectIdentifier) ? true : false);
String useUserstoreDomainInRoles = request.getParameter("use_userstore_domain_in_roles");
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setUseUserstoreDomainInRoles(useUserstoreDomainInRoles != null && "on".equals(useUserstoreDomainInRoles) ? true : false);
boolean skipConsent = Boolean.parseBoolean(request.getParameter(IdentityConstants.SKIP_CONSENT));
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setSkipConsent(skipConsent);
boolean skipLogoutConsent = Boolean.parseBoolean(request.getParameter(IdentityConstants.SKIP_LOGOUT_CONSENT));
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setSkipLogoutConsent(skipLogoutConsent);
String enableAuthorization = request.getParameter("enable_authorization");
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setEnableAuthorization(enableAuthorization != null && "on".equals(enableAuthorization));
String subjectClaimUri = request.getParameter("subject_claim_uri");
serviceProvider.getLocalAndOutBoundAuthenticationConfig().setSubjectClaimUri((subjectClaimUri != null && !subjectClaimUri.isEmpty()) ? subjectClaimUri : null);
// update application permissions.
PermissionsAndRoleConfig permAndRoleConfig = new PermissionsAndRoleConfig();
String[] permissions = request.getParameterValues("app_permission");
List<ApplicationPermission> appPermList = new ArrayList<ApplicationPermission>();
if (permissions != null && permissions.length > 0) {
for (String permission : permissions) {
if (permission != null && !permission.trim().isEmpty()) {
ApplicationPermission appPermission = new ApplicationPermission();
appPermission.setValue(permission);
appPermList.add(appPermission);
}
}
}
if (CollectionUtils.isNotEmpty(appPermList)) {
permAndRoleConfig.setPermissions(appPermList.toArray(new ApplicationPermission[appPermList.size()]));
}
// update role mapping.
int roleMappingCount = Integer.parseInt(request.getParameter("number_of_rolemappings"));
List<RoleMapping> roleMappingList = new ArrayList<RoleMapping>();
for (int i = 0; i < roleMappingCount; i++) {
RoleMapping mapping = new RoleMapping();
LocalRole localRole = new LocalRole();
localRole.setLocalRoleName(request.getParameter("idpRole_" + i));
mapping.setLocalRole(localRole);
mapping.setRemoteRole(request.getParameter("spRole_" + i));
if (mapping.getLocalRole() != null && mapping.getRemoteRole() != null) {
roleMappingList.add(mapping);
}
}
permAndRoleConfig.setRoleMappings(roleMappingList.toArray(new RoleMapping[roleMappingList.size()]));
serviceProvider.setPermissionAndRoleConfig(permAndRoleConfig);
if (serviceProvider.getClaimConfig() == null) {
serviceProvider.setClaimConfig(new ClaimConfig());
}
if (request.getParameter("claim_dialect") != null && "custom".equals(request.getParameter("claim_dialect"))) {
serviceProvider.getClaimConfig().setLocalClaimDialect(false);
} else {
serviceProvider.getClaimConfig().setLocalClaimDialect(true);
}
// update claim configuration.
int claimCount = Integer.parseInt(request.getParameter("number_of_claim_mappings"));
List<ClaimMapping> claimMappingList = new ArrayList<ClaimMapping>();
for (int i = 0; i < claimCount; i++) {
ClaimMapping mapping = new ClaimMapping();
Claim localClaim = new Claim();
localClaim.setClaimUri(request.getParameter("idpClaim_" + i));
Claim spClaim = new Claim();
spClaim.setClaimUri(request.getParameter("spClaim_" + i));
String requested = request.getParameter("spClaim_req_" + i);
if (requested != null && "on".equals(requested)) {
mapping.setRequested(true);
} else {
mapping.setRequested(false);
}
String mandatory = request.getParameter("spClaim_mand_" + i);
if (mandatory != null && "on".equals(mandatory)) {
mapping.setMandatory(true);
} else {
mapping.setMandatory(false);
}
mapping.setLocalClaim(localClaim);
mapping.setRemoteClaim(spClaim);
if (isLocalClaimsSelected() || mapping.getRemoteClaim().getClaimUri() == null || mapping.getRemoteClaim().getClaimUri().isEmpty()) {
mapping.getRemoteClaim().setClaimUri(mapping.getLocalClaim().getClaimUri());
}
if (mapping.getLocalClaim().getClaimUri() != null && mapping.getRemoteClaim().getClaimUri() != null) {
claimMappingList.add(mapping);
}
}
String spClaimDialectParam = request.getParameter(ApplicationMgtUIConstants.Params.SP_CLAIM_DIALECT);
String[] spClaimDialects = null;
if (StringUtils.isNotBlank(spClaimDialectParam)) {
spClaimDialects = spClaimDialectParam.split(",");
}
serviceProvider.getClaimConfig().setSpClaimDialects(spClaimDialects);
serviceProvider.getClaimConfig().setClaimMappings(claimMappingList.toArray(new ClaimMapping[claimMappingList.size()]));
serviceProvider.getClaimConfig().setRoleClaimURI(request.getParameter("roleClaim"));
String alwaysSendMappedLocalSubjectId = request.getParameter("always_send_local_subject_id");
serviceProvider.getClaimConfig().setAlwaysSendMappedLocalSubjectId(alwaysSendMappedLocalSubjectId != null && "on".equals(alwaysSendMappedLocalSubjectId) ? true : false);
}
use of org.wso2.carbon.identity.application.common.model.RequestPathAuthenticatorConfig in project carbon-identity-framework by wso2.
the class ApplicationDAOImpl method getRequestPathAuthenticators.
/**
* @param applicationId
* @param connection
* @return
* @throws IdentityApplicationManagementException
*/
private RequestPathAuthenticatorConfig[] getRequestPathAuthenticators(int applicationId, Connection connection, int tenantID) throws IdentityApplicationManagementException {
PreparedStatement loadReqPathAuthenticators = null;
ResultSet authResultSet = null;
List<RequestPathAuthenticatorConfig> authenticators = new ArrayList<RequestPathAuthenticatorConfig>();
try {
loadReqPathAuthenticators = connection.prepareStatement(LOAD_REQ_PATH_AUTHENTICATORS_BY_APP_ID);
loadReqPathAuthenticators.setInt(1, applicationId);
loadReqPathAuthenticators.setInt(2, tenantID);
authResultSet = loadReqPathAuthenticators.executeQuery();
while (authResultSet.next()) {
RequestPathAuthenticatorConfig reqAuth = new RequestPathAuthenticatorConfig();
reqAuth.setName(authResultSet.getString(1));
authenticators.add(reqAuth);
}
} catch (SQLException e) {
throw new IdentityApplicationManagementException("Error while retrieving all application");
} finally {
IdentityApplicationManagementUtil.closeStatement(loadReqPathAuthenticators);
IdentityApplicationManagementUtil.closeResultSet(authResultSet);
}
return authenticators.toArray(new RequestPathAuthenticatorConfig[authenticators.size()]);
}
use of org.wso2.carbon.identity.application.common.model.RequestPathAuthenticatorConfig in project carbon-identity-framework by wso2.
the class ApplicationDAOImpl method updateRequestPathAuthenticators.
/**
* @param applicationId
* @param authenticators
* @param connection
* @throws IdentityApplicationManagementException
*/
private void updateRequestPathAuthenticators(int applicationId, RequestPathAuthenticatorConfig[] authenticators, Connection connection) throws IdentityApplicationManagementException {
int tenantID = CarbonContext.getThreadLocalCarbonContext().getTenantId();
PreparedStatement storeReqPathAuthenticators = null;
try {
storeReqPathAuthenticators = connection.prepareStatement(STORE_REQ_PATH_AUTHENTICATORS);
if (authenticators != null && authenticators.length > 0) {
for (RequestPathAuthenticatorConfig auth : authenticators) {
// TENANT_ID, AUTHENTICATOR_NAME, APP_ID
storeReqPathAuthenticators.setInt(1, tenantID);
storeReqPathAuthenticators.setString(2, auth.getName());
storeReqPathAuthenticators.setInt(3, applicationId);
storeReqPathAuthenticators.addBatch();
}
storeReqPathAuthenticators.executeBatch();
}
} catch (SQLException e) {
throw new IdentityApplicationManagementException("Error while retrieving all application");
} finally {
IdentityApplicationManagementUtil.closeStatement(storeReqPathAuthenticators);
}
}
Aggregations