use of org.wso2.identity.integration.common.clients.ClaimManagementServiceClient in project product-is by wso2.
the class UserInformationRecoveryServiceTestCase method testInit.
@SetEnvironment(executionEnvironments = { ExecutionEnvironment.ALL })
@BeforeClass(alwaysRun = true)
public void testInit() throws Exception {
super.init();
String carbonHome = Utils.getResidentCarbonHome();
identityMgtServerFile = new File(carbonHome + File.separator + "repository" + File.separator + "conf" + File.separator + "identity" + File.separator + "identity-mgt.properties");
File identityMgtConfigFile = new File(getISResourceLocation() + File.separator + "identityMgt" + File.separator + "identity-mgt-enabled.properties");
axisServerFile = new File(carbonHome + File.separator + "repository" + File.separator + "conf" + File.separator + "axis2" + File.separator + "axis2.xml");
File axisConfigFile = new File(getISResourceLocation() + File.separator + "identityMgt" + File.separator + "axis2.xml");
scm = new ServerConfigurationManager(isServer);
scm.applyConfigurationWithoutRestart(identityMgtConfigFile, identityMgtServerFile, true);
scm.applyConfigurationWithoutRestart(axisConfigFile, axisServerFile, true);
scm.restartGracefully();
super.init();
loginManger = new AuthenticatorClient(backendURL);
userMgtClient = new UserManagementClient(backendURL, sessionCookie);
infoRecoveryClient = new UserInformationRecoveryServiceClient(backendURL, sessionCookie);
profileClient = new UserProfileMgtServiceClient(backendURL, sessionCookie);
loginManger.login(isServer.getSuperTenant().getTenantAdmin().getUserName(), isServer.getSuperTenant().getTenantAdmin().getPassword(), isServer.getInstance().getHosts().get("default"));
claimMgtClient = new ClaimManagementServiceClient(backendURL, sessionCookie);
ClaimDTO claim1 = new ClaimDTO();
claim1.setDialectURI("http://wso2.org/claims");
claim1.setClaimUri("http://wso2.org/claims/identity/unlockTime");
claim1.setDescription("Account Unlock time");
ClaimDTO claim2 = new ClaimDTO();
claim2.setDialectURI("http://wso2.org/claims");
claim2.setClaimUri("http://wso2.org/claims/identity/failedLoginAttempts");
claim2.setDescription("Failed login attempts");
ClaimMappingDTO claimMapping1 = new ClaimMappingDTO();
claimMapping1.setClaim(claim1);
claimMapping1.setMappedAttribute("description");
claimMgtClient.addNewClaimMapping(claimMapping1);
ClaimMappingDTO claimMapping2 = new ClaimMappingDTO();
claimMapping2.setClaim(claim2);
claimMapping2.setMappedAttribute("employeeType");
claimMgtClient.addNewClaimMapping(claimMapping2);
userMgtClient.addUser("user11", "passWord1@", null, "default");
userMgtClient.addRole("umRole11", new String[] { "user11" }, new String[] { "/permission/admin/login" }, false);
}
use of org.wso2.identity.integration.common.clients.ClaimManagementServiceClient in project product-is by wso2.
the class ClaimManagementServiceTestCase method testInit.
@BeforeClass(alwaysRun = true)
public void testInit() throws Exception {
super.init();
adminClient = new ClaimManagementServiceClient(backendURL, sessionCookie);
setSystemproperties();
}
use of org.wso2.identity.integration.common.clients.ClaimManagementServiceClient in project product-is by wso2.
the class AccountLockingWhileSCIMEnabledTestCase method testInit.
@SetEnvironment(executionEnvironments = { ExecutionEnvironment.ALL })
@BeforeClass(alwaysRun = true)
public void testInit() throws Exception {
super.init();
String carbonHome = Utils.getResidentCarbonHome();
identityMgtServerFile = new File(carbonHome + File.separator + "repository" + File.separator + "conf" + File.separator + "identity" + File.separator + "identity-mgt.properties");
File identityMgtConfigFile = new File(getISResourceLocation() + File.separator + "identityMgt" + File.separator + "identity-mgt-account-lock-enabled.properties");
userMgtServerFile = new File(carbonHome + File.separator + "repository" + File.separator + "conf" + File.separator + "user-mgt.xml");
File scimEnabledUserMgtCofigFile = new File(getISResourceLocation() + File.separator + "userMgt" + File.separator + "scim-enabled-user-mgt.xml");
scm = new ServerConfigurationManager(isServer);
scm.applyConfigurationWithoutRestart(identityMgtConfigFile, identityMgtServerFile, true);
scm.applyConfigurationWithoutRestart(scimEnabledUserMgtCofigFile, userMgtServerFile, true);
scm.restartGracefully();
super.init();
loginManger = new AuthenticatorClient(backendURL);
userMgtClient = new UserManagementClient(backendURL, sessionCookie);
infoRecoveryClient = new UserInformationRecoveryServiceClient(backendURL, sessionCookie);
profileClient = new UserProfileMgtServiceClient(backendURL, sessionCookie);
loginManger.login(isServer.getSuperTenant().getTenantAdmin().getUserName(), isServer.getSuperTenant().getTenantAdmin().getPassword(), isServer.getInstance().getHosts().get("default"));
claimMgtClient = new ClaimManagementServiceClient(backendURL, sessionCookie);
ClaimValue[] claimValues = new ClaimValue[1];
// Need to add this claim and have the value true in order to test the fix
ClaimValue scimActiveClaim = new ClaimValue();
scimActiveClaim.setClaimURI(SCIM_ACTIVE_URI);
scimActiveClaim.setValue("true");
claimValues[0] = scimActiveClaim;
remoteUSMServiceClient = new RemoteUserStoreManagerServiceClient(backendURL, sessionCookie);
remoteUSMServiceClient.addUser(TEST_USER_USERNAME, TEST_USER_PASSWORD, null, claimValues, PROFILE_NAME, false);
userMgtClient.addRole(TEST_ROLE, new String[] { TEST_USER_USERNAME }, new String[] { "/permission/admin/login" }, false);
}
Aggregations