All Classes and Interfaces

Class
Description
 
 
 
 
 
 
 
OAuth 2.0 Access Token Response json
 
Configuration for Java based adapters
 
Configuration options relevant for configuring http client that can be used by adapter.
 
Posted to managed client from admin server.
 
 
 
 
 
 
 
 
 
 
Deprecated.
 
Deprecated.
 
 
 
 
 
 
 
 
 
 
The JSON representation of a Rich Authorization Request's "authorization_details" object.
 
 
 
 
Common Adapter configuration
Common Realm Configuration
The default implementation is compliant with RFC 2617
compliant with RFC 6749
PEM values of key and certificate
 
Claims parameter as described in the OIDC specification https://openid.net/specs/openid-connect-core-1_0.html#ClaimsParameter
 
 
The simple SPI for authenticating clients/applications .
 
Traditional OAuth2 authentication of clients based on client_id and client_secret
 
 
 
 
Client Policies' (the set of all Client Policy) external representation class
Just adds some type-safety to the ClientPolicyConditionConfiguration
 
Just adds some type-safety to the ClientPolicyExecutorConfiguration
 
 
Client Policy's external representation class
Client Profile's external representation class
Client Profiles' (the set of all Client Profile) external representation class
Created by st on 29/03/17.
 
 
 
 
Deprecated.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.
 
 
Per the docker auth v2 spec, access is defined like this: { "type": "repository", "name": "samalba/my-app", "actions": [ "push", "pull" ] }
JSON Representation of a Docker Error in the following format: { "code": "UNAUTHORIZED", "message": "access to the requested resource is not authorized", "detail": [ { "Type": "repository", "Name": "samalba/my-app", "Action": "pull" }, { "Type": "repository", "Name": "samalba/my-app", "Action": "push" } ] }
 
Creates a response understandable by the docker client in the form: { "token" : "eyJh...nSQ", "expires_in" : 300, "issued_at" : "2016-09-02T10:56:33Z" }
* { "iss": "auth.docker.com", "sub": "jlhawn", "aud": "registry.docker.com", "exp": 1415387315, "nbf": 1415387015, "iat": 1415387015, "jti": "tYJCO1c6cnyy7kAn0c7rKPgbV1H1bFws", "access": [ { "type": "repository", "name": "samalba/my-app", "actions": [ "push" ] } ] }
 
 
 
 
Classes implementing this interface guarantee that for each instance of this class, there exists an mutually unique integer which is stable in time, and identifies always the same instance of this class.
 
 
 
 
Result of the "global" request (like push notBefore or logoutAll), which is send to all cluster nodes
 
 
 
 
 
 
 
 
 
 
 
An interface to represent signed (JWS) and encrypted (JWE) JWTs.
This interface represents a JOSE header.
 
Utility class to handle simple JSON serializable for Keycloak.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Client authentication based on JWT signed by client private key .
Client authentication based on JWT signed by client secret instead of private key .
 
Available in secured requests under HttpServletRequest.getAttribute() Also available in HttpSession.getAttribute under the classname of this class
 
 
 
 
Configuration of KeyStore.
 
 
 
Value object to represent an OID (object identifier) as used to describe LDAP schema, extension and features.
 
 
The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.
 
 
 
 
 
 
 
 
 
 
Representation for Device Authorization Response.
 
Deprecated.
 
 
 
Used for partial import of users, groups, clients, roles, and identity providers.
 
 
 
 
 
 
 
The policy enforcement mode dictates how authorization requests are handled by the server.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Some endpoints (like register new required action) doesn't support all the fields (like setEnabled etc).
 
 
One or more resources that the resource server manages as a set of protected resources.
 
 
 
 
 
 
 
 
Deprecated.
 
 
A bounded extent of access that is possible to perform on a resource set.
 
 
 
 
Created by st on 29/03/17.
 
 
 
 
 
 
 
 
 
 
 
Provides replacing of system properties for parsed values
 
 
 
 
 
 
 
 
 
Exception thrown for cases when token is invalid due to time constraints (expired, or not yet valid).
Thrown when token signature is invalid.
 
 
Exception thrown on failed verification of a token.
 
 
 
Functional interface of checks that verify some part of a JWT.
 
 
 
Configuration of the Attribute.
Configuration of permissions for the attribute
Config of the rules when attribute is required.
Config of the rules when attribute is selected.
Configuration of the User Profile for one realm.
Configuration of the attribute group.