Modifier and Type | Method and Description |
---|---|
JWSHeader |
TokenVerifier.getHeader() |
JWSHeader |
RSATokenVerifier.getHeader()
Deprecated.
|
T |
TokenVerifier.getToken() |
AccessToken |
RSATokenVerifier.getToken()
Deprecated.
|
TokenVerifier<T> |
TokenVerifier.parse() |
RSATokenVerifier |
RSATokenVerifier.parse()
Deprecated.
|
boolean |
TokenVerifier.RealmUrlCheck.test(JsonWebToken t) |
boolean |
TokenVerifier.TokenTypeCheck.test(JsonWebToken t) |
boolean |
TokenVerifier.AudienceCheck.test(JsonWebToken t) |
boolean |
TokenVerifier.IssuedForCheck.test(JsonWebToken jsonWebToken) |
boolean |
TokenVerifier.Predicate.test(T t)
Performs a single check on the given token verifier.
|
TokenVerifier<T> |
TokenVerifier.verify() |
RSATokenVerifier |
RSATokenVerifier.verify()
Deprecated.
|
static void |
KeyPairVerifier.verify(String privateKeyPem,
String publicKeyPem) |
void |
TokenVerifier.verifySignature() |
static AccessToken |
RSATokenVerifier.verifyToken(String tokenString,
PublicKey publicKey,
String realmUrl)
Deprecated.
|
static AccessToken |
RSATokenVerifier.verifyToken(String tokenString,
PublicKey publicKey,
String realmUrl,
boolean checkActive,
boolean checkTokenType)
Deprecated.
|
Modifier and Type | Class and Description |
---|---|
class |
ExplainedVerificationException |
Modifier and Type | Class and Description |
---|---|
class |
ExplainedTokenVerificationException
Token verification exception that bears an error to be logged via event system
and a message to show to the user e.g.
|
Modifier and Type | Method and Description |
---|---|
AuthenticationSessionModel |
ActionTokenHandler.startFreshAuthenticationSession(T token,
ActionTokenContext<T> tokenContext)
Creates a fresh authentication session according to the information from the token.
|
Modifier and Type | Method and Description |
---|---|
protected abstract void |
SAMLEndpoint.Binding.verifySignature(String key,
SAMLDocumentHolder documentHolder) |
protected void |
SAMLEndpoint.PostBinding.verifySignature(String key,
SAMLDocumentHolder documentHolder) |
protected void |
SAMLEndpoint.RedirectBinding.verifySignature(String key,
SAMLDocumentHolder documentHolder) |
Modifier and Type | Method and Description |
---|---|
SignatureVerifierContext |
ClientSignatureVerifierProvider.verifier(ClientModel client,
JWSInput input) |
SignatureVerifierContext |
MacSecretClientSignatureVerifierProvider.verifier(ClientModel client,
JWSInput input) |
SignatureVerifierContext |
ECDSAClientSignatureVerifierProvider.verifier(ClientModel client,
JWSInput input) |
SignatureVerifierContext |
AsymmetricClientSignatureVerifierProvider.verifier(ClientModel client,
JWSInput input) |
SignatureVerifierContext |
SignatureProvider.verifier(String kid) |
SignatureVerifierContext |
MacSecretSignatureProvider.verifier(String kid) |
SignatureVerifierContext |
ECDSASignatureProvider.verifier(String kid) |
SignatureVerifierContext |
AsymmetricSignatureProvider.verifier(String kid) |
boolean |
SignatureVerifierContext.verify(byte[] data,
byte[] signature) |
boolean |
MacSignatureVerifierContext.verify(byte[] data,
byte[] signature) |
boolean |
AsymmetricSignatureVerifierContext.verify(byte[] data,
byte[] signature) |
boolean |
ServerECDSASignatureVerifierContext.verify(byte[] data,
byte[] signature) |
boolean |
ClientECDSASignatureVerifierContext.verify(byte[] data,
byte[] signature) |
Constructor and Description |
---|
ClientAsymmetricSignatureVerifierContext(KeycloakSession session,
ClientModel client,
JWSInput input) |
ClientECDSASignatureVerifierContext(KeycloakSession session,
ClientModel client,
JWSInput input) |
ClientMacSignatureVerifierContext(KeycloakSession session,
ClientModel client,
String algorithm) |
ServerAsymmetricSignatureVerifierContext(KeycloakSession session,
String kid,
String algorithm) |
ServerECDSASignatureVerifierContext(KeycloakSession session,
String kid,
String algorithm) |
ServerMacSignatureVerifierContext(KeycloakSession session,
String kid,
String algorithm) |
Modifier and Type | Class and Description |
---|---|
class |
TokenNotActiveException
Exception thrown for cases when token is invalid due to time constraints (expired, or not yet valid).
|
class |
TokenSignatureInvalidException
Thrown when token signature is invalid.
|
class |
TokenVerificationException
Exception thrown on failed verification of a token.
|
Modifier and Type | Method and Description |
---|---|
boolean |
TokenManager.NotBeforeCheck.test(JsonWebToken t) |
Modifier and Type | Method and Description |
---|---|
static PublicKey |
SamlProtocolUtils.getEncryptionKey(ClientModel client)
Returns public part of SAML encryption key from the client settings.
|
static PublicKey |
SamlProtocolUtils.getPublicKey(ClientModel client,
String attribute) |
static PublicKey |
SamlProtocolUtils.getSignatureValidationKey(ClientModel client)
Returns public part of SAML signing key from the client settings.
|
static void |
SamlProtocolUtils.verifyDocumentSignature(ClientModel client,
Document document)
Verifies a signature of the given SAML document using settings for the given client.
|
static void |
SamlProtocolUtils.verifyDocumentSignature(Document document,
KeyLocator keyLocator)
Verifies a signature of the given SAML document using keys obtained from the given key locator.
|
static void |
SamlProtocolUtils.verifyRedirectSignature(SAMLDocumentHolder documentHolder,
KeyLocator locator,
javax.ws.rs.core.MultivaluedMap<String,String> encodedParams,
String paramKey) |
static void |
SamlProtocolUtils.verifyRedirectSignature(SAMLDocumentHolder documentHolder,
KeyLocator locator,
javax.ws.rs.core.UriInfo uriInformation,
String paramKey) |
protected abstract void |
SamlService.BindingProtocol.verifySignature(SAMLDocumentHolder documentHolder,
ClientModel client) |
protected void |
SamlService.PostBindingProtocol.verifySignature(SAMLDocumentHolder documentHolder,
ClientModel client) |
protected void |
SamlService.RedirectBindingProtocol.verifySignature(SAMLDocumentHolder documentHolder,
ClientModel client) |
Modifier and Type | Class and Description |
---|---|
class |
LoginActionsServiceException |
Modifier and Type | Method and Description |
---|---|
static void |
LoginActionsServiceChecks.checkIsClientValid(KeycloakSession session,
ClientModel client)
Verifies whether the client denoted by client ID in token's
iss (issuedFor )
field both exists and is enabled. |
static <T extends JsonWebToken> |
LoginActionsServiceChecks.checkIsClientValid(T token,
ActionTokenContext<T> context)
Verifies whether the client denoted by client ID in token's
iss (issuedFor )
field both exists and is enabled. |
static void |
LoginActionsServiceChecks.checkIsUserValid(KeycloakSession session,
RealmModel realm,
String userId,
Consumer<UserModel> userSetter)
Verifies whether the user given by ID both exists in the current realm.
|
static <T extends JsonWebToken & ActionTokenKeyModel> |
LoginActionsServiceChecks.checkIsUserValid(T token,
ActionTokenContext<T> context)
Verifies whether the user given by ID both exists in the current realm.
|
static <T extends JsonWebToken> |
LoginActionsServiceChecks.checkNotLoggedInYet(ActionTokenContext<T> context,
AuthenticationSessionModel authSessionFromCookie,
String authSessionId)
Verifies that the authentication session has not yet been converted to user session, in other words
that the user has not yet completed authentication and logged in.
|
static <T extends JsonWebToken & ActionTokenKeyModel> |
LoginActionsServiceChecks.checkTokenWasNotUsedYet(T token,
ActionTokenContext<T> context) |
static <T extends JsonWebToken> |
LoginActionsServiceChecks.doesAuthenticationSessionFromCookieMatchOneFromToken(ActionTokenContext<T> context,
AuthenticationSessionModel authSessionFromCookie,
String authSessionCompoundIdFromToken)
This check verifies that current authentication session is consistent with the one specified in token.
|
boolean |
LoginActionsServiceChecks.AuthenticationSessionUserIdMatchesOneFromToken.test(JsonWebToken t) |
boolean |
LoginActionsServiceChecks.IsActionRequired.test(JsonWebToken t) |
boolean |
LoginActionsServiceChecks.IsRedirectValid.test(JsonWebToken t) |
Copyright © 2021 JBoss by Red Hat. All rights reserved.