@Deprecated public RealmBuilder setNameRewriter(final NameRewriter nameRewriter) { return setPrincipalRewriter(nameRewriter.asPrincipalRewriter()); }
/** * Construct this security domain. * * Construction requires {@code createSecurityDomain} {@link ElytronPermission}. * * @return the new security domain */ public SecurityDomain build() { final SecurityManager sm = System.getSecurityManager(); if (sm != null) { sm.checkPermission(CREATE_SECURITY_DOMAIN); } final LinkedHashMap<String, RealmInfo> realmMap = new LinkedHashMap<>(realms.size()); for (RealmBuilder realmBuilder : realms.values()) { realmMap.put(realmBuilder.getName(), new RealmInfo(realmBuilder)); } if (defaultRealmName != null && !realmMap.containsKey(defaultRealmName)) { throw log.realmMapDoesNotContainDefault(defaultRealmName); } assertNotBuilt(); built = true; if(log.isTraceEnabled()) { log.tracef("Building security domain with defaultRealmName %s.", defaultRealmName); if(realmMap.size() > 1) { log.tracef("The following additional realms were added: %s.", realmMap.keySet().toString()); } } return new SecurityDomain(this, realmMap); }
.setRoleDecoder(RoleDecoder.simple("GROUPS")) .build(); Function<Principal, Principal> preRealmRewriter = p -> new RealmUser(this.name, p.getName()); preRealmRewriter = preRealmRewriter.andThen(currentService.getPrincipalMapper()); mechanismConfiguration.put(WildFlySasl.ALTERNATIVE_PROTOCOLS, "remoting"); domainBuilder.addRealm("EMPTY", org.wildfly.security.auth.server.SecurityRealm.EMPTY_REALM).build(); domainBuilder.setDefaultRealmName("EMPTY"); return domainManagedServersCallback.getElytronSecurityRealm().getRealmIdentity(evidence); }).build();
.setRoleDecoder(RoleDecoder.simple("GROUPS")) .build(); Function<Principal, Principal> preRealmRewriter = p -> new RealmUser(this.name, p.getName()); preRealmRewriter = preRealmRewriter.andThen(currentService.getPrincipalMapper()); mechanismConfiguration.put(WildFlySasl.ALTERNATIVE_PROTOCOLS, "remoting"); domainBuilder.addRealm("EMPTY", org.wildfly.security.auth.server.SecurityRealm.EMPTY_REALM).build(); domainBuilder.setDefaultRealmName("EMPTY"); return domainManagedServersCallback.getElytronSecurityRealm().getRealmIdentity(evidence); }).build();
.addRealm("Empty", SecurityRealm.EMPTY_REALM).build() .build();
.addRealm("Empty", SecurityRealm.EMPTY_REALM).build() .build();
domainBuilder.addRealm("default", SecurityRealm.EMPTY_REALM).build(); domainBuilder.setDefaultRealmName("default"); domainBuilder.setPermissionMapper((permissionMappable, roles) -> SecurityRealmService.createPermissionVerifier());
final SecurityDomain.Builder domainBuilder = SecurityDomain.builder(); domainBuilder.setPermissionMapper((permissionMappable, roles) -> LoginPermission.getInstance()); domainBuilder.addRealm("default", org.wildfly.security.auth.server.SecurityRealm.EMPTY_REALM).build(); domainBuilder.setDefaultRealmName("default"); factory = SaslAuthenticationFactory
return SupportLevel.UNSUPPORTED; }).setRoleDecoder(RoleDecoder.simple("GROUPS")).build().setPermissionMapper((permissionMappable, roles) -> LoginPermission.getInstance()).build();
return SupportLevel.UNSUPPORTED; }).setRoleDecoder(RoleDecoder.simple("GROUPS")).build().setPermissionMapper((permissionMappable, roles) -> LoginPermission.getInstance()).build();
RealmBuilder realmBuilder = builder.addRealm(realmName, realmDependency.securityRealmInjector.getValue()); if (realmDependency.principalTransformer != null) { realmBuilder.setPrincipalRewriter(principalTransformers.get(realmDependency.principalTransformer).getValue()); realmBuilder.setRoleDecoder(roleDecoder); realmBuilder.setRoleMapper(roleMappers.get(realmDependency.roleMapper).getValue()); realmBuilder.build();
/** * Construct this security domain. * * Construction requires {@code createSecurityDomain} {@link ElytronPermission}. * * @return the new security domain */ public SecurityDomain build() { final SecurityManager sm = System.getSecurityManager(); if (sm != null) { sm.checkPermission(CREATE_SECURITY_DOMAIN); } final LinkedHashMap<String, RealmInfo> realmMap = new LinkedHashMap<>(realms.size()); for (RealmBuilder realmBuilder : realms.values()) { realmMap.put(realmBuilder.getName(), new RealmInfo(realmBuilder)); } if (defaultRealmName != null && !realmMap.containsKey(defaultRealmName)) { throw log.realmMapDoesNotContainDefault(defaultRealmName); } assertNotBuilt(); built = true; if(log.isTraceEnabled()) { log.tracef("Building security domain with defaultRealmName %s.", defaultRealmName); if(realmMap.size() > 1) { log.tracef("The following additional realms were added: %s.", realmMap.keySet().toString()); } } return new SecurityDomain(this, realmMap); }
/** * Construct this security domain. * * Construction requires {@code createSecurityDomain} {@link ElytronPermission}. * * @return the new security domain */ public SecurityDomain build() { final SecurityManager sm = System.getSecurityManager(); if (sm != null) { sm.checkPermission(CREATE_SECURITY_DOMAIN); } final LinkedHashMap<String, RealmInfo> realmMap = new LinkedHashMap<>(realms.size()); for (RealmBuilder realmBuilder : realms.values()) { realmMap.put(realmBuilder.getName(), new RealmInfo(realmBuilder)); } if (defaultRealmName != null && !realmMap.containsKey(defaultRealmName)) { throw log.realmMapDoesNotContainDefault(defaultRealmName); } assertNotBuilt(); built = true; if(log.isTraceEnabled()) { log.tracef("Building security domain with defaultRealmName %s.", defaultRealmName); if(realmMap.size() > 1) { log.tracef("The following additional realms were added: %s.", realmMap.keySet().toString()); } } return new SecurityDomain(this, realmMap); }
/** * Construct this security domain. * * Construction requires {@code createSecurityDomain} {@link ElytronPermission}. * * @return the new security domain */ public SecurityDomain build() { final SecurityManager sm = System.getSecurityManager(); if (sm != null) { sm.checkPermission(CREATE_SECURITY_DOMAIN); } final LinkedHashMap<String, RealmInfo> realmMap = new LinkedHashMap<>(realms.size()); for (RealmBuilder realmBuilder : realms.values()) { realmMap.put(realmBuilder.getName(), new RealmInfo(realmBuilder)); } if (defaultRealmName != null && !realmMap.containsKey(defaultRealmName)) { throw log.realmMapDoesNotContainDefault(defaultRealmName); } assertNotBuilt(); built = true; if(log.isTraceEnabled()) { log.tracef("Building security domain with defaultRealmName %s.", defaultRealmName); if(realmMap.size() > 1) { log.tracef("The following additional realms were added: %s.", realmMap.keySet().toString()); } } return new SecurityDomain(this, realmMap); }
/** * Add a realm to this security domain. * * @param name the realm's name in this configuration * @param realm the realm * @return the new realm builder */ public RealmBuilder addRealm(String name, SecurityRealm realm) { Assert.checkNotNullParam("name", name); Assert.checkNotNullParam("realm", realm); assertNotBuilt(); final RealmBuilder realmBuilder = new RealmBuilder(this, name, realm); return realmBuilder; }
/** * Add a realm to this security domain. * * @param name the realm's name in this configuration * @param realm the realm * @return the new realm builder */ public RealmBuilder addRealm(String name, SecurityRealm realm) { Assert.checkNotNullParam("name", name); Assert.checkNotNullParam("realm", realm); assertNotBuilt(); final RealmBuilder realmBuilder = new RealmBuilder(this, name, realm); return realmBuilder; }
/** * Add a realm to this security domain. * * @param name the realm's name in this configuration * @param realm the realm * @return the new realm builder */ public RealmBuilder addRealm(String name, SecurityRealm realm) { Assert.checkNotNullParam("name", name); Assert.checkNotNullParam("realm", realm); assertNotBuilt(); final RealmBuilder realmBuilder = new RealmBuilder(this, name, realm); return realmBuilder; }
@Deprecated public RealmBuilder setNameRewriter(final NameRewriter nameRewriter) { return setPrincipalRewriter(nameRewriter.asPrincipalRewriter()); }
Builder addRealm(RealmBuilder realmBuilder) { realms.put(realmBuilder.getName(), realmBuilder); return this; }
Builder addRealm(RealmBuilder realmBuilder) { realms.put(realmBuilder.getName(), realmBuilder); return this; }