new IdentityProvider(); object.setAlias( org.apache.axis2.databinding.utils.ConverterUtil.convertToString(content)); object.setCertificate( org.apache.axis2.databinding.utils.ConverterUtil.convertToString(content)); object.setClaimConfig(null); reader.next(); object.setClaimConfig(org.wso2.carbon.identity.application.common.model.idp.xsd.ClaimConfig.Factory.parse(reader)); object.setDefaultAuthenticatorConfig(null); reader.next(); object.setDefaultAuthenticatorConfig(org.wso2.carbon.identity.application.common.model.idp.xsd.FederatedAuthenticatorConfig.Factory.parse(reader)); object.setDefaultProvisioningConnectorConfig(null); reader.next(); object.setDefaultProvisioningConnectorConfig(org.wso2.carbon.identity.application.common.model.idp.xsd.ProvisioningConnectorConfig.Factory.parse(reader)); object.setDisplayName( org.apache.axis2.databinding.utils.ConverterUtil.convertToString(content)); object.setEnable( org.apache.axis2.databinding.utils.ConverterUtil.convertToBoolean(content));
IdentityProvider fedIdp = new IdentityProvider(); oldIdpName.append(oldIdentityProvider.getIdentityProviderName()); if (oldIdentityProvider != null && oldIdentityProvider.getCertificate() != null) { if (oldIdentityProvider.getCertificateInfoArray() != null && oldIdentityProvider. getCertificateInfoArray().length > 1) { if (log.isDebugEnabled()) { log.debug("Number of old certificate for the identity provider " + oldIdentityProvider.getDisplayName() + " is " + oldIdentityProvider. getCertificateInfoArray().length); for (CertificateInfo certificateInfo : oldIdentityProvider.getCertificateInfoArray()) { multipleCertificate.append(new String(Base64.decode(certificateInfo.getCertValue()))); paramMap.put(IdentityApplicationConstants.OLD_CERT_FILE, oldIdentityProvider.getCertificate()); && oldIdentityProvider.getProvisioningConnectorConfigs() != null) { .getProvisioningConnectorConfigs(); for (ProvisioningConnectorConfig provisioningConnector : provisioningConnectorConfig) { if (("googleapps").equals(provisioningConnector.getName())) { && oldIdentityProvider.getClaimConfig().getClaimMappings() != null) { buildClaimConfiguration(fedIdp, paramMap, idpClaims, oldIdentityProvider .getClaimConfig().getClaimMappings()); } else { buildClaimConfiguration(fedIdp, paramMap, idpClaims, null);
fedIdp.setIdentityProviderName(paramMap.get("idPName")); fedIdp.setDisplayName(paramMap.get("idpDisplayName")); fedIdp.setEnable(true); } else { fedIdp.setEnable(false); fedIdp.setIdentityProviderDescription(paramMap.get("idPDescription")); fedIdp.setFederationHub(true); } else { fedIdp.setFederationHub(false); fedIdp.setHomeRealmId(paramMap.get("realmId")); fedIdp.setAlias(paramMap.get("tokenEndpointAlias")); fedIdp.setCertificate(certFile);
fedIdp.setDefaultProvisioningConnectorConfig(customConfig); ProvisioningConnectorConfig[] provConnectors = fedIdp.getProvisioningConnectorConfigs(); fedIdp.setProvisioningConnectorConfigs(proConfigConnList); } else { fedIdp.setProvisioningConnectorConfigs(concatArrays(proConfigConnList, provConnectors));
fedIdp.setDefaultAuthenticatorConfig(customConfig); .getFederatedAuthenticatorConfigs(); fedIdp.setFederatedAuthenticatorConfigs(fedAuthConfigList); } else { fedIdp.setFederatedAuthenticatorConfigs(concatArrays(fedAuthConfigList, authenticators));
throws Exception { IdentityProvider fedIdp = new IdentityProvider(); oldIdpName.append(oldIdentityProvider.getIdentityProviderName()); if (oldIdentityProvider != null && oldIdentityProvider.getCertificate() != null) { paramMap.put("oldCertFile", oldIdentityProvider.getCertificate()); && oldIdentityProvider.getProvisioningConnectorConfigs() != null) { .getProvisioningConnectorConfigs(); for (ProvisioningConnectorConfig provisioningConnector : provisioningConnectorConfig) { if (("googleapps").equals(provisioningConnector.getName())) { && oldIdentityProvider.getClaimConfig().getClaimMappings() != null) { buildClaimConfiguration(fedIdp, paramMap, idpClaims, oldIdentityProvider .getClaimConfig().getClaimMappings()); } else { buildClaimConfiguration(fedIdp, paramMap, idpClaims, null); && oldIdentityProvider.getPermissionAndRoleConfig() != null && oldIdentityProvider.getPermissionAndRoleConfig().getRoleMappings() != null) { buildRoleConfiguration(fedIdp, paramMap, idpRoles, oldIdentityProvider .getPermissionAndRoleConfig().getRoleMappings()); } else { buildRoleConfiguration(fedIdp, paramMap, idpRoles, null);
/** * @param fedIdp * @param paramMap * @throws IdentityApplicationManagementException */ private static void buildClaimConfiguration(IdentityProvider fedIdp, Map<String, String> paramMap, List<String> idpClaims, ClaimMapping[] currentClaimMapping) throws IdentityApplicationManagementException { ClaimConfig claimConfiguration = new ClaimConfig(); if (idpClaims != null && idpClaims.size() > 0) { List<Claim> idPClaimList = new ArrayList<Claim>(); for (Iterator<String> iterator = idpClaims.iterator(); iterator.hasNext(); ) { String claimUri = iterator.next(); Claim idpClaim = new Claim(); idpClaim.setClaimUri(claimUri); idPClaimList.add(idpClaim); } claimConfiguration.setIdpClaims(idPClaimList.toArray(new Claim[idPClaimList.size()])); } claimConfiguration.setUserClaimURI(paramMap.get("user_id_claim_dropdown")); claimConfiguration.setRoleClaimURI(paramMap.get("role_claim_dropdown")); ClaimConfig claimConfigurationUpdated = claimMappingFromUI(claimConfiguration, paramMap); fedIdp.setClaimConfig(claimConfigurationUpdated); }
for (org.wso2.carbon.identity.application.common.model.idp.xsd.IdentityProvider dto : idpDTOs) { TrustedIdP idp = new TrustedIdP(); idp.setName(dto.getIdentityProviderName()); idps.add(idp);
fedIdp.setIdentityProviderName(paramMap.get("idPName")); fedIdp.setDisplayName(paramMap.get("idpDisplayName")); fedIdp.setEnable(true); } else { fedIdp.setEnable(false); fedIdp.setIdentityProviderDescription(paramMap.get("idPDescription")); fedIdp.setFederationHub(true); } else { fedIdp.setFederationHub(false); fedIdp.setHomeRealmId(paramMap.get("realmId")); fedIdp.setAlias(paramMap.get("tokenEndpointAlias")); fedIdp.setCertificate(certFile); jwksProperty.setValue(jwksUri); jwksProperty.setDisplayName("Identity Provider's JWKS Endpoint"); fedIdp.addIdpProperties(jwksProperty);
fedIdp.setDefaultAuthenticatorConfig(customConfig); .getFederatedAuthenticatorConfigs(); fedIdp.setFederatedAuthenticatorConfigs(fedAuthConfigList); } else { fedIdp.setFederatedAuthenticatorConfigs(concatArrays(fedAuthConfigList, authenticators));
fedIdp.setDefaultProvisioningConnectorConfig(customConfig); ProvisioningConnectorConfig[] provConnectors = fedIdp.getProvisioningConnectorConfigs(); fedIdp.setProvisioningConnectorConfigs(proConfigConnList); } else { fedIdp.setProvisioningConnectorConfigs(concatArrays(proConfigConnList, provConnectors));
/** * @param fedIdp * @param paramMap * @throws IdentityApplicationManagementException */ private static void buildClaimConfiguration(IdentityProvider fedIdp, Map<String, String> paramMap, List<String> idpClaims, ClaimMapping[] currentClaimMapping) throws IdentityApplicationManagementException { ClaimConfig claimConfiguration = new ClaimConfig(); if (idpClaims != null && idpClaims.size() > 0) { List<Claim> idPClaimList = new ArrayList<Claim>(); for (Iterator<String> iterator = idpClaims.iterator(); iterator.hasNext(); ) { String claimUri = iterator.next(); Claim idpClaim = new Claim(); idpClaim.setClaimUri(claimUri); idPClaimList.add(idpClaim); } claimConfiguration.setIdpClaims(idPClaimList.toArray(new Claim[idPClaimList.size()])); } claimConfiguration.setUserClaimURI(paramMap.get("user_id_claim_dropdown")); claimConfiguration.setRoleClaimURI(paramMap.get("role_claim_dropdown")); ClaimConfig claimConfigurationUpdated = claimMappingFromUI(claimConfiguration, paramMap); fedIdp.setClaimConfig(claimConfigurationUpdated); }
fedIdp.setIdentityProviderName(paramMap.get("idPName")); fedIdp.setDisplayName(paramMap.get("idpDisplayName")); fedIdp.setEnable(true); } else { fedIdp.setEnable(false); fedIdp.setIdentityProviderDescription(paramMap.get("idPDescription")); fedIdp.setFederationHub(true); } else { fedIdp.setFederationHub(false); fedIdp.setHomeRealmId(paramMap.get("realmId")); fedIdp.setAlias(paramMap.get("tokenEndpointAlias")); fedIdp.setCertificate(certFile); jwksProperty.setValue(jwksUri); jwksProperty.setDisplayName("Identity Provider's JWKS Endpoint"); fedIdp.addIdpProperties(jwksProperty);
fedIdp.setDefaultAuthenticatorConfig(customConfig); .getFederatedAuthenticatorConfigs(); fedIdp.setFederatedAuthenticatorConfigs(fedAuthConfigList); } else { fedIdp.setFederatedAuthenticatorConfigs(concatArrays(fedAuthConfigList, authenticators));
fedIdp.setDefaultProvisioningConnectorConfig(customConfig); ProvisioningConnectorConfig[] provConnectors = fedIdp.getProvisioningConnectorConfigs(); fedIdp.setProvisioningConnectorConfigs(proConfigConnList); } else { fedIdp.setProvisioningConnectorConfigs(concatArrays(proConfigConnList, provConnectors));
IdentityProvider fedIdp = new IdentityProvider(); oldIdpName.append(oldIdentityProvider.getIdentityProviderName()); if (oldIdentityProvider != null && oldIdentityProvider.getCertificate() != null) { if (oldIdentityProvider.getCertificateInfoArray() != null && oldIdentityProvider. getCertificateInfoArray().length > 1) { if (log.isDebugEnabled()) { log.debug("Number of old certificate for the identity provider " + oldIdentityProvider.getDisplayName() + " is " + oldIdentityProvider. getCertificateInfoArray().length); for (CertificateInfo certificateInfo : oldIdentityProvider.getCertificateInfoArray()) { multipleCertificate.append(new String(Base64.decode(certificateInfo.getCertValue()))); paramMap.put(IdentityApplicationConstants.OLD_CERT_FILE, oldIdentityProvider.getCertificate()); && oldIdentityProvider.getProvisioningConnectorConfigs() != null) { .getProvisioningConnectorConfigs(); for (ProvisioningConnectorConfig provisioningConnector : provisioningConnectorConfig) { if (("googleapps").equals(provisioningConnector.getName())) { && oldIdentityProvider.getClaimConfig().getClaimMappings() != null) { buildClaimConfiguration(fedIdp, paramMap, idpClaims, oldIdentityProvider .getClaimConfig().getClaimMappings()); } else { buildClaimConfiguration(fedIdp, paramMap, idpClaims, null);
/** * @param fedIdp * @param paramMap * @throws IdentityApplicationManagementException */ private static void buildClaimConfiguration(IdentityProvider fedIdp, Map<String, String> paramMap, List<String> idpClaims, ClaimMapping[] currentClaimMapping) throws IdentityApplicationManagementException { ClaimConfig claimConfiguration = new ClaimConfig(); if (idpClaims != null && idpClaims.size() > 0) { List<Claim> idPClaimList = new ArrayList<Claim>(); for (Iterator<String> iterator = idpClaims.iterator(); iterator.hasNext(); ) { String claimUri = iterator.next(); Claim idpClaim = new Claim(); idpClaim.setClaimUri(claimUri); idPClaimList.add(idpClaim); } claimConfiguration.setIdpClaims(idPClaimList.toArray(new Claim[idPClaimList.size()])); } claimConfiguration.setUserClaimURI(paramMap.get("user_id_claim_dropdown")); claimConfiguration.setRoleClaimURI(paramMap.get("role_claim_dropdown")); ClaimConfig claimConfigurationUpdated = claimMappingFromUI(claimConfiguration, paramMap); fedIdp.setClaimConfig(claimConfigurationUpdated); }
fedIdp.setDefaultAuthenticatorConfig(openIdAuthnConfig); FederatedAuthenticatorConfig[] authenticators = fedIdp.getFederatedAuthenticatorConfigs(); if (paramMap.get("openIdUrl") != null && !"".equals(paramMap.get("openIdUrl"))) { fedIdp.setFederatedAuthenticatorConfigs(new FederatedAuthenticatorConfig[]{openIdAuthnConfig}); } else { fedIdp.setFederatedAuthenticatorConfigs(concatArrays( new FederatedAuthenticatorConfig[]{openIdAuthnConfig}, authenticators));
fedIdp.setDefaultProvisioningConnectorConfig(proConnector); ProvisioningConnectorConfig[] proConnectors = fedIdp.getProvisioningConnectorConfigs(); fedIdp.setProvisioningConnectorConfigs((new ProvisioningConnectorConfig[]{proConnector})); } else { fedIdp.setProvisioningConnectorConfigs(concatArrays( new ProvisioningConnectorConfig[]{proConnector}, proConnectors));
fedIdp.setDefaultAuthenticatorConfig(openIdAuthnConfig); FederatedAuthenticatorConfig[] authenticators = fedIdp.getFederatedAuthenticatorConfigs(); if (paramMap.get("openIdUrl") != null && !"".equals(paramMap.get("openIdUrl"))) { fedIdp.setFederatedAuthenticatorConfigs(new FederatedAuthenticatorConfig[]{openIdAuthnConfig}); } else { fedIdp.setFederatedAuthenticatorConfigs(concatArrays( new FederatedAuthenticatorConfig[]{openIdAuthnConfig}, authenticators));