public JwtClaims getJwtClaims() { return getJwtToken().getClaims(); } public JwtToken getJwtToken() {
public JwtClaims getJwtClaims() { return getJwtToken().getClaims(); } public JwtToken getJwtToken() {
public JweJwtCompactProducer(JwtToken token) { this(new JweHeaders(token.getJweHeaders()), token.getClaims()); } public JweJwtCompactProducer(JwtClaims claims) {
public JweJwtCompactProducer(JwtToken token) { this(new JweHeaders(token.getJweHeaders()), token.getClaims()); } public JweJwtCompactProducer(JwtClaims claims) {
private IdToken getIdTokenFromJwt(JwtToken jwt) { return new IdToken(jwt.getClaims().asMap()); } public void setRequireAccessTokenHash(boolean require) {
private IdToken getIdTokenFromJwt(JwtToken jwt) { return new IdToken(jwt.getClaims().asMap()); } public void setRequireAccessTokenHash(boolean require) {
public AccessTokenValidation validateAccessToken(MessageContext mc, String authScheme, String authSchemeData, MultivaluedMap<String, String> extraProps) throws OAuthServiceException { try { JwtToken token = super.getJwtToken(authSchemeData); return convertClaimsToValidation(token.getClaims()); } catch (Exception ex) { throw new OAuthServiceException(ex); } }
protected JwsJwtCompactProducer(JwtToken token, JsonMapObjectReaderWriter w) { super(new JwsHeaders(token.getJwsHeaders()), w, JwtUtils.claimsToJson(token.getClaims(), w)); }
public UserInfo getUserInfoFromJwt(JwtToken jwt, IdToken idToken, Consumer client) { UserInfo profile = new UserInfo(jwt.getClaims().asMap()); validateUserInfo(profile, idToken, client); return profile; } public JwtToken getUserInfoJwt(String profileJwtToken, Consumer client) {
public AccessTokenValidation validateAccessToken(MessageContext mc, String authScheme, String authSchemeData, MultivaluedMap<String, String> extraProps) throws OAuthServiceException { try { JwtToken token = super.getJwtToken(authSchemeData); return convertClaimsToValidation(token.getClaims()); } catch (Exception ex) { throw new OAuthServiceException(ex); } }
public UserInfo getUserInfoFromJwt(JwtToken jwt, IdToken idToken, Consumer client) { UserInfo profile = new UserInfo(jwt.getClaims().asMap()); validateUserInfo(profile, idToken, client); return profile; } public JwtToken getUserInfoJwt(String profileJwtToken, Consumer client) {
protected JwsJwtCompactProducer(JwtToken token, JsonMapObjectReaderWriter w) { super(new JwsHeaders(token.getJwsHeaders()), w, JwtUtils.claimsToJson(token.getClaims(), w)); }
public static void validateAccessTokenHash(String accessToken, JwtToken jwt, boolean required) { if (required) { validateHash(accessToken, (String)jwt.getClaims().getClaim(IdToken.ACCESS_TOKEN_HASH_CLAIM), jwt.getJwsHeaders().getSignatureAlgorithm()); } } public static void validateCodeHash(String code, JwtToken jwt) {
public JwtToken getIdJwtToken(String idJwtToken, Consumer client) { JwtToken jwt = getJwtToken(idJwtToken, client.getClientSecret()); validateJwtClaims(jwt.getClaims(), client.getClientId(), true); return jwt; } private IdToken getIdTokenFromJwt(JwtToken jwt) {
public static void validateCodeHash(String code, JwtToken jwt, boolean required) { if (required) { validateHash(code, (String)jwt.getClaims().getClaim(IdToken.AUTH_CODE_HASH_CLAIM), jwt.getJwsHeaders().getSignatureAlgorithm()); } } private static void validateHash(String value, String theHash, SignatureAlgorithm joseAlgo) {
@Override protected void validateToken(JwtToken jwt) { JwtUtils.validateTokenClaims(jwt.getClaims(), getTtl(), getClockOffset(), isValidateAudience()); }
public static void validateCodeHash(String code, JwtToken jwt, boolean required) { if (required) { validateHash(code, (String)jwt.getClaims().getClaim(IdToken.AUTH_CODE_HASH_CLAIM), jwt.getJwsHeaders().getSignatureAlgorithm()); } } private static void validateHash(String value, String theHash, SignatureAlgorithm joseAlgo) {
public JwtToken getIdJwtToken(String idJwtToken, Consumer client) { JwtToken jwt = getJwtToken(idJwtToken, client.getClientSecret()); validateJwtClaims(jwt.getClaims(), client.getClientId(), true); return jwt; } private IdToken getIdTokenFromJwt(JwtToken jwt) {
public static void validateAccessTokenHash(String accessToken, JwtToken jwt, boolean required) { if (required) { validateHash(accessToken, (String)jwt.getClaims().getClaim(IdToken.ACCESS_TOKEN_HASH_CLAIM), jwt.getJwsHeaders().getSignatureAlgorithm()); } } public static void validateCodeHash(String code, JwtToken jwt) {
protected SecurityContext configureSecurityContext(JwtToken jwt) { Message m = JAXRSUtils.getCurrentMessage(); boolean enableUnsignedJwt = MessageUtils.getContextualBoolean(m, JoseConstants.ENABLE_UNSIGNED_JWT_PRINCIPAL, false); // The token must be signed/verified with a public key to set up the security context, // unless we directly configure otherwise if (jwt.getClaims().getSubject() != null && (isVerifiedWithAPublicKey(jwt) || enableUnsignedJwt)) { return new JwtTokenSecurityContext(jwt, roleClaim); } return null; }