public void refreshAuth(final String username) { try { Pair<Map<String, Set<String>>, UserTO> self = client.self(); auth = self.getLeft(); selfTO = self.getRight(); roles = null; } catch (ForbiddenException e) { LOG.warn("Could not read self(), probably in a {} scenario", StandardEntitlement.MUST_CHANGE_PASSWORD, e); selfTO = new UserTO(); selfTO.setUsername(username); selfTO.setMustChangePassword(true); } }
private void afterAuthentication(final String username) { try { selfTO = client.self().getRight(); } catch (ForbiddenException e) { LOG.warn("Could not read self(), probably in a {} scenario", StandardEntitlement.MUST_CHANGE_PASSWORD, e); selfTO = new UserTO(); selfTO.setUsername(username); selfTO.setMustChangePassword(true); } // bind explicitly this session to have a stateful behavior during http requests, unless session will // expire for every request this.bind(); }
private void afterAuthentication(final String username) { try { selfTO = client.self().getRight(); } catch (ForbiddenException e) { LOG.warn("Could not read self(), probably in a {} scenario", StandardEntitlement.MUST_CHANGE_PASSWORD, e); selfTO = new UserTO(); selfTO.setUsername(username); selfTO.setMustChangePassword(true); } // bind explicitly this session to have a stateful behavior during http requests, unless session will // expire for every request this.bind(); }
@Transactional(readOnly = true) @Override public UserTO getAuthenticatedUserTO() { final UserTO authUserTO; String authUsername = AuthContextUtils.getUsername(); if (anonymousUser.equals(authUsername)) { authUserTO = new UserTO(); authUserTO.setKey(null); authUserTO.setUsername(anonymousUser); } else if (adminUser.equals(authUsername)) { authUserTO = new UserTO(); authUserTO.setKey(null); authUserTO.setUsername(adminUser); } else { User authUser = userDAO.findByUsername(authUsername); authUserTO = getUserTO(authUser, true); } return authUserTO; }
private void setAttribute(final UserTO userTO, final String schema, final String value) { switch (schema) { case "username": userTO.setUsername(value); break; default: userTO.getPlainAttrs().add(new AttrTO.Builder().schema(schema).value(value).build()); } }
@Override public void onClick(final AjaxRequestTarget target, final UserTO ignore) { UserTO clone = SerializationUtils.clone(model.getObject()); clone.setKey(null); clone.setUsername(model.getObject().getUsername() + "_clone"); send(UserDirectoryPanel.this, Broadcast.EXACT, new AjaxWizard.NewItemActionEvent<>(new UserWrapper(clone), target)); }
case "username": if (!values.isEmpty()) { userTO.setUsername(values.get(0));
case "username": if (!values.isEmpty()) { userTO.setUsername(values.get(0));
result.setUsername(userPatch.getUsername().getValue());
((UserTO) anyTO).setUsername(values.isEmpty() || values.get(0) == null ? null : values.get(0).toString());
result.setUsername(userUR.getUsername().getValue());
UserTO userTO = new UserTO(); userTO.setKey(user.getKey()); userTO.setUsername(user.getUsername()); userTO.setPassword(user.getPassword()); userTO.setType(user.getType().getKey());
@Transactional(propagation = Propagation.REQUIRES_NEW) public String create(final SAML2IdPEntity idp, final SAML2LoginResponseTO responseTO, final String nameID) { UserTO userTO = new UserTO(); if (idp.getUserTemplate() != null) { templateUtils.apply(userTO, idp.getUserTemplate()); } List<SAML2IdPActions> actions = getActions(idp); for (SAML2IdPActions action : actions) { userTO = action.beforeCreate(userTO, responseTO); } fill(idp.getKey(), responseTO, userTO); if (userTO.getRealm() == null) { userTO.setRealm(SyncopeConstants.ROOT_REALM); } if (userTO.getUsername() == null) { userTO.setUsername(nameID); } Pair<String, List<PropagationStatus>> created = provisioningManager.create(userTO, false, false); userTO = binder.getUserTO(created.getKey()); for (SAML2IdPActions action : actions) { userTO = action.afterCreate(userTO, responseTO); } return userTO.getUsername(); }
UserCR userCR = (UserCR) anyCR; userTO.setUsername(userCR.getUsername()); userTO.setPassword(userCR.getPassword()); userTO.setSecurityQuestion(userCR.getSecurityQuestion());
@Transactional(propagation = Propagation.REQUIRES_NEW) public String create(final OIDCProvider op, final OIDCLoginResponseTO responseTO, final String email) { UserTO userTO = new UserTO(); if (op.getUserTemplate() != null && op.getUserTemplate().get() != null) { templateUtils.apply(userTO, op.getUserTemplate().get()); } List<OIDCProviderActions> actions = getActions(op); for (OIDCProviderActions action : actions) { userTO = action.beforeCreate(userTO, responseTO); } fill(op, responseTO, userTO); if (userTO.getRealm() == null) { userTO.setRealm(SyncopeConstants.ROOT_REALM); } if (userTO.getUsername() == null) { userTO.setUsername(email); } Pair<String, List<PropagationStatus>> created = provisioningManager.create(userTO, false, false); userTO = binder.getUserTO(created.getKey()); for (OIDCProviderActions action : actions) { userTO = action.afterCreate(userTO, responseTO); } return userTO.getUsername(); }
String evaluated = JexlUtils.evaluate(((UserTO) template).getUsername(), jexlContext); if (StringUtils.isNotBlank(evaluated)) { ((UserTO) anyTO).setUsername(evaluated);
updatedUser.setUsername(originalUser.getUsername());
userTO.setKey(user.getId()); userTO.setPassword(user.getPassword()); userTO.setUsername(user.getUserName());