@Override protected AnyTO getAnyTO(final String key) { return anyObjectDataBinder.getAnyObjectTO(key); }
@Override protected AnyTO getAnyTO(final String key) { return groupDataBinder.getGroupTO(key); }
@Override protected AnyTO getAnyTO(final String key) { return userDataBinder.getUserTO(key); }
@PreAuthorize("hasRole('" + StandardEntitlement.USER_READ + "')") @Transactional(readOnly = true) @Override public UserTO read(final String key) { return binder.returnUserTO(binder.getUserTO(key)); }
@PreAuthorize("isAuthenticated()") @SuppressWarnings("unchecked") public <T extends SchemaTO> T read(final SchemaType schemaType, final String schemaKey) { T read; switch (schemaType) { case VIRTUAL: read = (T) binder.getVirSchemaTO(schemaKey); break; case DERIVED: read = (T) binder.getDerSchemaTO(schemaKey); break; case PLAIN: default: read = (T) binder.getPlainSchemaTO(schemaKey); } return read; }
@PreAuthorize("hasRole('" + StandardEntitlement.DYNREALM_CREATE + "')") public DynRealmTO create(final DynRealmTO dynRealmTO) { return binder.getDynRealmTO(binder.create(dynRealmTO)); }
@PreAuthorize("hasRole('" + StandardEntitlement.APPLICATION_CREATE + "')") public ApplicationTO create(final ApplicationTO applicationTO) { return binder.getApplicationTO(applicationDAO.save(binder.create(applicationTO))); }
@PreAuthorize("hasRole('" + StandardEntitlement.SECURITY_QUESTION_CREATE + "')") public SecurityQuestionTO create(final SecurityQuestionTO securityQuestionTO) { return binder.getSecurityQuestionTO(securityQuestionDAO.save(binder.create(securityQuestionTO))); }
@PreAuthorize("hasRole('" + StandardEntitlement.RELATIONSHIPTYPE_CREATE + "')") public RelationshipTypeTO create(final RelationshipTypeTO relationshipTypeTO) { return binder.getRelationshipTypeTO(relationshipTypeDAO.save(binder.create(relationshipTypeTO))); }
@PreAuthorize("hasRole('" + StandardEntitlement.NOTIFICATION_CREATE + "')") public NotificationTO create(final NotificationTO notificationTO) { return binder.getNotificationTO(notificationDAO.save(binder.create(notificationTO))); }
@PreAuthorize("hasRole('" + StandardEntitlement.CONFIGURATION_LIST + "')") public List<AttrTO> list() { return binder.getConfTO(); }
@PreAuthorize("isAuthenticated() " + "and not(hasRole('" + StandardEntitlement.ANONYMOUS + "')) " + "and not(hasRole('" + StandardEntitlement.MUST_CHANGE_PASSWORD + "'))") public ProvisioningResult<UserTO> selfDelete(final boolean nullPriorityAsync) { UserTO userTO = binder.getAuthenticatedUserTO(); return doDelete(userTO, true, nullPriorityAsync); }
@PreAuthorize("hasRole('" + StandardEntitlement.CONFIGURATION_SET + "')") public void set(final AttrTO value) { confDAO.save(binder.getAttr(value)); }
@Override protected AnyTO getAnyTO(final String key) { return userDataBinder.getUserTO(key); }
@Override protected AnyTO getAnyTO(final String key) { return anyObjectDataBinder.getAnyObjectTO(key); }
@Override protected AnyTO getAnyTO(final String key) { return groupDataBinder.getGroupTO(key); }
@PreAuthorize("hasRole('" + StandardEntitlement.USER_DELETE + "')") @Override public ProvisioningResult<UserTO> delete(final String key, final boolean nullPriorityAsync) { UserTO userTO = binder.getUserTO(key); return doDelete(userTO, false, nullPriorityAsync); }
@Transactional(readOnly = true) @Override public AnyObjectTO read(final String key) { return binder.getAnyObjectTO(key); }
@PreAuthorize("hasRole('" + StandardEntitlement.GROUP_READ + "')") @Transactional(readOnly = true) @Override public GroupTO read(final String key) { return binder.getGroupTO(key); }