@Override public void initializeFromConfig(SecurityNamedServiceConfig config) throws IOException { this.name = config.getName(); adminRoleName = ((SecurityRoleServiceConfig) config).getAdminRoleName(); groupAdminRoleName = ((SecurityRoleServiceConfig) config).getGroupAdminRoleName(); }
public UsernamePasswordAuthenticationProviderConfig( UsernamePasswordAuthenticationProviderConfig other) { super(other); userGroupServiceName = other.getUserGroupServiceName(); }
public boolean isEncryptingUrlParams() { if (this.securityConfig == null) return false; return this.securityConfig.isEncryptingUrlParams(); } /*
public PasswordPolicyConfig(PasswordPolicyConfig other) { super(other); uppercaseRequired = other.isUppercaseRequired(); lowercaseRequired = other.isLowercaseRequired(); digitRequired = other.isDigitRequired(); minLength = other.getMinLength(); maxLength = other.getMaxLength(); }
@Override public void initializeFromConfig(SecurityNamedServiceConfig config) throws IOException { if (config != null) this.name = config.getName(); }
public void validate(PasswordPolicyConfig config) throws SecurityConfigException { if (config.getMinLength() < 0) throw createSecurityException(INVALID_MIN_LENGTH); if (config.getMaxLength() != -1) { if (config.getMinLength() > config.getMaxLength()) throw createSecurityException(INVALID_MAX_LENGTH); } }
public void validateFilterConfig(UsernamePasswordAuthenticationFilterConfig config) throws FilterConfigException { if (isNotEmpty(config.getUsernameParameterName()) == false) { throw createFilterException(FilterConfigException.USER_PARAMETER_NAME_NEEDED); } if (isNotEmpty(config.getPasswordParameterName()) == false) { throw createFilterException(FilterConfigException.PASSWORD_PARAMETER_NAME_NEEDED); } }
public void validateFilterConfig(J2eeAuthenticationBaseFilterConfig config) throws FilterConfigException { validateFilterConfig((PreAuthenticatedUserNameFilterConfig) config); if (config.getRoleSource().equals(J2eeAuthenticationBaseFilterConfig.J2EERoleSource.J2EE)) { checkExistingRoleService(config.getRoleServiceName()); } }
public J2eeRoleServiceConfig(J2eeRoleServiceConfig other) { super(other); adminRoleName = other.getAdminRoleName(); groupAdminRoleName = other.getGroupAdminRoleName(); }
public FileBasedSecurityServiceConfig(FileBasedSecurityServiceConfig other) { super(other); fileName = other.getFileName(); checkInterval = other.getCheckInterval(); }
/** * Returns the current security configuration. * * <p>In order to make changes to the security configuration client code may make changes to * this object directly, but must call {@link #saveSecurityConfig(SecurityManagerConfig)} in * order to persist changes. */ public SecurityManagerConfig getSecurityConfig() { return new SecurityManagerConfig(this.securityConfig); }
public BaseSecurityNamedServiceConfig(BaseSecurityNamedServiceConfig other) { name = other.getName(); className = other.getClassName(); }
private long computeDelay(BruteForcePreventionConfig config) { long min = config.getMinDelaySeconds() * 1000; long max = config.getMaxDelaySeconds() * 1000; return min + (long) ((max - min) * Math.random()); }
public void validateFilterConfig(DigestAuthenticationFilterConfig config) throws FilterConfigException { checkExistingUGService(config.getUserGroupServiceName()); if (config.getNonceValiditySeconds() < 0) throw createFilterException(FilterConfigException.INVALID_SECONDS); }
private BruteForcePreventionConfig getConfig() { BruteForcePreventionConfig config = securityManager.getSecurityConfig().getBruteForcePrevention(); if (config == null) { return BruteForcePreventionConfig.DEFAULT; } else { return config; } }
public void validateFilterConfig(RoleFilterConfig config) throws FilterConfigException { if (isNotEmpty(config.getHttpResponseHeaderAttrForIncludedRoles()) == false) { throw createFilterException(FilterConfigException.HEADER_ATTRIBUTE_NAME_REQUIRED); } if (isNotEmpty(config.getRoleConverterName())) { try { lookupBean(config.getRoleConverterName()); } catch (NoSuchBeanDefinitionException ex) { throw createFilterException( FilterConfigException.UNKNOWN_ROLE_CONVERTER, config.getRoleConverterName()); } } }
@Override public void initializeFromConfig(SecurityNamedServiceConfig config) throws IOException { super.initializeFromConfig(config); SSLFilterConfig sslConfig = (SSLFilterConfig) config; sslPort = sslConfig.getSslPort(); }
public void validateFilterConfig(SecurityInterceptorFilterConfig config) throws FilterConfigException { if (isNotEmpty(config.getSecurityMetadataSource()) == false) throw createFilterException(FilterConfigException.SECURITY_METADATA_SOURCE_NEEDED); try { lookupBean(config.getSecurityMetadataSource()); } catch (NoSuchBeanDefinitionException ex) { throw createFilterException( FilterConfigException.UNKNOWN_SECURITY_METADATA_SOURCE, config.getSecurityMetadataSource()); } }
public void validateFilterConfig(RequestHeaderAuthenticationFilterConfig config) throws FilterConfigException { if (isNotEmpty(config.getPrincipalHeaderAttribute()) == false) throw createFilterException(FilterConfigException.PRINCIPAL_HEADER_ATTRIBUTE_NEEDED); validateFilterConfig((PreAuthenticatedUserNameFilterConfig) config); }
public void validateRemoveNamedService( Class<?> extensionPoint, SecurityNamedServiceConfig config) throws SecurityConfigException { checkServiceName(extensionPoint, config.getName()); }