com.mohiva.play.silhouette.impl.authenticators
The authenticator settings.
The DAO to store the authenticator. Set it to None to use a stateless approach.
The ID generator used to create the authenticator ID.
The clock implementation.
Used to add additional headers to the existing headers.
Used to add additional headers to the existing headers.
The existing headers.
The additional headers to add.
Creates a new authenticator for the specified login info.
Creates a new authenticator for the specified login info.
The login info for which the authenticator should be created.
The request header.
An authenticator.
Removes the authenticator from backing store.
Removes the authenticator from backing store.
The authenticator instance.
The result to manipulate.
The request header.
The manipulated result.
Adds a header with the token as value to the request.
Adds a header with the token as value to the request.
The token to embed.
The request header.
The manipulated request header.
Adds a header with the token as value to the result.
Adds a header with the token as value to the result.
The token to embed.
The result to manipulate.
The request header.
The manipulated result.
Creates a new JWT for the given authenticator and return it.
Creates a new JWT for the given authenticator and return it. If a backing store is defined, then the authenticator will be stored in it.
The authenticator instance.
The request header.
The serialized authenticator value.
A named logger instance.
A named logger instance.
Replaces the JWT header with a new one.
Replaces the JWT header with a new one. If a backing store is defined, the old authenticator will be revoked. After that it isn't possible to use a JWT which was bound to this authenticator.
The authenticator to update.
The result to manipulate.
The request header.
The original or a manipulated result.
Retrieves the authenticator from request.
Retrieves the authenticator from request.
If a backing store is defined, then the authenticator will be validated against it.
The request header.
Some authenticator or None if no authenticator could be found in request.
Serializes the authenticator.
Serializes the authenticator.
The authenticator to serialize.
The serialized authenticator.
Touches an authenticator.
Touches an authenticator.
An authenticator can use sliding window expiration. This means that the authenticator times out after a certain time if it wasn't used. So to mark an authenticator as used it will be touched on every request to a Silhouette action. If an authenticator should not be touched because of the fact that sliding window expiration is disabled, then it should be returned on the right, otherwise it should be returned on the left. An untouched authenticator needn't be updated later by the update method.
The authenticator to touch.
The touched authenticator on the left or the untouched authenticator on the right.
Unserializes the authenticator.
Unserializes the authenticator.
The string representation of the authenticator.
An authenticator on success, otherwise a failure.
Updates the authenticator and embeds a new token in the result.
Updates the authenticator and embeds a new token in the result.
To prevent the creation of a new token on every request, disable the idle timeout setting and this method will not be executed.
The authenticator to update.
The result to manipulate.
The request header.
The original or a manipulated result.
The service that handles the JWT authenticator.
If the authenticator DAO is deactivated then a stateless approach will be used. But note that you will loose the possibility to invalidate a JWT.