All Classes and Interfaces

Class
Description
Abstract class that stores the common state for all Realms.
This base class defines the methods that Security Context should exhibit.
This class is part of the interface between J2EE RI and security interceptors.
 
This class provides an optimization for some methods in java.security.AccessController.
 
Defines the behavior for audit manager implementations.
Exception thrown when a Realm is found to be corrupted for some reason.
Exception thrown when a User is found to be corrupted for some reason.
Basic implementation of audit manager.
Base class that should be extended by all classes that wish to provide their own Audit support.
Abstract base class for certificate-based login modules.
Abstract base class for password-based login modules.
Permission for using programmatic login.
Realm wrapper for supporting certificate authentication.
A LoginModule for CertificateRealm can instantiate and pass a AppContextCallback to handle method of the passed CallbackHandler to retrieve the application name information.
Change Admin Password Command Usage: change-admin-password [--user admin_user] [--terse=false] [--echo=false] [--host localhost] [--port 4848|4849] [--secure | -s]
This LoginModule authenticates users with X509 certificates.
This sample LoginModule authenticates users with a password.
This class represents the security context on the client side.
 
 
 
 
This object represents the permission to invoke on a set of CORBA objects that are not EJBs.
Create Audit Module Command Usage: create-audit-module --classname classnme [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--property (name=value) [:name=value]*] [--target target(Default server)] audit_module_name domain.xml element example invalid input: '<'audit-module classname="com.foo.security.Audit" name="AM"> invalid input: '<'/audit-module>
CLI command to create JACC Provider Usage: create-auth-realm --classname realm_class [--terse=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--property (name=value)[:name=value]*] [--echo=false] [--target target(Default server)] auth_realm_name domain.xml element example invalid input: '<'auth-realm name="file" classname="com.sun.enterprise.security.auth.realm.file.FileRealm"> invalid input: '<'/auth-realm> Or invalid input: '<'auth-realm name="certificate" classname="com.sun.enterprise.security.auth.realm.certificate.CertificateRealm"> invalid input: '<'/auth-realm>
Create File User Command Usage: create-file-user [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--userpassword admin_passwd] [--passwordfile file_name] [--groups user_groups[:user_groups]*] [--authrealmname authrealm_name] [--target target(Default server)] username
Create Jacc Provider Command Usage: create-jacc-provider --policyconfigfactoryclass pc_factory_class --policyproviderclass pol_provider_class [--help] [--user admin_user] [--passwordfile file_name] [ --property (name=value)[:name=value]*] [ --target target_name] jacc_provider_name domain.xml element example invalid input: '<'jacc-provider policy-provider="org.glassfish.exousia.modules.locked.SimplePolicyProvider" name="default" policy-configuration-factory-provider="org.glassfish.exousia.modules.locked.SimplePolicyConfigurationFactory"> invalid input: '<'/jacc-provider>
Create Message Security Provider Command Usage: create-message-security-provider [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Default server)] [--layer message_layer=SOAP] [--providertype provider_type] [--requestauthsource request_auth_source] [--requestauthrecipient request_auth_recipient] [--responseauthsource response_auth_source] [--responseauthrecipient response_auth_recipient] [--isdefaultprovider] [--property (name=value)[:name=value]*] --classname provider_class provider_name domain.xml element example invalid input: '<'message-security-config auth-layer="SOAP"> invalid input: '<'provider-config class-name="com.sun.wss.provider.ClientSecAuthModule" provider-id="XWS_ClientProvider" provider-type= "client"> invalid input: '<'request-policy auth-source="content"/> invalid input: '<'response-policy auth-source="content"/> invalid input: '<'/provider-config> invalid input: '<'/message-security-config>
Create Password Alias Command Usage: create-password-alias [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] aliasname Result of the command is that: invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file gets appended with the entry of the form: aliasname= A user can use this aliased password now in setting passwords in domain.xml.
Custom socket factory for ldaps (SSL).
Delete Audit Module Command Usage: delete-audit-module [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Default server)] auth_realm_name
Delete Auth Realm Command Usage: delete-auth-realm [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Default server)] auth_realm_name
Delete File User Command Usage: delete-file-user [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--authrealmname authrealm_name] [--target target(Default server)] username
Usage: delete-jacc-provider [--help] [--user admin_user] [--passwordfile file_name] [ --target target_name] jacc_provider_name
Delete Message Security Provider Command Usage: delete-message-security-provider --layer message_layer [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--target target(Defaultserver)] provider_name
Delete Password Alias Command Usage: delete-password-alias [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] aliasname Result of the command is that: The entry of the form: aliasname=invalid input: '<'password-encrypted-with-masterpassword> in invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file is removed domain.xml example entry is: invalid input: '<'provider-config class-name="com.sun.xml.wss.provider.ClientSecurityAuthModule" provider-id="XWS_ClientProvider" provider-type ="client"> invalid input: '<'property name="password" value="${ALIAS=myalias}/> invalid input: '<'/provider-config>
Interface to Digest algorithm parameters
 
Adjusts the DAS configuration to turn off secure admin, as if by executing these commands:
 
 
Utility contact to copy the security related config files from the passed non-embedded instanceDir to the embedded server instance's config.
 
Utility file to copy the security related config files from the passed non-embedded instanceDir to the embedded server instance's config.
Records that secure admin is to be used and adjusts each admin listener configuration in the domain to use secure admin.
File realm login module.
Realm implementation for supporting file password authentication.
Represents a FileRealm user.
 
 
 
Implementations of this interface provide operations to Add, Update or Remove user data (called user management) that is used for authentication when using GlassFish native identity stores (the LoginModule.
Implementations of this interface provide access to Get user data useful for authentication purposes.
 
Exception thrown when an operation is requested to remove a group that has a list of users.
A group of principals.
This class implements the GSSAPI exported name functionality as required by CSIV2.
 
 
An implementation of a LoginDialog that presents a swing based GUI for querying username and password.
General exception class for iAS security failures.
Exception thrown when an operation is invoked on a realm that does not support it.
This is an remote interface provided to the RealmManager This allows the realms to be updated while the server is running.
This a J2EE specific Key Manager class that is used to select user certificates for SSL client authentication.
Represents the Key(username+realmname+passwd) to be used in the Digest calculation.
GlassFish JAAS LoginModule for an LDAP Realm.
Realm wrapper for supporting LDAP authentication.
List Audit Modules Command Usage: list-audit-modules [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [target(Default server)]
List Auth Realms Command Usage: list-auth-realms [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [target(Default server)]
List File GroupsCommand Usage: list-file-groups [--terse={true|false}][ --echo={true|false} ] [ --interactive={true|false} ] [--host host] [--port port] [--secure| -s ] [--user admin_user] [--passwordfile filename] [--help] [--name username] [--authrealmname auth_realm_name] [ target]
List File Users Command Usage: list-file-users [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--authrealmname authrealm_name] [target(Default server)]
Usage: list-jacc-providers [--help] [--user admin_user] [--passwordfile file_name] [target(Default server)]
List Message Security Providers Command Usage: list-message-security-providers [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--layer message_layer] [target(Default server)]
List Password Aliases Command Usage: list-password-aliases [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] Result of the command is that: invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file gets appended with the entry of the form: aliasname= A user can use this aliased password now in setting passwords in domin.xml.
author - Nithya Subramanian Usage: list-supported-cipher-suites [--help] [--user admin_user] [--passwordfile file_name] [target_name(default server)]
This is the default callback handler provided by the application client container.
This class is kept for CTS.
This class is invoked implicitly by the server to log in the user information that was sent on the wire by the client.
LoginManager needs implementations of this class for accessing the username and passwords.
LoginException is thrown by the LoginContext class whenever the following happens: If the client is unable to authenticate successfully with the
Interface representing nested DigestAlgorithm parameter values
Exception thrown when an operation is requested on a realm which does not exist.
Exception thrown when an operation is requested on a user which does not exist.
represents plain text password and pre hashed(username+realmname+password) password.
This class holds the user password for the shared password realm and the realm name.
Loads the Default Policy File into the system.
Factory for Group and Principal instances.
javadoc
RealmConfig usable by standalone : Admin CLI for creating Realms It has a subset of functionality defined in com.sun.enterprise.security.RealmConfig
 
 
 
 
Provides common behavior for the enable and disable secure admin commands.
Tracks changes to secure admin configuration, basically so it can report restart-required.
Upgrades older config to current.
Various utility methods which support secure admin operations.
Starting in GlassFish 3.1.2, the DAS uses SSL to send admin requests to instances regardless of whether the user has enabled secure admin.
Common logic for formal upgrade (i.e., start-domain --upgrade) and silent upgrade (starting a newer version of GlassFish using an older version's domain.xml).
 
 
A subject is used a container for passing the security context information in the service context field.
This class that extends AbstractSecurityContext that gets stored in Thread Local Storage.
Acts as a security context proxy
This class extends default implementation of ServerLifecycle interface.
 
This interface is used by the Container to manage access to EJBs.
 
 
 
The only thing that needs to added Extra for SecurityService migration is the addition of the new JACC provider.
This is the default callback handler provided by the application client container.
Solaris realm login module.
Realm wrapper for supporting Solaris authentication.
Handy class containing static functions.
This implementation of LoginDialog If these are not set, then it queries the user in the command window.
 
Update File User Command Usage: update-file-user [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] [--userpassword admin_passwd] [--groups user_groups[:user_groups]*] [--authrealmname authrealm_name] [--target target(Default server)] username
Update Password Alias Command Usage: update-password-alias [--terse=false] [--echo=false] [--interactive=true] [--host localhost] [--port 4848|4849] [--secure | -s] [--user admin_user] [--passwordfile file_name] aliasname Result of the command is that: the entry of the form: aliasname=invalid input: '<'password-encrypted-with-masterpassword> in invalid input: '<'domain-dir>/invalid input: '<'domain-name>/config/domain-passwords file gets updated with the new alias password domain.xml example entry is: invalid input: '<'provider-config class-name="com.sun.xml.wss.provider.ClientSecurityAuthModule" provider-id="XWS_ClientProvider" provider-type ="client"> invalid input: '<'property name="password" value="${ALIAS=myalias}/> invalid input: '<'/provider-config>
All users are principals ...
This class is used to share information between either of the following scenarios 1.
 
 
 
This class holds the user certificate for the certificate realm and the realm name.