Package | Description |
---|---|
org.keycloak.adapters | |
org.keycloak.adapters.authentication | |
org.keycloak.adapters.jaas |
Modifier and Type | Class and Description |
---|---|
protected static class |
AdapterDeploymentContext.DeploymentDelegate
This delegate is used to store temporary, per-request metadata like request resolved URLs.
|
Modifier and Type | Field and Description |
---|---|
protected KeycloakDeployment |
AdapterDeploymentContext.DeploymentDelegate.delegate |
protected KeycloakDeployment |
OAuthRequestAuthenticator.deployment |
protected KeycloakDeployment |
RefreshableKeycloakSecurityContext.deployment |
protected KeycloakDeployment |
BearerTokenRequestAuthenticator.deployment |
protected KeycloakDeployment |
AuthenticatedActionsHandler.deployment |
protected KeycloakDeployment |
AdapterDeploymentContext.deployment |
protected KeycloakDeployment |
KeycloakDeploymentBuilder.deployment |
protected KeycloakDeployment |
RequestAuthenticator.deployment |
protected KeycloakDeployment |
PreAuthActionsHandler.deployment |
Modifier and Type | Method and Description |
---|---|
static KeycloakDeployment |
KeycloakDeploymentBuilder.build(AdapterConfig adapterConfig) |
static KeycloakDeployment |
KeycloakDeploymentBuilder.build(InputStream is) |
KeycloakDeployment |
RefreshableKeycloakSecurityContext.getDeployment() |
protected KeycloakDeployment |
KeycloakDeploymentBuilder.internalBuild(AdapterConfig adapterConfig) |
KeycloakDeployment |
KeycloakConfigResolver.resolve(HttpFacade.Request facade) |
KeycloakDeployment |
AdapterDeploymentContext.resolveDeployment(HttpFacade facade)
For single-tenant deployments, it complements KeycloakDeployment
by resolving a relative Auth Server's URL based on the current request
and, if needed, will lazily resolve the Realm's Public Key.
|
protected KeycloakDeployment |
AdapterDeploymentContext.resolveUrls(KeycloakDeployment deployment,
HttpFacade facade) |
Modifier and Type | Method and Description |
---|---|
static KeycloakPrincipal<RefreshableKeycloakSecurityContext> |
AdapterUtils.createPrincipal(KeycloakDeployment deployment,
RefreshableKeycloakSecurityContext securityContext) |
static KeycloakPrincipal<RefreshableKeycloakSecurityContext> |
CookieTokenStore.getPrincipalFromCookie(KeycloakDeployment deployment,
HttpFacade facade,
AdapterTokenStore tokenStore) |
static String |
AdapterUtils.getPrincipalName(KeycloakDeployment deployment,
AccessToken token) |
static AccessTokenResponse |
ServerRequest.invokeAccessCodeToToken(KeycloakDeployment deployment,
String code,
String redirectUri,
String sessionId) |
static void |
ServerRequest.invokeClientManagementRequest(KeycloakDeployment deployment,
String host,
String endpointUrl) |
static void |
ServerRequest.invokeLogout(KeycloakDeployment deployment,
String refreshToken) |
static AccessTokenResponse |
ServerRequest.invokeRefresh(KeycloakDeployment deployment,
String refreshToken) |
static void |
ServerRequest.invokeRegisterNode(KeycloakDeployment deployment,
String host) |
static void |
ServerRequest.invokeUnregisterNode(KeycloakDeployment deployment,
String host) |
void |
RefreshableKeycloakSecurityContext.logout(KeycloakDeployment deployment) |
void |
AdapterDeploymentContext.resolveRealmKey(KeycloakDeployment deployment) |
protected KeycloakDeployment |
AdapterDeploymentContext.resolveUrls(KeycloakDeployment deployment,
HttpFacade facade) |
protected void |
NodesRegistrationManagement.sendRegistrationEvent(KeycloakDeployment deployment) |
protected boolean |
NodesRegistrationManagement.sendUnregistrationEvent(KeycloakDeployment deployment) |
void |
RefreshableKeycloakSecurityContext.setCurrentRequestInfo(KeycloakDeployment deployment,
AdapterTokenStore tokenStore) |
static void |
CookieTokenStore.setTokenCookie(KeycloakDeployment deployment,
HttpFacade facade,
RefreshableKeycloakSecurityContext session) |
void |
NodesRegistrationManagement.tryRegister(KeycloakDeployment resolvedDeployment) |
Modifier and Type | Method and Description |
---|---|
static ClientCredentialsProvider |
ClientCredentialsProviderUtils.bootstrapClientAuthenticator(KeycloakDeployment deployment) |
void |
ClientIdAndSecretCredentialsProvider.init(KeycloakDeployment deployment,
Object config) |
void |
JWTClientCredentialsProvider.init(KeycloakDeployment deployment,
Object config) |
void |
ClientCredentialsProvider.init(KeycloakDeployment deployment,
Object config)
Called by adapter during deployment of your application.
|
static void |
ClientCredentialsProviderUtils.setClientCredentials(KeycloakDeployment deployment,
org.apache.http.client.methods.HttpPost post,
List<org.apache.http.NameValuePair> formparams)
Don't use directly from your JEE apps to avoid HttpClient linkage errors! Instead use the method
ClientCredentialsProviderUtils.setClientCredentials(KeycloakDeployment, Map, Map) |
void |
ClientIdAndSecretCredentialsProvider.setClientCredentials(KeycloakDeployment deployment,
Map<String,String> requestHeaders,
Map<String,String> formParams) |
static void |
ClientCredentialsProviderUtils.setClientCredentials(KeycloakDeployment deployment,
Map<String,String> requestHeaders,
Map<String,String> formparams)
Use this method when calling backchannel request directly from your application.
|
void |
JWTClientCredentialsProvider.setClientCredentials(KeycloakDeployment deployment,
Map<String,String> requestHeaders,
Map<String,String> formParams) |
void |
ClientCredentialsProvider.setClientCredentials(KeycloakDeployment deployment,
Map<String,String> requestHeaders,
Map<String,String> formParams)
Called every time adapter needs to perform backchannel request
|
Modifier and Type | Field and Description |
---|---|
protected KeycloakDeployment |
AbstractKeycloakLoginModule.deployment |
Modifier and Type | Method and Description |
---|---|
protected KeycloakDeployment |
AbstractKeycloakLoginModule.resolveDeployment(String keycloakConfigFile) |
Copyright © 2015 JBoss by Red Hat. All rights reserved.