327                 VelocityContext context = 
new VelocityContext();
   329                 if (trustRelationship.getProfileConfigurations().get(
SHIBBOLETH_SSO) != null) {
   330                         ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(
SHIBBOLETH_SSO);
   331                         context.put(
SHIBBOLETH_SSO + 
"IncludeAttributeStatement", profileConfiguration.isIncludeAttributeStatement());
   332                         context.put(
SHIBBOLETH_SSO + 
"AssertionLifetime", profileConfiguration.getAssertionLifetime());
   333                         context.put(
SHIBBOLETH_SSO + 
"SignResponses", profileConfiguration.getSignResponses());
   334                         context.put(
SHIBBOLETH_SSO + 
"SignAssertions", profileConfiguration.getSignAssertions());
   335                         context.put(
SHIBBOLETH_SSO + 
"SignRequests", profileConfiguration.getSignRequests());
   338                         String certName = trustRelationship.getProfileConfigurations().get(
SHIBBOLETH_SSO).getProfileConfigurationCertFileName();
   339                         if (StringHelper.isNotEmpty(certName)) {
   351                                         .getProfileConfigurationCertFileName();
   352                         if (StringHelper.isNotEmpty(certName)) {
   358                         ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(
SAML1_ATTRIBUTE_QUERY);
   359                         context.put(
SAML1_ATTRIBUTE_QUERY + 
"AssertionLifetime", profileConfiguration.getAssertionLifetime());
   364                         String certName = trustRelationship.getProfileConfigurations().get(
SAML1_ATTRIBUTE_QUERY).getProfileConfigurationCertFileName();
   365                         if (StringHelper.isNotEmpty(certName)) {
   370                 if (trustRelationship.getProfileConfigurations().get(
SAML2_SSO) != null) {
   371                         ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(
SAML2_SSO);
   372                         context.put(
SAML2_SSO + 
"IncludeAttributeStatement", profileConfiguration.isIncludeAttributeStatement());
   373                         context.put(
SAML2_SSO + 
"AssertionLifetime", profileConfiguration.getAssertionLifetime());
   374                         context.put(
SAML2_SSO + 
"AssertionProxyCount", profileConfiguration.getAssertionProxyCount());
   375                         context.put(
SAML2_SSO + 
"SignResponses", profileConfiguration.getSignResponses());
   376                         context.put(
SAML2_SSO + 
"SignAssertions", profileConfiguration.getSignAssertions());
   377                         context.put(
SAML2_SSO + 
"SignRequests", profileConfiguration.getSignRequests());
   378                         context.put(
SAML2_SSO + 
"EncryptNameIds", profileConfiguration.getEncryptNameIds());
   379                         context.put(
SAML2_SSO + 
"EncryptAssertions", profileConfiguration.getEncryptAssertions());
   381                         String certName = trustRelationship.getProfileConfigurations().get(
SAML2_SSO).getProfileConfigurationCertFileName();
   382                         if (StringHelper.isNotEmpty(certName)) {
   383                                 context.put(
SAML2_SSO + 
"SigningCredentialRef", certName);
   396                                         .getProfileConfigurationCertFileName();
   397                         if (StringHelper.isNotEmpty(certName)) {
   403                         ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(
SAML2_ATTRIBUTE_QUERY);
   404                         context.put(
SAML2_ATTRIBUTE_QUERY + 
"AssertionLifetime", profileConfiguration.getAssertionLifetime());
   405                         context.put(
SAML2_ATTRIBUTE_QUERY + 
"AssertionProxyCount", profileConfiguration.getAssertionProxyCount());
   409                         context.put(
SAML2_ATTRIBUTE_QUERY + 
"EncryptAssertions", profileConfiguration.getEncryptAssertions());
   412                         String certName = trustRelationship.getProfileConfigurations().get(
SAML2_ATTRIBUTE_QUERY).getProfileConfigurationCertFileName();
   413                         if (StringHelper.isNotEmpty(certName)) {
   418                 if(! trustRelationship.getProfileConfigurations().isEmpty()){
   419                         trustRelationship.setGluuProfileConfiguration(
new ArrayList<String>());
   421                         for (String profileConfigurationName : trustRelationship.getProfileConfigurations().keySet()) {
   422                                 trustRelationship.getGluuProfileConfiguration().add(
   426                         trustRelationship.setGluuProfileConfiguration(null);
 static final String SAML1_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:56
 
static final String SAML2_SSO
Definition: ProfileConfigurationService.java:57
 
static final String SAML2_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:59
 
void saveCertificate(GluuSAMLTrustRelationship trustRelationship, Map< String, FileUploadWrapper > fileWrappers, String name)
Definition: ProfileConfigurationService.java:431
 
static final String SAML1_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:55
 
static final String SHIBBOLETH_SSO
Definition: ProfileConfigurationService.java:54
 
static final String SAML2_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:58
 
TemplateService templateService
Definition: ProfileConfigurationService.java:65
 
String generateConfFile(String template, VelocityContext context)
Definition: TemplateService.java:51