gluu
|
限定公開メンバ関数 | |
JSONObject | headerToJSONObject () throws InvalidJwtException |
JSONObject | payloadToJSONObject () throws JSONException |
非公開変数類 | |
JwtType | type |
SignatureAlgorithm | signatureAlgorithm |
KeyEncryptionAlgorithm | keyEncryptionAlgorithm |
BlockEncryptionAlgorithm | blockEncryptionAlgorithm |
String | keyId |
String | rfp |
String | iat |
String | exp |
String | iss |
String | aud |
String | targetLinkUri |
String | as |
String | jti |
String | atHash |
String | cHash |
JSONObject | additionalClaims |
String | sharedKey |
AbstractCryptoProvider | cryptoProvider |
静的非公開変数類 | |
static final Logger | LOG = Logger.getLogger(JwtState.class) |
|
inline |
|
inline |
|
inline |
|
inline |
|
inlineprivate |
|
inline |
|
inline |
String identifying the authorization server that this request was sent to.
|
inline |
Access Token hash value. Its value is the base64url encoding of the left-most half of the hash of the octets of the ASCII representation of the "access_token" value, where the hash algorithm used is the hash algorithm used in the "alg" parameter of the State Token's JWS header. For instance, if the "alg" is "RS256", hash the "access_token" value with SHA-256, then take the left-most 128 bits and base64url encode them. The "at_hash" value is a case sensitive string. This is REQUIRED if the JWT [RFC7519] state token is being produced by the AS and issued with a "access_token" in the authorization response.
|
inline |
String identifying the client that this state value is intended for.
|
inline |
|
inline |
Code hash value. Its value is the base64url encoding of the left-most half of the hash of the octets of the ASCII representation of the "code" value, where the hash algorithm used is the hash algorithm used in the "alg" header parameter of the State Token's JWS [RFC7515] header. For instance, if the "alg" is "HS512", hash the "code" value with SHA-512, then take the left-most 256 bits and base64url encode them. The "c_hash" value is a case sensitive string. This is REQUIRED if the JWT [RFC7519] state token is being produced by the AS and issued with a "code" in the authorization response.
|
inline |
|
inline |
|
inline |
The expiration time claim identifies the expiration time on or after which the JWT MUST NOT be accepted for processing. The processing of the "exp" claim requires that the current date/time MUST be before the expiration date/time listed in the "exp" claim. Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew. Its value MUST be a number containing an IntDate value.
|
inline |
Timestamp of when this Authorization Request was issued.
|
inline |
String identifying the party that issued this state value.
|
inline |
The "jti" (JWT ID) claim provides a unique identifier for the JWT. The identifier value MUST be assigned in a manner that ensures that there is a negligible probability that the same value will be accidentally assigned to a different data object. The "jti" claim can be used to prevent the JWT from being replayed. The "jti" value is a case-sensitive string.
|
inline |
|
inline |
Identifier of the key used to sign this state token at the issuer. Identifier of the key used to encrypt this JWT state token at the issuer.
|
inline |
String containing a verifiable identifier for the browser session, that cannot be guessed by a third party. The verification of this element by the client protects it from accepting authorization responses generated in response to forged requests generated by third parties.
|
inline |
|
inline |
URI containing the location the user agent is to be redirected to after authorization.
|
inline |
|
inlineprotected |
|
inlineprotected |
|
inline |
|
inline |
String identifying the authorization server that this request was sent to.
as | The authorization server |
|
inline |
Access Token hash value. Its value is the base64url encoding of the left-most half of the hash of the octets of the ASCII representation of the "access_token" value, where the hash algorithm used is the hash algorithm used in the "alg" parameter of the State Token's JWS header. For instance, if the "alg" is "RS256", hash the "access_token" value with SHA-256, then take the left-most 128 bits and base64url encode them. The "at_hash" value is a case sensitive string. This is REQUIRED if the JWT [RFC7519] state token is being produced by the AS and issued with a "access_token" in the authorization response.
atHash | The access token hash value |
|
inline |
String identifying the client that this state value is intended for.
aud | The audience |
|
inline |
|
inline |
Code hash value. Its value is the base64url encoding of the left-most half of the hash of the octets of the ASCII representation of the "code" value, where the hash algorithm used is the hash algorithm used in the "alg" header parameter of the State Token's JWS [RFC7515] header. For instance, if the "alg" is "HS512", hash the "code" value with SHA-512, then take the left-most 256 bits and base64url encode them. The "c_hash" value is a case sensitive string. This is REQUIRED if the JWT [RFC7519] state token is being produced by the AS and issued with a "code" in the authorization response.
cHash | The code hash value |
|
inline |
The expiration time claim identifies the expiration time on or after which the JWT MUST NOT be accepted for processing. The processing of the "exp" claim requires that the current date/time MUST be before the expiration date/time listed in the "exp" claim. Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew. Its value MUST be a number containing an IntDate value.
exp | The expiration time value |
|
inline |
Timestamp of when this Authorization Request was issued.
iat | The Issued at value |
|
inline |
String identifying the party that issued this state value.
iss | The issuer value |
|
inline |
The "jti" (JWT ID) claim provides a unique identifier for the JWT. The identifier value MUST be assigned in a manner that ensures that there is a negligible probability that the same value will be accidentally assigned to a different data object. The "jti" claim can be used to prevent the JWT from being replayed. The "jti" value is a case-sensitive string.
jti | The JWT ID |
|
inline |
|
inline |
Identifier of the key used to sign this state token at the issuer. Identifier of the key used to encrypt this JWT state token at the issuer.
keyId | The key identifier |
|
inline |
String containing a verifiable identifier for the browser session, that cannot be guessed by a third party. The verification of this element by the client protects it from accepting authorization responses generated in response to forged requests generated by third parties.
rfp | The Request Forgery Protection value |
|
inline |
|
inline |
URI containing the location the user agent is to be redirected to after authorization.
targetLinkUri | The target link URI |
|
inline |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
private |
|
staticprivate |
|
private |
|
private |
|
private |
|
private |
|
private |