keycloak-service
公開メンバ関数 | 静的公開変数類 | 限定公開変数類 | 非公開メンバ関数 | 静的非公開変数類 | 全メンバ一覧
org.keycloak.services.resources.admin.permissions.ClientPermissions クラス
org.keycloak.services.resources.admin.permissions.ClientPermissions の継承関係図
Inheritance graph
org.keycloak.services.resources.admin.permissions.ClientPermissions 連携図
Collaboration graph

公開メンバ関数

 ClientPermissions (KeycloakSession session, RealmModel realm, AuthorizationProvider authz, MgmtPermissions root)
 
boolean isPermissionsEnabled (ClientModel client)
 
void setPermissionsEnabled (ClientModel client, boolean enable)
 
boolean canList ()
 
void requireList ()
 
boolean canListClientScopes ()
 
void requireListClientScopes ()
 
boolean canManageClientsDefault ()
 
boolean canViewClientDefault ()
 
boolean canManage ()
 
void requireManage ()
 
boolean canView ()
 
void requireView ()
 
Resource resource (ClientModel client)
 
Map< String, String > getPermissions (ClientModel client)
 
boolean canExchangeTo (ClientModel authorizedClient, ClientModel to)
 
boolean canManage (ClientModel client)
 
boolean canConfigure (ClientModel client)
 
void requireConfigure (ClientModel client)
 
void requireManage (ClientModel client)
 
boolean canView (ClientModel client)
 
void requireView (ClientModel client)
 
boolean canViewClientScopes ()
 
boolean canManageClientScopes ()
 
void requireManageClientScopes ()
 
void requireViewClientScopes ()
 
boolean canManage (ClientScopeModel clientScope)
 
void requireManage (ClientScopeModel clientScope)
 
boolean canView (ClientScopeModel clientScope)
 
void requireView (ClientScopeModel clientScope)
 
boolean canMapRoles (ClientModel client)
 
Policy exchangeToPermission (ClientModel client)
 
Policy mapRolesPermission (ClientModel client)
 
Policy mapRolesClientScopePermission (ClientModel client)
 
Policy mapRolesCompositePermission (ClientModel client)
 
Policy managePermission (ClientModel client)
 
Policy configurePermission (ClientModel client)
 
Policy viewPermission (ClientModel client)
 
ResourceServer resourceServer (ClientModel client)
 
boolean canMapCompositeRoles (ClientModel client)
 
boolean canMapClientScopeRoles (ClientModel client)
 
Map< String, Boolean > getAccess (ClientModel client)
 

静的公開変数類

static final String MAP_ROLES_SCOPE = "map-roles"
 
static final String MAP_ROLES_CLIENT_SCOPE = "map-roles-client-scope"
 
static final String MAP_ROLES_COMPOSITE_SCOPE = "map-roles-composite"
 
static final String CONFIGURE_SCOPE = "configure"
 

限定公開変数類

final KeycloakSession session
 
final RealmModel realm
 
final AuthorizationProvider authz
 
final MgmtPermissions root
 

非公開メンバ関数

String getResourceName (ClientModel client)
 
String getManagePermissionName (ClientModel client)
 
String getConfigurePermissionName (ClientModel client)
 
String getViewPermissionName (ClientModel client)
 
String getMapRolesPermissionName (ClientModel client)
 
String getMapRolesClientScopePermissionName (ClientModel client)
 
String getMapRolesCompositePermissionName (ClientModel client)
 
String getExchangeToPermissionName (ClientModel client)
 
void initialize (ClientModel client)
 
void deletePolicy (String name, ResourceServer server)
 
void deletePermissions (ClientModel client)
 
Scope manageScope (ResourceServer server)
 
Scope exchangeToScope (ResourceServer server)
 
Scope configureScope (ResourceServer server)
 
Scope viewScope (ResourceServer server)
 
Scope mapRolesScope (ResourceServer server)
 
boolean hasView (ClientModel client)
 

静的非公開変数類

static final Logger logger = Logger.getLogger(ClientPermissions.class)
 

詳解

Manages default policies for all users.

著者
Bill Burke
バージョン
Revision
1

構築子と解体子

◆ ClientPermissions()

org.keycloak.services.resources.admin.permissions.ClientPermissions.ClientPermissions ( KeycloakSession  session,
RealmModel  realm,
AuthorizationProvider  authz,
MgmtPermissions  root 
)
inline
60  {
61  this.session = session;
62  this.realm = realm;
63  this.authz = authz;
64  this.root = root;
65  }
final KeycloakSession session
Definition: ClientPermissions.java:55
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
final MgmtPermissions root
Definition: ClientPermissions.java:58
final RealmModel realm
Definition: ClientPermissions.java:56

関数詳解

◆ canConfigure()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canConfigure ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

383  {
384  if (canManage(client)) return true;
385  if (!root.isAdminSameRealm()) {
386  return false;
387  }
388 
389  ResourceServer server = resourceServer(client);
390  if (server == null) return false;
391 
392  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());
393  if (resource == null) return false;
394 
395  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(getConfigurePermissionName(client), server.getId());
396  if (policy == null) {
397  return false;
398  }
399 
400  Set<Policy> associatedPolicies = policy.getAssociatedPolicies();
401  // if no policies attached to permission then just do default behavior
402  if (associatedPolicies == null || associatedPolicies.isEmpty()) {
403  return false;
404  }
405 
406  Scope scope = configureScope(server);
407  return root.evaluatePermission(resource, scope, server);
408  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
boolean isAdminSameRealm()
Definition: MgmtPermissions.java:178
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
boolean evaluatePermission(Resource resource, Scope scope, ResourceServer resourceServer)
Definition: MgmtPermissions.java:316
final MgmtPermissions root
Definition: ClientPermissions.java:58
boolean canManage()
Definition: ClientPermissions.java:256
Scope configureScope(ResourceServer server)
Definition: ClientPermissions.java:214
String getConfigurePermissionName(ClientModel client)
Definition: ClientPermissions.java:74

◆ canExchangeTo()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canExchangeTo ( ClientModel  authorizedClient,
ClientModel  to 
)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

302  {
303 
304  if (!authorizedClient.equals(to)) {
305  ResourceServer server = resourceServer(to);
306  if (server == null) {
307  logger.debug("No resource server set up for target client");
308  return false;
309  }
310 
311  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(to), server.getId());
312  if (resource == null) {
313  logger.debug("No resource object set up for target client");
314  return false;
315  }
316 
317  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(getExchangeToPermissionName(to), server.getId());
318  if (policy == null) {
319  logger.debug("No permission object set up for target client");
320  return false;
321  }
322 
323  Set<Policy> associatedPolicies = policy.getAssociatedPolicies();
324  // if no policies attached to permission then just do default behavior
325  if (associatedPolicies == null || associatedPolicies.isEmpty()) {
326  logger.debug("No policies set up for permission on target client");
327  return false;
328  }
329 
330  Scope scope = exchangeToScope(server);
331  if (scope == null) {
332  logger.debug(TOKEN_EXCHANGE + " not initialized");
333  return false;
334  }
335  ClientModelIdentity identity = new ClientModelIdentity(session, authorizedClient);
336  EvaluationContext context = new DefaultEvaluationContext(identity, session) {
337  @Override
338  public Map<String, Collection<String>> getBaseAttributes() {
339  Map<String, Collection<String>> attributes = super.getBaseAttributes();
340  attributes.put("kc.client.id", Arrays.asList(authorizedClient.getClientId()));
341  return attributes;
342  }
343 
344  };
345  return root.evaluatePermission(resource, scope, server, context);
346  }
347  return true;
348  }
final KeycloakSession session
Definition: ClientPermissions.java:55
static final Logger logger
Definition: ClientPermissions.java:54
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
String getExchangeToPermissionName(ClientModel client)
Definition: ClientPermissions.java:90
Scope exchangeToScope(ResourceServer server)
Definition: ClientPermissions.java:210
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
boolean evaluatePermission(Resource resource, Scope scope, ResourceServer resourceServer)
Definition: MgmtPermissions.java:316
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canList()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canList ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

226  {
227  return root.hasAnyAdminRole();
228  }
boolean hasAnyAdminRole()
Definition: MgmtPermissions.java:147
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canListClientScopes()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canListClientScopes ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

238  {
239  return root.hasAnyAdminRole();
240  }
boolean hasAnyAdminRole()
Definition: MgmtPermissions.java:147
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canManage() [1/3]

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canManage ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

256  {
257  return canManageClientsDefault();
258  }
boolean canManageClientsDefault()
Definition: ClientPermissions.java:248

◆ canManage() [2/3]

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canManage ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

355  {
356  if (canManageClientsDefault()) return true;
357  if (!root.isAdminSameRealm()) {
358  return false;
359  }
360 
361  ResourceServer server = resourceServer(client);
362  if (server == null) return false;
363 
364  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());
365  if (resource == null) return false;
366 
367  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(getManagePermissionName(client), server.getId());
368  if (policy == null) {
369  return false;
370  }
371 
372  Set<Policy> associatedPolicies = policy.getAssociatedPolicies();
373  // if no policies attached to permission then just do default behavior
374  if (associatedPolicies == null || associatedPolicies.isEmpty()) {
375  return false;
376  }
377 
378  Scope scope = manageScope(server);
379  return root.evaluatePermission(resource, scope, server);
380  }
boolean canManageClientsDefault()
Definition: ClientPermissions.java:248
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
Scope manageScope(ResourceServer server)
Definition: ClientPermissions.java:206
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
boolean isAdminSameRealm()
Definition: MgmtPermissions.java:178
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
boolean evaluatePermission(Resource resource, Scope scope, ResourceServer resourceServer)
Definition: MgmtPermissions.java:316
String getManagePermissionName(ClientModel client)
Definition: ClientPermissions.java:71
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canManage() [3/3]

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canManage ( ClientScopeModel  clientScope)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

489  {
490  return canManageClientsDefault();
491  }
boolean canManageClientsDefault()
Definition: ClientPermissions.java:248

◆ canManageClientScopes()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canManageClientScopes ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

471  {
472  return canManageClientsDefault();
473  }
boolean canManageClientsDefault()
Definition: ClientPermissions.java:248

◆ canManageClientsDefault()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canManageClientsDefault ( )
inline
248  {
249  return root.hasOneAdminRole(AdminRoles.MANAGE_CLIENTS);
250  }
boolean hasOneAdminRole(String... adminRoles)
Definition: MgmtPermissions.java:155
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canMapClientScopeRoles()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canMapClientScopeRoles ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

612  {
613  ResourceServer server = resourceServer(client);
614  if (server == null) return false;
615 
616  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());
617  if (resource == null) return false;
618 
619  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(getMapRolesClientScopePermissionName(client), server.getId());
620  if (policy == null) {
621  return false;
622  }
623 
624  Set<Policy> associatedPolicies = policy.getAssociatedPolicies();
625  // if no policies attached to permission then just do default behavior
626  if (associatedPolicies == null || associatedPolicies.isEmpty()) {
627  return false;
628  }
629 
630  Scope scope = authz.getStoreFactory().getScopeStore().findByName(MAP_ROLES_CLIENT_SCOPE, server.getId());
631  return root.evaluatePermission(resource, scope, server);
632  }
static final String MAP_ROLES_CLIENT_SCOPE
Definition: ClientPermissionManagement.java:32
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
boolean evaluatePermission(Resource resource, Scope scope, ResourceServer resourceServer)
Definition: MgmtPermissions.java:316
String getMapRolesClientScopePermissionName(ClientModel client)
Definition: ClientPermissions.java:83
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canMapCompositeRoles()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canMapCompositeRoles ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

590  {
591  ResourceServer server = resourceServer(client);
592  if (server == null) return false;
593 
594  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());
595  if (resource == null) return false;
596 
597  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(getMapRolesCompositePermissionName(client), server.getId());
598  if (policy == null) {
599  return false;
600  }
601 
602  Set<Policy> associatedPolicies = policy.getAssociatedPolicies();
603  // if no policies attached to permission then just do default behavior
604  if (associatedPolicies == null || associatedPolicies.isEmpty()) {
605  return false;
606  }
607 
608  Scope scope = authz.getStoreFactory().getScopeStore().findByName(MAP_ROLES_COMPOSITE_SCOPE, server.getId());
609  return root.evaluatePermission(resource, scope, server);
610  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
static final String MAP_ROLES_COMPOSITE_SCOPE
Definition: ClientPermissionManagement.java:33
String getMapRolesCompositePermissionName(ClientModel client)
Definition: ClientPermissions.java:86
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
boolean evaluatePermission(Resource resource, Scope scope, ResourceServer resourceServer)
Definition: MgmtPermissions.java:316
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canMapRoles()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canMapRoles ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

513  {
514  ResourceServer server = resourceServer(client);
515  if (server == null) return false;
516 
517  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());
518  if (resource == null) return false;
519 
520  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(getMapRolesPermissionName(client), server.getId());
521  if (policy == null) {
522  return false;
523  }
524 
525  Set<Policy> associatedPolicies = policy.getAssociatedPolicies();
526  // if no policies attached to permission then just do default behavior
527  if (associatedPolicies == null || associatedPolicies.isEmpty()) {
528  return false;
529  }
530 
531  Scope scope = mapRolesScope(server);
532  return root.evaluatePermission(resource, scope, server);
533  }
String getMapRolesPermissionName(ClientModel client)
Definition: ClientPermissions.java:80
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
boolean evaluatePermission(Resource resource, Scope scope, ResourceServer resourceServer)
Definition: MgmtPermissions.java:316
Scope mapRolesScope(ResourceServer server)
Definition: ClientPermissions.java:221
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canView() [1/3]

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canView ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

267  {
269  }
boolean canManageClientsDefault()
Definition: ClientPermissions.java:248
boolean canViewClientDefault()
Definition: ClientPermissions.java:251

◆ canView() [2/3]

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canView ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

425  {
426  return hasView(client) || canConfigure(client);
427  }
boolean hasView(ClientModel client)
Definition: ClientPermissions.java:429
boolean canConfigure(ClientModel client)
Definition: ClientPermissions.java:383

◆ canView() [3/3]

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canView ( ClientScopeModel  clientScope)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

501  {
502  return canViewClientDefault();
503  }
boolean canViewClientDefault()
Definition: ClientPermissions.java:251

◆ canViewClientDefault()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canViewClientDefault ( )
inline
251  {
252  return root.hasOneAdminRole(AdminRoles.MANAGE_CLIENTS, AdminRoles.VIEW_CLIENTS);
253  }
boolean hasOneAdminRole(String... adminRoles)
Definition: MgmtPermissions.java:155
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ canViewClientScopes()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.canViewClientScopes ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

466  {
467  return canView();
468  }
boolean canView()
Definition: ClientPermissions.java:267

◆ configurePermission()

Policy org.keycloak.services.resources.admin.permissions.ClientPermissions.configurePermission ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

571  {
572  ResourceServer server = resourceServer(client);
573  if (server == null) return null;
574  return authz.getStoreFactory().getPolicyStore().findByName(getConfigurePermissionName(client), server.getId());
575  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
String getConfigurePermissionName(ClientModel client)
Definition: ClientPermissions.java:74

◆ configureScope()

Scope org.keycloak.services.resources.admin.permissions.ClientPermissions.configureScope ( ResourceServer  server)
inlineprivate
214  {
215  return authz.getStoreFactory().getScopeStore().findByName(CONFIGURE_SCOPE, server.getId());
216  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
static final String CONFIGURE_SCOPE
Definition: ClientPermissionManagement.java:34

◆ deletePermissions()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.deletePermissions ( ClientModel  client)
inlineprivate
173  {
174  ResourceServer server = resourceServer(client);
175  if (server == null) return;
176  deletePolicy(getManagePermissionName(client), server);
177  deletePolicy(getViewPermissionName(client), server);
178  deletePolicy(getMapRolesPermissionName(client), server);
181  deletePolicy(getConfigurePermissionName(client), server);
182  deletePolicy(getExchangeToPermissionName(client), server);
183  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());;
184  if (resource != null) authz.getStoreFactory().getResourceStore().delete(resource.getId());
185  }
String getMapRolesPermissionName(ClientModel client)
Definition: ClientPermissions.java:80
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
String getViewPermissionName(ClientModel client)
Definition: ClientPermissions.java:77
void deletePolicy(String name, ResourceServer server)
Definition: ClientPermissions.java:165
String getExchangeToPermissionName(ClientModel client)
Definition: ClientPermissions.java:90
String getMapRolesCompositePermissionName(ClientModel client)
Definition: ClientPermissions.java:86
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
String getMapRolesClientScopePermissionName(ClientModel client)
Definition: ClientPermissions.java:83
String getManagePermissionName(ClientModel client)
Definition: ClientPermissions.java:71
String getConfigurePermissionName(ClientModel client)
Definition: ClientPermissions.java:74

◆ deletePolicy()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.deletePolicy ( String  name,
ResourceServer  server 
)
inlineprivate
165  {
166  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(name, server.getId());
167  if (policy != null) {
168  authz.getStoreFactory().getPolicyStore().delete(policy.getId());
169  }
170 
171  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57

◆ exchangeToPermission()

Policy org.keycloak.services.resources.admin.permissions.ClientPermissions.exchangeToPermission ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

536  {
537  ResourceServer server = resourceServer(client);
538  if (server == null) return null;
539  return authz.getStoreFactory().getPolicyStore().findByName(getExchangeToPermissionName(client), server.getId());
540  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getExchangeToPermissionName(ClientModel client)
Definition: ClientPermissions.java:90
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585

◆ exchangeToScope()

Scope org.keycloak.services.resources.admin.permissions.ClientPermissions.exchangeToScope ( ResourceServer  server)
inlineprivate
210  {
211  return authz.getStoreFactory().getScopeStore().findByName(TOKEN_EXCHANGE, server.getId());
212  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57

◆ getAccess()

Map<String, Boolean> org.keycloak.services.resources.admin.permissions.ClientPermissions.getAccess ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

635  {
636  Map<String, Boolean> map = new HashMap<>();
637  map.put("view", canView(client));
638  map.put("manage", StorageId.isLocalStorage(client) && canManage(client));
639  map.put("configure", StorageId.isLocalStorage(client) && canConfigure(client));
640  return map;
641  }
boolean canView()
Definition: ClientPermissions.java:267
boolean canConfigure(ClientModel client)
Definition: ClientPermissions.java:383
boolean canManage()
Definition: ClientPermissions.java:256

◆ getConfigurePermissionName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getConfigurePermissionName ( ClientModel  client)
inlineprivate
74  {
75  return "configure.permission.client." + client.getId();
76  }

◆ getExchangeToPermissionName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getExchangeToPermissionName ( ClientModel  client)
inlineprivate
90  {
91  return TOKEN_EXCHANGE + ".permission.client." + client.getId();
92  }

◆ getManagePermissionName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getManagePermissionName ( ClientModel  client)
inlineprivate
71  {
72  return "manage.permission.client." + client.getId();
73  }

◆ getMapRolesClientScopePermissionName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getMapRolesClientScopePermissionName ( ClientModel  client)
inlineprivate
83  {
84  return MAP_ROLES_CLIENT_SCOPE + ".permission.client." + client.getId();
85  }
static final String MAP_ROLES_CLIENT_SCOPE
Definition: ClientPermissionManagement.java:32

◆ getMapRolesCompositePermissionName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getMapRolesCompositePermissionName ( ClientModel  client)
inlineprivate
86  {
87  return MAP_ROLES_COMPOSITE_SCOPE + ".permission.client." + client.getId();
88  }
static final String MAP_ROLES_COMPOSITE_SCOPE
Definition: ClientPermissionManagement.java:33

◆ getMapRolesPermissionName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getMapRolesPermissionName ( ClientModel  client)
inlineprivate
80  {
81  return MAP_ROLES_SCOPE + ".permission.client." + client.getId();
82  }
static final String MAP_ROLES_SCOPE
Definition: ClientPermissionManagement.java:31

◆ getPermissions()

Map<String, String> org.keycloak.services.resources.admin.permissions.ClientPermissions.getPermissions ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

288  {
289  initialize(client);
290  Map<String, String> scopes = new LinkedHashMap<>();
291  scopes.put(AdminPermissionManagement.VIEW_SCOPE, viewPermission(client).getId());
292  scopes.put(AdminPermissionManagement.MANAGE_SCOPE, managePermission(client).getId());
293  scopes.put(CONFIGURE_SCOPE, configurePermission(client).getId());
294  scopes.put(MAP_ROLES_SCOPE, mapRolesPermission(client).getId());
295  scopes.put(MAP_ROLES_CLIENT_SCOPE, mapRolesClientScopePermission(client).getId());
296  scopes.put(MAP_ROLES_COMPOSITE_SCOPE, mapRolesCompositePermission(client).getId());
297  scopes.put(TOKEN_EXCHANGE, exchangeToPermission(client).getId());
298  return scopes;
299  }
Policy managePermission(ClientModel client)
Definition: ClientPermissions.java:564
static final String MAP_ROLES_CLIENT_SCOPE
Definition: ClientPermissionManagement.java:32
static final String MAP_ROLES_SCOPE
Definition: ClientPermissionManagement.java:31
Policy mapRolesPermission(ClientModel client)
Definition: ClientPermissions.java:543
Policy viewPermission(ClientModel client)
Definition: ClientPermissions.java:578
void initialize(ClientModel client)
Definition: ClientPermissions.java:94
static final String MAP_ROLES_COMPOSITE_SCOPE
Definition: ClientPermissionManagement.java:33
Policy exchangeToPermission(ClientModel client)
Definition: ClientPermissions.java:536
Policy configurePermission(ClientModel client)
Definition: ClientPermissions.java:571
Policy mapRolesClientScopePermission(ClientModel client)
Definition: ClientPermissions.java:550
static final String CONFIGURE_SCOPE
Definition: ClientPermissionManagement.java:34
Policy mapRolesCompositePermission(ClientModel client)
Definition: ClientPermissions.java:557

◆ getResourceName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getResourceName ( ClientModel  client)
inlineprivate
67  {
68  return "client.resource." + client.getId();
69  }

◆ getViewPermissionName()

String org.keycloak.services.resources.admin.permissions.ClientPermissions.getViewPermissionName ( ClientModel  client)
inlineprivate
77  {
78  return "view.permission.client." + client.getId();
79  }

◆ hasView()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.hasView ( ClientModel  client)
inlineprivate
429  {
430  if (canView()) return true;
431  if (!root.isAdminSameRealm()) {
432  return false;
433  }
434 
435  ResourceServer server = resourceServer(client);
436  if (server == null) return false;
437 
438  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());
439  if (resource == null) return false;
440 
441  Policy policy = authz.getStoreFactory().getPolicyStore().findByName(getViewPermissionName(client), server.getId());
442  if (policy == null) {
443  return false;
444  }
445 
446  Set<Policy> associatedPolicies = policy.getAssociatedPolicies();
447  // if no policies attached to permission then just do default behavior
448  if (associatedPolicies == null || associatedPolicies.isEmpty()) {
449  return false;
450  }
451 
452  Scope scope = viewScope(server);
453  return root.evaluatePermission(resource, scope, server);
454  }
Scope viewScope(ResourceServer server)
Definition: ClientPermissions.java:218
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
String getViewPermissionName(ClientModel client)
Definition: ClientPermissions.java:77
boolean canView()
Definition: ClientPermissions.java:267
boolean isAdminSameRealm()
Definition: MgmtPermissions.java:178
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
boolean evaluatePermission(Resource resource, Scope scope, ResourceServer resourceServer)
Definition: MgmtPermissions.java:316
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ initialize()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.initialize ( ClientModel  client)
inlineprivate
94  {
95  ResourceServer server = root.findOrCreateResourceServer(client);
96  Scope manageScope = manageScope(server);
97  if (manageScope == null) {
98  manageScope = authz.getStoreFactory().getScopeStore().create(AdminPermissionManagement.MANAGE_SCOPE, server);
99  }
100  Scope viewScope = viewScope(server);
101  if (viewScope == null) {
102  viewScope = authz.getStoreFactory().getScopeStore().create(AdminPermissionManagement.VIEW_SCOPE, server);
103  }
104  Scope mapRoleScope = mapRolesScope(server);
105  if (mapRoleScope == null) {
106  mapRoleScope = authz.getStoreFactory().getScopeStore().create(MAP_ROLES_SCOPE, server);
107  }
108  Scope mapRoleClientScope = root.initializeScope(MAP_ROLES_CLIENT_SCOPE, server);
109  Scope mapRoleCompositeScope = root.initializeScope(MAP_ROLES_COMPOSITE_SCOPE, server);
111  Scope exchangeToScope = root.initializeScope(TOKEN_EXCHANGE, server);
112 
113  String resourceName = getResourceName(client);
114  Resource resource = authz.getStoreFactory().getResourceStore().findByName(resourceName, server.getId());
115  if (resource == null) {
116  resource = authz.getStoreFactory().getResourceStore().create(resourceName, server, server.getId());
117  resource.setType("Client");
118  Set<Scope> scopeset = new HashSet<>();
119  scopeset.add(configureScope);
120  scopeset.add(manageScope);
121  scopeset.add(viewScope);
122  scopeset.add(mapRoleScope);
123  scopeset.add(mapRoleClientScope);
124  scopeset.add(mapRoleCompositeScope);
125  scopeset.add(exchangeToScope);
126  resource.updateScopes(scopeset);
127  }
128  String managePermissionName = getManagePermissionName(client);
129  Policy managePermission = authz.getStoreFactory().getPolicyStore().findByName(managePermissionName, server.getId());
130  if (managePermission == null) {
131  Helper.addEmptyScopePermission(authz, server, managePermissionName, resource, manageScope);
132  }
133  String configurePermissionName = getConfigurePermissionName(client);
134  Policy configurePermission = authz.getStoreFactory().getPolicyStore().findByName(configurePermissionName, server.getId());
135  if (configurePermission == null) {
136  Helper.addEmptyScopePermission(authz, server, configurePermissionName, resource, configureScope);
137  }
138  String viewPermissionName = getViewPermissionName(client);
139  Policy viewPermission = authz.getStoreFactory().getPolicyStore().findByName(viewPermissionName, server.getId());
140  if (viewPermission == null) {
141  Helper.addEmptyScopePermission(authz, server, viewPermissionName, resource, viewScope);
142  }
143  String mapRolePermissionName = getMapRolesPermissionName(client);
144  Policy mapRolePermission = authz.getStoreFactory().getPolicyStore().findByName(mapRolePermissionName, server.getId());
145  if (mapRolePermission == null) {
146  Helper.addEmptyScopePermission(authz, server, mapRolePermissionName, resource, mapRoleScope);
147  }
148  String mapRoleClientScopePermissionName = getMapRolesClientScopePermissionName(client);
149  Policy mapRoleClientScopePermission = authz.getStoreFactory().getPolicyStore().findByName(mapRoleClientScopePermissionName, server.getId());
150  if (mapRoleClientScopePermission == null) {
151  Helper.addEmptyScopePermission(authz, server, mapRoleClientScopePermissionName, resource, mapRoleClientScope);
152  }
153  String mapRoleCompositePermissionName = getMapRolesCompositePermissionName(client);
154  Policy mapRoleCompositePermission = authz.getStoreFactory().getPolicyStore().findByName(mapRoleCompositePermissionName, server.getId());
155  if (mapRoleCompositePermission == null) {
156  Helper.addEmptyScopePermission(authz, server, mapRoleCompositePermissionName, resource, mapRoleCompositeScope);
157  }
158  String exchangeToPermissionName = getExchangeToPermissionName(client);
159  Policy exchangeToPermission = authz.getStoreFactory().getPolicyStore().findByName(exchangeToPermissionName, server.getId());
160  if (exchangeToPermission == null) {
161  Helper.addEmptyScopePermission(authz, server, exchangeToPermissionName, resource, exchangeToScope);
162  }
163  }
Policy managePermission(ClientModel client)
Definition: ClientPermissions.java:564
String getMapRolesPermissionName(ClientModel client)
Definition: ClientPermissions.java:80
static final String MAP_ROLES_CLIENT_SCOPE
Definition: ClientPermissionManagement.java:32
static final String MAP_ROLES_SCOPE
Definition: ClientPermissionManagement.java:31
Scope viewScope(ResourceServer server)
Definition: ClientPermissions.java:218
Scope initializeScope(String name, ResourceServer server)
Definition: MgmtPermissions.java:287
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
Scope manageScope(ResourceServer server)
Definition: ClientPermissions.java:206
ResourceServer findOrCreateResourceServer(ClientModel client)
Definition: MgmtPermissions.java:240
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
String getViewPermissionName(ClientModel client)
Definition: ClientPermissions.java:77
Policy viewPermission(ClientModel client)
Definition: ClientPermissions.java:578
String getExchangeToPermissionName(ClientModel client)
Definition: ClientPermissions.java:90
static final String MAP_ROLES_COMPOSITE_SCOPE
Definition: ClientPermissionManagement.java:33
Policy exchangeToPermission(ClientModel client)
Definition: ClientPermissions.java:536
String getMapRolesCompositePermissionName(ClientModel client)
Definition: ClientPermissions.java:86
Scope exchangeToScope(ResourceServer server)
Definition: ClientPermissions.java:210
Policy configurePermission(ClientModel client)
Definition: ClientPermissions.java:571
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279
String getMapRolesClientScopePermissionName(ClientModel client)
Definition: ClientPermissions.java:83
String getManagePermissionName(ClientModel client)
Definition: ClientPermissions.java:71
Scope mapRolesScope(ResourceServer server)
Definition: ClientPermissions.java:221
final MgmtPermissions root
Definition: ClientPermissions.java:58
static final String CONFIGURE_SCOPE
Definition: ClientPermissionManagement.java:34
Scope configureScope(ResourceServer server)
Definition: ClientPermissions.java:214
String getConfigurePermissionName(ClientModel client)
Definition: ClientPermissions.java:74

◆ isPermissionsEnabled()

boolean org.keycloak.services.resources.admin.permissions.ClientPermissions.isPermissionsEnabled ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

188  {
189  ResourceServer server = resourceServer(client);
190  if (server == null) return false;
191 
192  return authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId()) != null;
193  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585

◆ managePermission()

Policy org.keycloak.services.resources.admin.permissions.ClientPermissions.managePermission ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

564  {
565  ResourceServer server = resourceServer(client);
566  if (server == null) return null;
567  return authz.getStoreFactory().getPolicyStore().findByName(getManagePermissionName(client), server.getId());
568  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
String getManagePermissionName(ClientModel client)
Definition: ClientPermissions.java:71

◆ manageScope()

Scope org.keycloak.services.resources.admin.permissions.ClientPermissions.manageScope ( ResourceServer  server)
inlineprivate
206  {
207  return authz.getStoreFactory().getScopeStore().findByName(AdminPermissionManagement.MANAGE_SCOPE, server.getId());
208  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57

◆ mapRolesClientScopePermission()

Policy org.keycloak.services.resources.admin.permissions.ClientPermissions.mapRolesClientScopePermission ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

550  {
551  ResourceServer server = resourceServer(client);
552  if (server == null) return null;
553  return authz.getStoreFactory().getPolicyStore().findByName(getMapRolesClientScopePermissionName(client), server.getId());
554  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
String getMapRolesClientScopePermissionName(ClientModel client)
Definition: ClientPermissions.java:83

◆ mapRolesCompositePermission()

Policy org.keycloak.services.resources.admin.permissions.ClientPermissions.mapRolesCompositePermission ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

557  {
558  ResourceServer server = resourceServer(client);
559  if (server == null) return null;
560  return authz.getStoreFactory().getPolicyStore().findByName(getMapRolesCompositePermissionName(client), server.getId());
561  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getMapRolesCompositePermissionName(ClientModel client)
Definition: ClientPermissions.java:86
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585

◆ mapRolesPermission()

Policy org.keycloak.services.resources.admin.permissions.ClientPermissions.mapRolesPermission ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

543  {
544  ResourceServer server = resourceServer(client);
545  if (server == null) return null;
546  return authz.getStoreFactory().getPolicyStore().findByName(getMapRolesPermissionName(client), server.getId());
547  }
String getMapRolesPermissionName(ClientModel client)
Definition: ClientPermissions.java:80
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585

◆ mapRolesScope()

Scope org.keycloak.services.resources.admin.permissions.ClientPermissions.mapRolesScope ( ResourceServer  server)
inlineprivate
221  {
222  return authz.getStoreFactory().getScopeStore().findByName(MAP_ROLES_SCOPE, server.getId());
223  }
static final String MAP_ROLES_SCOPE
Definition: ClientPermissionManagement.java:31
final AuthorizationProvider authz
Definition: ClientPermissions.java:57

◆ requireConfigure()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireConfigure ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

410  {
411  if (!canConfigure(client)) {
412  throw new ForbiddenException();
413  }
414  }
boolean canConfigure(ClientModel client)
Definition: ClientPermissions.java:383

◆ requireList()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireList ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

231  {
232  if (!canList()) {
233  throw new ForbiddenException();
234  }
235  }
boolean canList()
Definition: ClientPermissions.java:226

◆ requireListClientScopes()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireListClientScopes ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

243  {
244  if (!canListClientScopes()) {
245  throw new ForbiddenException();
246  }
247  }
boolean canListClientScopes()
Definition: ClientPermissions.java:238

◆ requireManage() [1/3]

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireManage ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

261  {
262  if (!canManage()) {
263  throw new ForbiddenException();
264  }
265  }
boolean canManage()
Definition: ClientPermissions.java:256

◆ requireManage() [2/3]

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireManage ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

418  {
419  if (!canManage(client)) {
420  throw new ForbiddenException();
421  }
422  }
boolean canManage()
Definition: ClientPermissions.java:256

◆ requireManage() [3/3]

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireManage ( ClientScopeModel  clientScope)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

494  {
495  if (!canManage(clientScope)) {
496  throw new ForbiddenException();
497  }
498  }
boolean canManage()
Definition: ClientPermissions.java:256

◆ requireManageClientScopes()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireManageClientScopes ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

476  {
477  if (!canManageClientScopes()) {
478  throw new ForbiddenException();
479  }
480  }
boolean canManageClientScopes()
Definition: ClientPermissions.java:471

◆ requireView() [1/3]

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireView ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

272  {
273  if (!canView()) {
274  throw new ForbiddenException();
275  }
276  }
boolean canView()
Definition: ClientPermissions.java:267

◆ requireView() [2/3]

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireView ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

457  {
458  if (!canView(client)) {
459  throw new ForbiddenException();
460  }
461  }
boolean canView()
Definition: ClientPermissions.java:267

◆ requireView() [3/3]

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireView ( ClientScopeModel  clientScope)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

506  {
507  if (!canView(clientScope)) {
508  throw new ForbiddenException();
509  }
510  }
boolean canView()
Definition: ClientPermissions.java:267

◆ requireViewClientScopes()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.requireViewClientScopes ( )
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

482  {
483  if (!canViewClientScopes()) {
484  throw new ForbiddenException();
485  }
486  }
boolean canViewClientScopes()
Definition: ClientPermissions.java:466

◆ resource()

Resource org.keycloak.services.resources.admin.permissions.ClientPermissions.resource ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

279  {
280  ResourceServer server = resourceServer(client);
281  if (server == null) return null;
282  Resource resource = authz.getStoreFactory().getResourceStore().findByName(getResourceName(client), server.getId());
283  if (resource == null) return null;
284  return resource;
285  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getResourceName(ClientModel client)
Definition: ClientPermissions.java:67
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585
Resource resource(ClientModel client)
Definition: ClientPermissions.java:279

◆ resourceServer()

ResourceServer org.keycloak.services.resources.admin.permissions.ClientPermissions.resourceServer ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

585  {
586  return root.resourceServer(client);
587  }
ResourceServer resourceServer(ClientModel client)
Definition: MgmtPermissions.java:244
final MgmtPermissions root
Definition: ClientPermissions.java:58

◆ setPermissionsEnabled()

void org.keycloak.services.resources.admin.permissions.ClientPermissions.setPermissionsEnabled ( ClientModel  client,
boolean  enable 
)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionEvaluatorを実装しています。

196  {
197  if (enable) {
198  initialize(client);
199  } else {
200  deletePermissions(client);
201  }
202  }
void deletePermissions(ClientModel client)
Definition: ClientPermissions.java:173
void initialize(ClientModel client)
Definition: ClientPermissions.java:94

◆ viewPermission()

Policy org.keycloak.services.resources.admin.permissions.ClientPermissions.viewPermission ( ClientModel  client)
inline

org.keycloak.services.resources.admin.permissions.ClientPermissionManagementを実装しています。

578  {
579  ResourceServer server = resourceServer(client);
580  if (server == null) return null;
581  return authz.getStoreFactory().getPolicyStore().findByName(getViewPermissionName(client), server.getId());
582  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57
String getViewPermissionName(ClientModel client)
Definition: ClientPermissions.java:77
ResourceServer resourceServer(ClientModel client)
Definition: ClientPermissions.java:585

◆ viewScope()

Scope org.keycloak.services.resources.admin.permissions.ClientPermissions.viewScope ( ResourceServer  server)
inlineprivate
218  {
219  return authz.getStoreFactory().getScopeStore().findByName(AdminPermissionManagement.VIEW_SCOPE, server.getId());
220  }
final AuthorizationProvider authz
Definition: ClientPermissions.java:57

メンバ詳解

◆ authz

final AuthorizationProvider org.keycloak.services.resources.admin.permissions.ClientPermissions.authz
protected

◆ CONFIGURE_SCOPE

final String org.keycloak.services.resources.admin.permissions.ClientPermissionManagement.CONFIGURE_SCOPE = "configure"
staticinherited

◆ logger

final Logger org.keycloak.services.resources.admin.permissions.ClientPermissions.logger = Logger.getLogger(ClientPermissions.class)
staticprivate

◆ MAP_ROLES_CLIENT_SCOPE

final String org.keycloak.services.resources.admin.permissions.ClientPermissionManagement.MAP_ROLES_CLIENT_SCOPE = "map-roles-client-scope"
staticinherited

◆ MAP_ROLES_COMPOSITE_SCOPE

final String org.keycloak.services.resources.admin.permissions.ClientPermissionManagement.MAP_ROLES_COMPOSITE_SCOPE = "map-roles-composite"
staticinherited

◆ MAP_ROLES_SCOPE

final String org.keycloak.services.resources.admin.permissions.ClientPermissionManagement.MAP_ROLES_SCOPE = "map-roles"
staticinherited

◆ realm

final RealmModel org.keycloak.services.resources.admin.permissions.ClientPermissions.realm
protected

◆ root

final MgmtPermissions org.keycloak.services.resources.admin.permissions.ClientPermissions.root
protected

◆ session

final KeycloakSession org.keycloak.services.resources.admin.permissions.ClientPermissions.session
protected

このクラス詳解は次のファイルから抽出されました: