Determine if the requested resource is protected.
2.6.2.2.1 Annotated Code: JAccess Client.java Import standard Java library class
Hashtable to hold credentials. import java.io.Hashtable; Import the library containing the Java implementation of the Access SDK API classes.: import oracle.security.am.asdk.; This application is named JAccessClient. public class JAccessClient { Since this is the simplest of example applications, we are declaring global constants to represent the parameters associated with a user request for access to a resource. Typically, a real-world application receives this set of parameters as an array of strings passed from a requesting application, HTTP FORM-based input, or command-line input. For example: public static final String ms_resource = Example.com:80secretsindex.html; public static final String ms_protocol = http; public static final String ms_method = GET; public static final String ms_login = jsmith; public static final String ms_passwd = j5m1th; Launch the main method on the Java interpreter. An array of strings named argv is passed to the main method. In this particular case, the user jsmith, whose password is j5m1th, has requested the HTTP resourceParts
» Oracle Fusion Middleware Online Documentation Library
» Chapter 4: Writing Oracle Security Token Service Module Classes
» Introduction to Java API References
» Introduction to the Access SDK
» Locating Access SDK Packages and Resources
» Uses, Functionality, and New Features
» Messages Messages, Exceptions and Logging
» Exceptions Messages, Exceptions and Logging
» Generating the Required Configuration Files
» Simple Transport Security Mode
» When to Create a Custom Access Client
» Access Client Architecture Introduction to Access Clients
» Overview of Access Client Request Processing
» Initialize the SDK. Typical Access Client Execution Flow
» Create ResourceRequest object. Typical Access Client Execution Flow
» Determine if the requested resource is protected.
» Requested Resource is Protected
» Authentication Scheme HTTP FORM-based
» Authentication Scheme Not HTTP FORM-based
» User is Authenticated Typical Access Client Execution Flow
» User is Not Authenticated User is Authorized
» User Not Authorized Typical Access Client Execution Flow
» Example of a Simple Access Client: JAccess Client.java
» Example Using Additional Methods: access_test_java.java
» Example of Implementing Certificate-Based Authentication in Java
» Compatibility of the Access SDK
» Compatibility of 10g JNI ASDK and 11g Access SDK
» Deprecated: Oracle Access Manager 10g JNI SDK
» Modifying Your Development and Runtime Environment
» Configuration Specific to Migration
» Understanding Differences Between JNI ASDK and Access SDK
» Converting Code Converting Your Code
» Identifying and Resolving Problems
» About the Custom Plug-in Life Cycle
» About Planning, the Authentication Model, and Plug-ins
» Sample Manifest for the Plug-in Plug-in JAR File Structure
» About Managing Custom Plug-ins
» About Creating Custom Authentication Modules
» Creating a Custom Authentication Module
» Configuring Logging for Custom Plug-ins
» About Writing a TokenValidatorModule Class
» Writing a TokenValidatorModule Class
» About Writing a TokenIssuanceModule Class
» Writing a TokenIssuanceModule Class
» About Making Classes Available
» About Narrowing a Search for Custom Tokens
» Close the page or edit as described in Step 4. Proceed to Step 4, if needed, or to
» Creating the Validation Template
» Creating the Issuance Template for a Custom Token
» Apply Changes Click the New Issuance Template button in the upper-right corner or click the
Show more