Tabnine Logo
OAuthRequestAuthenticator
Code IndexAdd Tabnine to your IDE (free)

How to use
OAuthRequestAuthenticator
in
org.keycloak.adapters

Best Java code snippets using org.keycloak.adapters.OAuthRequestAuthenticator (Showing top 15 results out of 315)

origin: org.keycloak/keycloak-tomcat-core-adapter

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/keycloak-adapter-core

if (!isRequestSecure() && deployment.getSslRequired().isRequired(facade.getRequest().getRemoteAddr())) {
  log.error("Adapter requires SSL. Request: " + facade.getRequest().getURI());
  return challenge(403, OIDCAuthenticationError.Reason.SSL_REQUIRED, null);
AuthChallenge challenge = checkStateCookie();
if (challenge != null) return challenge;
strippedOauthParametersRequestUri = stripOauthParametersFromRedirect();
  tokenResponse = ServerRequest.invokeAccessCodeToToken(deployment, code, rewrittenRedirectUri(strippedOauthParametersRequestUri), httpSessionId);
} catch (ServerRequest.HttpFailure failure) {
  log.error("failed to turn code into token");
    log.error("   " + failure.getError());
  return challenge(403, OIDCAuthenticationError.Reason.CODE_TO_TOKEN_FAILURE, null);
  return challenge(403, OIDCAuthenticationError.Reason.CODE_TO_TOKEN_FAILURE, null);
  logToken("\taccess_token", tokenString);
  logToken("\tid_token", idTokenString);
  logToken("\trefresh_token", refreshToken);
} catch (VerificationException e) {
  log.error("failed verification of token: " + e.getMessage());
  return challenge(403, OIDCAuthenticationError.Reason.INVALID_TOKEN, null);
  return challenge(403, OIDCAuthenticationError.Reason.STALE_TOKEN, null);
origin: org.keycloak/keycloak-adapter-core

public AuthOutcome authenticate() {
  String code = getCode();
  if (code == null) {
    log.debug("there was no code");
    String error = getError();
    if (error != null) {
      // todo how do we send a response?
      log.warn("There was an error: " + error);
      challenge = challenge(400, OIDCAuthenticationError.Reason.OAUTH_ERROR, error);
      return AuthOutcome.FAILED;
    } else {
      log.debug("redirecting to auth server");
      challenge = loginRedirect();
      return AuthOutcome.NOT_ATTEMPTED;
    }
  } else {
    log.debug("there was a code, resolving");
    challenge = resolveCode(code);
    if (challenge != null) {
      return AuthOutcome.FAILED;
    }
    return AuthOutcome.AUTHENTICATED;
  }
}
origin: org.keycloak/keycloak-adapter-core

protected AuthChallenge checkStateCookie() {
  OIDCHttpFacade.Cookie stateCookie = getCookie(deployment.getStateCookieName());
  if (stateCookie == null) {
    log.warn("No state cookie");
    return challenge(400, OIDCAuthenticationError.Reason.INVALID_STATE_COOKIE, null);
  }
  // reset the cookie
  log.debug("** reseting application state cookie");
  facade.getResponse().resetCookie(deployment.getStateCookieName(), stateCookie.getPath());
  String stateCookieValue = getCookieValue(deployment.getStateCookieName());
  String state = getQueryParamValue(OAuth2Constants.STATE);
  if (state == null) {
    log.warn("state parameter was null");
    return challenge(400, OIDCAuthenticationError.Reason.INVALID_STATE_COOKIE, null);
  }
  if (!state.equals(stateCookieValue)) {
    log.warn("state parameter invalid");
    log.warn("cookie: " + stateCookieValue);
    log.warn("queryParam: " + state);
    return challenge(400, OIDCAuthenticationError.Reason.INVALID_STATE_COOKIE, null);
  }
  return null;
}
origin: org.keycloak/keycloak-adapter-core

protected AuthChallenge loginRedirect() {
  final String state = getStateCode();
  final String redirect =  getRedirectUri(state);
  if (redirect == null) {
    return challenge(403, OIDCAuthenticationError.Reason.NO_REDIRECT_URI, null);
  }
  return new AuthChallenge() {
    @Override
    public int getResponseCode() {
      return 0;
    }
    @Override
    public boolean challenge(HttpFacade exchange) {
      tokenStore.saveRequest();
      log.debug("Sending redirect to login page: " + redirect);
      exchange.getResponse().setStatus(302);
      exchange.getResponse().setCookie(deployment.getStateCookieName(), state, /* need to set path? */ null, null, -1, deployment.getSslRequired().isRequired(facade.getRequest().getRemoteAddr()), true);
      exchange.getResponse().setHeader("Location", redirect);
      return true;
    }
  };
}
origin: org.keycloak/keycloak-adapter-core

outcome = oauth.authenticate();
if (outcome == AuthOutcome.FAILED) {
  challenge = oauth.getChallenge();
  return AuthOutcome.FAILED;
} else if (outcome == AuthOutcome.NOT_ATTEMPTED) {
  challenge = oauth.getChallenge();
  return AuthOutcome.NOT_ATTEMPTED;
facade.getResponse().setHeader("Location", oauth.getStrippedOauthParametersRequestUri());
facade.getResponse().setStatus(302);
facade.getResponse().end();
origin: org.keycloak/keycloak-undertow-adapter

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/keycloak-jetty-core

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/keycloak-spring-security-adapter

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/spring-boot-container-bundle

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/spring-boot-container-bundle

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/keycloak-undertow-adapter

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/spring-boot-container-bundle

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/keycloak-servlet-filter-adapter

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
origin: org.keycloak/spring-boot-container-bundle

@Override
protected OAuthRequestAuthenticator createOAuthAuthenticator() {
  return new OAuthRequestAuthenticator(this, facade, deployment, sslRedirectPort, tokenStore);
}
org.keycloak.adaptersOAuthRequestAuthenticator

Most used methods

  • <init>
  • authenticate
  • challenge
  • checkStateCookie
  • getChallenge
  • getCode
  • getCookie
  • getCookieValue
  • getError
  • getIdToken
  • getIdTokenString
  • getQueryParamValue
  • getIdTokenString,
  • getQueryParamValue,
  • getRedirectUri,
  • getRefreshToken,
  • getRequestUrl,
  • getStateCode,
  • getStrippedOauthParametersRequestUri,
  • getToken,
  • getTokenString,
  • isRequestSecure

Popular in Java

  • Making http post requests using okhttp
  • onCreateOptionsMenu (Activity)
  • getSystemService (Context)
  • getContentResolver (Context)
  • FileNotFoundException (java.io)
    Thrown when a file specified by a program cannot be found.
  • HashSet (java.util)
    HashSet is an implementation of a Set. All optional operations (adding and removing) are supported.
  • Set (java.util)
    A Set is a data structure which does not allow duplicate elements.
  • ImageIO (javax.imageio)
  • ServletException (javax.servlet)
    Defines a general exception a servlet can throw when it encounters difficulty.
  • HttpServletRequest (javax.servlet.http)
    Extends the javax.servlet.ServletRequest interface to provide request information for HTTP servlets.
  • Top plugins for Android Studio
Tabnine Logo
  • Products

    Search for Java codeSearch for JavaScript code
  • IDE Plugins

    IntelliJ IDEAWebStormVisual StudioAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimGoLandRubyMineEmacsJupyter NotebookJupyter LabRiderDataGripAppCode
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogTabnine AcademyTerms of usePrivacy policyJava Code IndexJavascript Code Index
Get Tabnine for your IDE now