/** * Query the server for all permissions. * * @return an {@link AuthorizationResponse} with a RPT holding all granted permissions * @throws AuthorizationDeniedException in case the request was denied by the server */ public AuthorizationResponse authorize() throws AuthorizationDeniedException { return authorize(new AuthorizationRequest()); }
public void addPermission(String resourceId, List<String> scopes) { addPermission(resourceId, scopes.toArray(new String[scopes.size()])); }
public HttpMethod<R> uma(AuthorizationRequest request) { String ticket = request.getTicket(); PermissionTicketToken permissions = request.getPermissions(); method.param("claim_token", request.getClaimToken()); method.param("claim_token_format", request.getClaimTokenFormat()); method.param("pct", request.getPct()); method.param("rpt", request.getRptToken()); method.param("scope", request.getScope()); method.param("audience", request.getAudience()); method.param("subject_token", request.getSubjectToken()); Metadata metadata = request.getMetadata();
KeycloakDeployment deployment = getPolicyEnforcer().getDeployment(); AccessToken accessToken = securityContext.getToken(); AuthorizationRequest authzRequest = new AuthorizationRequest(); authzRequest.addPermission(pathConfig.getId(), methodConfig.getScopes()); authzRequest.setClaimTokenFormat("urn:ietf:params:oauth:token-type:jwt"); authzRequest.setClaimToken(Base64.encodeBytes(JsonSerialization.writeValueAsBytes(claims))); authzRequest.setRpt(accessTokenString); authzRequest.setSubjectToken(accessTokenString); authzResponse = getAuthzClient().authorization().authorize(authzRequest); } else {