@Override public String getSecret() { return apiKey.getSecret(); }
@Override public String getSecret() { return this.primary.getSecret(); }
@Override public String getSecret() { return apiKey.getSecret(); }
public String stormpathCsrfTokenSigningKey() { return client.getApiKey().getSecret(); }
protected Key getSpSigningKey(SignatureAlgorithm alg) { String apiKeySecret = dataStore.getApiKey().getSecret(); byte[] apiKeySecretBytes = Base64.decodeBase64(apiKeySecret); return new SecretKeySpec(apiKeySecretBytes, alg.getJcaName()); }
protected Key getSigningKey(HttpServletRequest request, SignatureAlgorithm alg) { Client client = ClientResolver.INSTANCE.getClient(request); Assert.notNull(client, "Client must be accessible as a request attribute."); String apiKeySecret = client.getApiKey().getSecret(); return new SecretKeySpec(apiKeySecret.getBytes(Charset.forName("UTF-8")), alg.getJcaName()); }
protected Key getSigningKey(HttpServletRequest request, SignatureAlgorithm alg) { Client client = (Client) request.getAttribute(Client.class.getName()); Assert.notNull(client, "Client must be accessible as a request attribute."); String apiKeySecret = client.getApiKey().getSecret(); //Stormpath API Keys are base-64-encoded secure random byte arrays: byte[] apiKeySecretBytes = Base64.decodeBase64(apiKeySecret); return new SecretKeySpec(apiKeySecretBytes, alg.getJcaName()); } }
protected Key getSigningKey(HttpServletRequest request, SignatureAlgorithm alg) { Client client = (Client) request.getAttribute(Client.class.getName()); Assert.notNull(client, "Client must be accessible as a request attribute."); String apiKeySecret = client.getApiKey().getSecret(); //Stormpath API Keys are base-64-encoded secure random byte arrays: byte[] apiKeySecretBytes = Base64.decodeBase64(apiKeySecret); return new SecretKeySpec(apiKeySecretBytes, alg.getJcaName()); } }
protected Key getSigningKey(HttpServletRequest request, SignatureAlgorithm alg) { Client client = ClientResolver.INSTANCE.getClient(request); Assert.notNull(client, "Client must be accessible as a request attribute."); String apiKeySecret = client.getApiKey().getSecret(); return new SecretKeySpec(apiKeySecret.getBytes(Charset.forName("UTF-8")), alg.getJcaName()); }
protected Key getSpSigningKey(SignatureAlgorithm alg) { String apiKeySecret = dataStore.getApiKey().getSecret(); byte[] apiKeySecretBytes = Base64.decodeBase64(apiKeySecret); return new SecretKeySpec(apiKeySecretBytes, alg.getJcaName()); } }
protected Key getSpSigningKey(SignatureAlgorithm alg) { String apiKeySecret = dataStore.getApiKey().getSecret(); byte[] apiKeySecretBytes = Base64.decodeBase64(apiKeySecret); return new SecretKeySpec(apiKeySecretBytes, alg.getJcaName()); } }
protected Key getSpSigningKey(SignatureAlgorithm alg) { String apiKeySecret = dataStore.getApiKey().getSecret(); byte[] apiKeySecretBytes = Base64.decodeBase64(apiKeySecret); return new SecretKeySpec(apiKeySecretBytes, alg.getJcaName()); }
@Override public byte[] resolveSigningKeyBytes(JwsHeader header, Claims claims) { String keyId = header.getKeyId(); if (Strings.hasText(keyId) && !clientApiKey.getId().equals(keyId)) { String url = dataStore.getBaseUrl() + "/apiKeys/" + keyId; ApiKey apiKey = dataStore.getResource(url, ApiKey.class); return Strings.getBytesUtf8(apiKey.getSecret()); } return Strings.getBytesUtf8(clientApiKey.getSecret()); } }).parseClaimsJws(token);
@Override public byte[] resolveSigningKeyBytes(JwsHeader header, Claims claims) { String keyId = header.getKeyId(); if (Strings.hasText(keyId) && !clientApiKey.getId().equals(keyId)) { String url = dataStore.getBaseUrl() + "/apiKeys/" + keyId; ApiKey apiKey = dataStore.getResource(url, ApiKey.class); return Strings.getBytesUtf8(apiKey.getSecret()); } return Strings.getBytesUtf8(clientApiKey.getSecret()); } }).parseClaimsJws(token);
public JwtSignatureValidator(ApiKey apiKey) { Assert.notNull(apiKey, "apiKey cannot be null."); jwtSigner = new DefaultJwtSigner(apiKey.getId(), apiKey.getSecret()); }
public JwtSignatureValidator(ApiKey apiKey) { Assert.notNull(apiKey, "apiKey cannot be null."); jwtSigner = new DefaultJwtSigner(apiKey.getId(), apiKey.getSecret()); }
public AccessTokenRequestAuthenticator(InternalDataStore internalDataStore) { dataStore = internalDataStore; jwtSigner = new DefaultJwtSigner(dataStore.getApiKey().getId(), dataStore.getApiKey().getSecret()); }
public AccessTokenRequestAuthenticator(InternalDataStore internalDataStore) { dataStore = internalDataStore; jwtSigner = new DefaultJwtSigner(dataStore.getApiKey().getId(), dataStore.getApiKey().getSecret()); }
@Override public void authenticate(Request request) throws RequestAuthenticationException { if (request.getResourceUrl().getPath().startsWith("/oauth2/")) { ApiKey oauthClientCreds = this.pairedApiKey.getSecondaryApiKey(); Assert.notNull(oauthClientCreds, "PairedApiKey credentials must have a secondary api key when invoking an Okta /oauth2/ endpoint."); String basicCreds = oauthClientCreds.getId() + ":" + oauthClientCreds.getSecret(); String base64 = Base64.encodeBase64String(basicCreds.getBytes(UTF8)); request.getHeaders().set(AUTHORIZATION_HEADER, "Basic " + base64); return; } request.getHeaders().set(AUTHORIZATION_HEADER, AUTHENTICATION_SCHEME + " " + apiKeyCredentials.getSecret()); } }
@Override public void authenticate(Request request) throws RequestAuthenticationException { if (request.getResourceUrl().getPath().startsWith("/oauth2/")) { ApiKey oauthClientCreds = this.pairedApiKey.getSecondaryApiKey(); Assert.notNull(oauthClientCreds, "PairedApiKey credentials must have a secondary api key when invoking an Okta /oauth2/ endpoint."); String basicCreds = oauthClientCreds.getId() + ":" + oauthClientCreds.getSecret(); String base64 = Base64.encodeBase64String(basicCreds.getBytes(UTF8)); request.getHeaders().set(AUTHORIZATION_HEADER, "Basic " + base64); return; } request.getHeaders().set(AUTHORIZATION_HEADER, AUTHENTICATION_SCHEME + " " + apiKeyCredentials.getSecret()); } }