All Classes and Interfaces
Class
Description
Identifies the cryptographic algorithm used with the key.
Represents the configuration JSON file.
FIDO U2F device authentication request
FIDO U2F authentication request message
FIDO U2F device authentication response
FIDO U2F device authentication status response
Represents the authentication filter.
Brute Force authentication configuration
Error codes for authorization error responses.
Certificate, uses RSA, EcDSA, EdDSA.
FIDO U2F client data
base interface for all Jans Auth configurations
Exception, that is used by CryptoProvider suite classes
RFC8628 section 3.1
RFC8628 section 3.2
Error codes for device authz error responses.
FIDO U2F device data
Device registration types
An ASCII string value that specifies how the Authorization Server displays
the authentication and consent user interface pages to the End-User.
Factory to create asymmetric Public and Private Keys for the Elliptic Curve
Digital Signature Algorithm (ECDSA)
The Private Key for the Elliptic Curve Digital Signature Algorithm (ECDSA)
The Public Key for the Elliptic Curve Digital Signature Algorithm (ECDSA)
Implementing the AbstractJwsSigner, that uses ECDSA for signing.
Factory to create asymmetric Public and Private Keys for the Edwards Curve
Digital Signature Algorithm (EDDSA)
Edwards Curve Digital Signature Algorithm (EDDSA)
Private Key
Edwards Curve Digital Signature Algorithm (EDDSA)
Public Key
Implementing the AbstractJwsSigner, that uses EDDSA for signing.
Error codes for End Session error responses.
This class define error handling methods
Represents an error message list in a configuration XML file.
Base class for error responses.
Provides an easy way to get Error responses based in an error response type
Created by eugeniuparvan on 8/5/16.
This class allows to enumerate and identify the possible values of the
parameter grant_type for access token requests.
Hash Tool, that calculates Hash Code, using Hashing Algorithm, defined by the Signature Algorithm.
JSON error response
JSON Web Token is a compact token format intended for space constrained
environments such as HTTP Authorization headers and URI query parameters.
JSON Web Token (JWT) is a compact token format intended for space constrained
environments such as HTTP Authorization headers and URI query parameters.
Utility class (can't be instantiated), that provides suite of additional functions,
which can be used, during JWT/JWE processing.
Factory to create asymmetric Public and Private Keys
Identifies the cryptographic algorithm family used with the key.
A class to facilitate two-step deserialization.
Lock message Pub configuration
OAuth discovery
Resource set permission ticket
The Private Key for Cryptography algorithms
An ASCII string values that specifies whether the Authorization Server
prompts the End-User for re-authentication and consent.
The Public Key for Cryptography algorithms
Provides functionality to parse query strings.
The authenticate response produced by the token/key, which is transformed by
the client into an AuthenticateResponse and sent to the server.
The register response produced by the token/key, which is transformed by the
client into an RegisterResponse and sent to the server.
Error codes for register error responses.
FIDO U2F device registration request
FIDO U2F registration request message
Listed all standard parameters involved in client registration request.
FIDO U2F device registration response
Listed all standard parameters involved in client registration response.
FIDO U2F device registration status response
This class allows to enumerate and identify the possible values of the
parameter response_type for the authorization endpoint.
Token status response according to RPT introspection profile:
http://docs.kantarainitiative.org/uma/draft-uma-core.html#uma-bearer-token-profile
Requester permission token
Deprecated.
The Private Key for the RSA Algorithm
The Public Key for the RSA Algorithm
Scope types
Signature Algorithms.
Subject Token Type
struct {
TokenBindingType tokenbinding_type;
TokenBindingID tokenbindingid;
opaque signature<64..2^16-1>; Signature over the concatenation
of tokenbinding_type,
key_parameters and exported
keying material (EKM)
TB_Extension extensions<0..2^16-1>;
} TokenBinding;
struct {
TB_ExtensionType extension_type;
opaque extension_data<0..2^16-1>;
} TB_Extension;
enum {
(255) No initial TB_ExtensionType registrations
} TB_ExtensionType;
struct {
TokenBindingKeyParameters key_parameters;
uint16 key_length; Length (in bytes) of the following TokenBindingID.TokenBindingPublicKey
select (key_parameters) {
case rsa2048_pkcs1.5:
case rsa2048_pss:
RSAPublicKey rsapubkey;
case ecdsap256:
TB_ECPoint point;
} TokenBindingPublicKey;
} TokenBindingID;
enum {
rsa2048_pkcs1.5(0), rsa2048_pss(1), ecdsap256(2), (255)
} TokenBindingKeyParameters;
struct {
TokenBinding tokenbindings<132..2^16-1>;
} TokenBindingMessage;
enum {
provided_token_binding(0), referred_token_binding(1), (255)
} TokenBindingType;
Error codes for token revocation error responses.
The access token type provides the client with the information required to
successfully utilize the access token to make a protected resource request
(along with type-specific attributes).
FIDO U2F metadata configuration
Static FIDO U2F server variables
Error codes for FIDO U2F server
Error codes for UMA error responses.
UMA2 metadata
UMA permission
UMA Permission.
Resource description.
Resource that needs protection by registering a resource description at the AS.
Resource description.
Resource that needs protection by registering a resource description
at the AS.
A scope is a bounded extent of access that is possible to perform on a
resource set.