All Classes and Interfaces

Class
Description
 
 
 
 
 
 
 
 
Identifies the cryptographic algorithm used with the key.
 
Represents the configuration JSON file.
 
 
 
FIDO U2F device authentication request
FIDO U2F authentication request message
FIDO U2F device authentication response
FIDO U2F device authentication status response
Represents the authentication filter.
 
Brute Force authentication configuration
 
 
 
Error codes for authorization error responses.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Certificate, uses RSA, EcDSA, EdDSA.
 
 
 
 
 
FIDO U2F client data
 
 
 
 
base interface for all Jans Auth configurations
 
 
 
 
Exception, that is used by CryptoProvider suite classes
 
 
 
RFC8628 section 3.1
RFC8628 section 3.2
Error codes for device authz error responses.
FIDO U2F device data
Device registration types
An ASCII string value that specifies how the Authorization Server displays the authentication and consent user interface pages to the End-User.
 
 
 
Factory to create asymmetric Public and Private Keys for the Elliptic Curve Digital Signature Algorithm (ECDSA)
The Private Key for the Elliptic Curve Digital Signature Algorithm (ECDSA)
The Public Key for the Elliptic Curve Digital Signature Algorithm (ECDSA)
Implementing the AbstractJwsSigner, that uses ECDSA for signing.
Factory to create asymmetric Public and Private Keys for the Edwards Curve Digital Signature Algorithm (EDDSA)
Edwards Curve Digital Signature Algorithm (EDDSA) Private Key
Edwards Curve Digital Signature Algorithm (EDDSA) Public Key
Implementing the AbstractJwsSigner, that uses EDDSA for signing.
 
Error codes for End Session error responses.
 
 
This class define error handling methods
Represents an error message list in a configuration XML file.
 
Base class for error responses.
Provides an easy way to get Error responses based in an error response type
 
 
 
 
 
Created by eugeniuparvan on 8/5/16.
 
This class allows to enumerate and identify the possible values of the parameter grant_type for access token requests.
Hash Tool, that calculates Hash Code, using Hashing Algorithm, defined by the Signature Algorithm.
 
 
 
 
 
 
 
 
 
 
 
 
 
JSON error response
 
 
 
 
 
 
JSON Web Token is a compact token format intended for space constrained environments such as HTTP Authorization headers and URI query parameters.
 
 
 
 
 
 
 
JSON Web Token (JWT) is a compact token format intended for space constrained environments such as HTTP Authorization headers and URI query parameters.
 
 
 
 
 
 
 
 
Utility class (can't be instantiated), that provides suite of additional functions, which can be used, during JWT/JWE processing.
Key<E extends PrivateKey,F extends PublicKey>
 
 
KeyFactory<E extends PrivateKey,F extends PublicKey>
Factory to create asymmetric Public and Private Keys
 
 
Identifies the cryptographic algorithm family used with the key.
 
 
A class to facilitate two-step deserialization.
Lock message Pub configuration
 
OAuth discovery
 
 
 
 
Resource set permission ticket
 
The Private Key for Cryptography algorithms
An ASCII string values that specifies whether the Authorization Server prompts the End-User for re-authentication and consent.
 
 
The Public Key for Cryptography algorithms
 
 
 
 
 
Provides functionality to parse query strings.
The authenticate response produced by the token/key, which is transformed by the client into an AuthenticateResponse and sent to the server.
The register response produced by the token/key, which is transformed by the client into an RegisterResponse and sent to the server.
Error codes for register error responses.
FIDO U2F device registration request
FIDO U2F registration request message
Listed all standard parameters involved in client registration request.
FIDO U2F device registration response
Listed all standard parameters involved in client registration response.
FIDO U2F device registration status response
 
 
This class allows to enumerate and identify the possible values of the parameter response_type for the authorization endpoint.
 
Token status response according to RPT introspection profile: http://docs.kantarainitiative.org/uma/draft-uma-core.html#uma-bearer-token-profile
 
Requester permission token
Deprecated. 
The Private Key for the RSA Algorithm
The Public Key for the RSA Algorithm
 
 
 
Scope types
Signature Algorithms.
 
 
 
 
 
 
 
 
 
 
 
 
 
Subject Token Type
 
 
struct { TokenBindingType tokenbinding_type; TokenBindingID tokenbindingid; opaque signature<64..2^16-1>; Signature over the concatenation of tokenbinding_type, key_parameters and exported keying material (EKM) TB_Extension extensions<0..2^16-1>; } TokenBinding;
struct { TB_ExtensionType extension_type; opaque extension_data<0..2^16-1>; } TB_Extension;
enum { (255) No initial TB_ExtensionType registrations } TB_ExtensionType;
struct { TokenBindingKeyParameters key_parameters; uint16 key_length; Length (in bytes) of the following TokenBindingID.TokenBindingPublicKey select (key_parameters) { case rsa2048_pkcs1.5: case rsa2048_pss: RSAPublicKey rsapubkey; case ecdsap256: TB_ECPoint point; } TokenBindingPublicKey; } TokenBindingID;
enum { rsa2048_pkcs1.5(0), rsa2048_pss(1), ecdsap256(2), (255) } TokenBindingKeyParameters;
struct { TokenBinding tokenbindings<132..2^16-1>; } TokenBindingMessage;
 
 
 
enum { provided_token_binding(0), referred_token_binding(1), (255) } TokenBindingType;
 
 
Error codes for token revocation error responses.
 
The access token type provides the client with the information required to successfully utilize the access token to make a protected resource request (along with type-specific attributes).
 
 
FIDO U2F metadata configuration
Static FIDO U2F server variables
Error codes for FIDO U2F server
 
 
Error codes for UMA error responses.
UMA2 metadata
 
UMA permission
UMA Permission.
 
Resource description.
Resource that needs protection by registering a resource description at the AS.
Resource description.
Resource that needs protection by registering a resource description at the AS.
A scope is a bounded extent of access that is possible to perform on a resource set.