Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
ExternalAccessTransformerWrapper.getAuthorizations()
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
void |
ExternalAccessTransformerWrapper.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
AuthorizableSecurableService.getAuthorizations()
Authorization s needed to access this service |
Modifier and Type | Method and Description |
---|---|
void |
AuthorizableSecurableService.setAuthorizations(Collection<Authorization> authorizations)
Authorization s needed to access this service |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
AuthorizableReporterMeta.getAuthorizations()
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
void |
AuthorizableReporterMeta.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
protected Collection<Authorization> |
SiteAuthorizableSecurableService.getCurrentUserAuths() |
protected Collection<Authorization> |
SiteAuthorizableSecurableService.getUserAuths(User user) |
Modifier and Type | Method and Description |
---|---|
T |
ConfigurationService.get(String namespace,
K key,
Collection<Authorization> authorizations)
Will throw an exception if it did not find any matching result for the Config
Note: param matching is case insensitive |
String |
DefaultConfigurationService.get(String namespace,
String key,
Collection<Authorization> authorizations)
If an
DefaultConfigurationService.authorizationService is defined it will use it, else will delegate to DefaultConfigurationService.get(String, String) and log a warning. |
C |
DefaultConfigurationService.put(C config,
Collection<Authorization> authorizations) |
C |
ConfigurationService.put(C config,
Collection<Authorization> authorizations) |
Modifier and Type | Class and Description |
---|---|
class |
Restriction<L>
Restriction over some
Authorizable object with a limitation value. |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
Feature.getAuthorizations()
Deprecated.
|
Collection<Authorization> |
FeatureForOrganization.getAuthorizations()
Authorization or Restriction type |
Modifier and Type | Method and Description |
---|---|
void |
Feature.setAuthorizations(Collection<Authorization> authorizations)
Deprecated.
|
void |
FeatureForOrganization.setAuthorizations(Collection<Authorization> authorizations)
Authorization or Restriction type |
Modifier and Type | Class and Description |
---|---|
class |
JPARestriction |
Modifier and Type | Method and Description |
---|---|
protected boolean |
orderAdmin.isAuthorizedCreate(Collection<Authorization> userAuths) |
Modifier and Type | Method and Description |
---|---|
protected boolean |
OrderDetailsPanel.checkAuthorizationToAccessProducts(Collection<Authorization> userAuths)
Check if user has access to Catalog
|
protected org.apache.wicket.Component |
OrderDetailsPanel.constructDeliveryDetails(O orderRec,
Collection<Authorization> userAuths) |
protected EntityDetailsTemplatePanel<O> |
OrderDetailsPanel.constructOrderDetails(O orderRec,
Collection<Authorization> userAuths)
Look for
EntityTemplate in Spring with name newOrderDetailsTemplate. |
protected boolean |
OrderDetailsPanel.isAuthorizedCreate(Collection<Authorization> userAuths) |
Modifier and Type | Method and Description |
---|---|
Map<String,Collection<Authorization>> |
GuestUser.getAuthorizationMap() |
Map<String,Collection<Authorization>> |
RegisteredUser.getAuthorizationMap() |
Modifier and Type | Method and Description |
---|---|
User |
GuestUser.setAuthorizationMap(Map<String,Collection<Authorization>> _roles) |
T |
RegisteredUser.setAuthorizationMap(Map<String,Collection<Authorization>> _authorizationMap) |
Modifier and Type | Method and Description |
---|---|
protected org.apache.wicket.Component |
AdminUserAuthorizationsPanel.deleteAuthButton(String componentId,
User user,
Collection<Authorization> authorizations,
org.apache.wicket.markup.html.form.Form<Void> authMapContainerForm,
Authorizable authorizable,
Authorization auth) |
Modifier and Type | Method and Description |
---|---|
protected org.apache.wicket.Component |
AdminUserAuthorizationsPanel.addAuthButton(String componentId,
org.apache.wicket.markup.repeater.RepeatingView repeatingView,
org.apache.wicket.markup.html.WebMarkupContainer authContainer,
Collection<Authorization> permissableAuths) |
protected void |
AdminUserAuthorizationsPanel.convertListingUIToAuthorizationMap(org.apache.wicket.markup.html.list.ListView<Authorizable> authorizableListView,
Map<String,Collection<Authorization>> authorizationMap) |
protected org.apache.wicket.Component |
AdminUserAuthorizationsPanel.deleteAuthButton(String componentId,
User user,
Collection<Authorization> authorizations,
org.apache.wicket.markup.html.form.Form<Void> authMapContainerForm,
Authorizable authorizable,
Authorization auth) |
Constructor and Description |
---|
AuthorizationRow(String id,
String markupId,
org.apache.wicket.MarkupContainer markupProvider,
org.apache.wicket.model.IModel<Authorization> authModel) |
AuthorizationRow(String id,
String markupId,
org.apache.wicket.MarkupContainer markupProvider,
org.apache.wicket.model.IModel<Authorization> authModel,
Collection<Authorization> permissableAuths) |
AuthorizationRow(String id,
String markupId,
org.apache.wicket.MarkupContainer markupProvider,
org.apache.wicket.model.IModel<Authorization> authModel,
Collection<Authorization> permissableAuths) |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
AuthorizedRollOverMenuItem.getAuthorizations()
Deprecated.
|
Collection<Authorization> |
AuthorizableMenuItem.getAuthorizations() |
Modifier and Type | Method and Description |
---|---|
void |
AuthorizedRollOverMenuItem.setAuthorizations(Collection<Authorization> authorizations)
Deprecated.
|
void |
AuthorizableMenuItem.setAuthorizations(Collection<Authorization> authorizations)
This wraps the
Module it is linked to in terms of Authorization hence will throw IllegalArgumentException |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
Module.getAuthorizations() |
Collection<Authorization> |
Module.getPermissableAuths() |
Modifier and Type | Method and Description |
---|---|
void |
Module.setAuthorizations(Collection<Authorization> authorizations) |
void |
Module.setPermissableAuths(Collection<Authorization> permissableAuths) |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
AuthorizableETLMeta.getAuthorizations()
Authorization s that can access this item |
Collection<Authorization> |
AuthorizableTransformer.getAuthorizations()
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
void |
AuthorizableETLMeta.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
void |
AuthorizableTransformer.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
protected abstract Collection<Authorization> |
ConfigurableFacetMetaActionContainer.defineUserAuthorizations(User user)
Get the authorizations for user for the
Authorizable module/section this component belongs to. |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
AuthorizableExportType.getAuthorizations()
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
void |
AuthorizableExportType.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
Modifier and Type | Class and Description |
---|---|
class |
AspectAuthorization<T>
Authorization grants an AuthorizationType and AuthorizationExtent for an entire Module .Sometimes, we cannot break a Module into further sub modules, but we wish to control on some finer aspects of the module. |
Modifier and Type | Method and Description |
---|---|
Map<String,Collection<Authorization>> |
User.getAuthorizationMap()
Map of entity Name to
Set of Authorization .The entity name can refer to any section that has a name, that uniquely identifies the entity. |
Collection<Authorization> |
Authorizable.getAuthorizations()
Authorization s required to access the component |
Collection<Authorization> |
AuthorizableObject.getAuthorizations()
Authorization s that can access this item |
Map<Authorizable,Collection<Authorization>> |
Role.getAuthorizations()
Map for an
Authorizable what are the Authorization s this Role represents.The Map itself is transient, if Role to be persisted then save as JSON and marshal/unmarshal to this. |
Collection<Authorization> |
ManagedAuthorizable.getPermissableAuths()
Of the
Authorizable.getAuthorizations() what is the possible restricted set or list of Authorization s we can expect for this Authorizable instance. |
Modifier and Type | Method and Description |
---|---|
User |
User.setAuthorizationMap(Map<String,Collection<Authorization>> auths)
Map of entity Name to
Set of Authorization .The entity name can refer to any section that has a name, that uniquely identifies the entity. |
void |
Authorizable.setAuthorizations(Collection<Authorization> authorizations)
Authorization s required to access the component |
void |
AuthorizableObject.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
void |
Role.setAuthorizations(Map<Authorizable,Collection<Authorization>> authorizations)
Map for an
Authorizable what are the Authorization s this Role represents.The Map itself is transient, if Role to be persisted then save as JSON and marshal/unmarshal to this. |
void |
ManagedAuthorizable.setPermissableAuths(Collection<Authorization> permissableAuths)
Of the
Authorizable.getAuthorizations() what is the possible restricted set or list of Authorization s we can expect for this Authorizable instance. |
Constructor and Description |
---|
Authorization(Authorization a) |
Constructor and Description |
---|
Role(Map<Authorizable,Collection<Authorization>> authorizations) |
Role(String name,
Map<Authorizable,Collection<Authorization>> authorizations) |
Modifier and Type | Method and Description |
---|---|
Map<String,Collection<Authorization>> |
BasicUser.getAuthorizationMap() |
Modifier and Type | Method and Description |
---|---|
T |
BasicUser.setAuthorizationMap(Map<String,Collection<Authorization>> _authorizationMap) |
Modifier and Type | Method and Description |
---|---|
Authorization |
AuthorizationService.getLeastRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the least restrictive
Authorization |
Authorization |
IAuthorizationService.getLeastRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the least restrictive
Authorization |
Authorization |
AuthorizationService.getMostRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the most restrictive
Authorization |
Authorization |
IAuthorizationService.getMostRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the most restrictive
Authorization |
Modifier and Type | Method and Description |
---|---|
Comparator<Authorization> |
AuthorizationService.getAuthComparator() |
Collection<Authorization> |
ConfigurableRoleService.getAuthFor(String authorizableId,
String roleName)
By default it uses an in-memory Map derived from all
Role definitions.If the combination of Role s and Authorizable.getAuthorizableId() s is large then override using something less memory intensive. |
Collection<Authorization> |
RoleService.getAuthFor(String authorizableId,
String roleName)
|
Collection<Authorization> |
AuthorizationService.getAuthorizationsForUser(String authorizableId,
User user) |
Collection<Authorization> |
IAuthorizationService.getAuthorizationsForUser(String authorizableId,
User user)
Get the
Authorization s granted to a user. |
List<Authorization> |
AuthorizationService.getInOrderOfRestriction(Collection<Authorization> userAuthsForFeature,
boolean leastRestrictiveToMost)
When confronted with multiple Authorizations return a new List of
Authorization .Max weight, i.e. |
List<Authorization> |
IAuthorizationService.getInOrderOfRestriction(Collection<Authorization> userAuthsForFeature,
boolean leastRestrictiveToMost)
When confronted with multiple Authorizations return a new List of
Authorization .Max weight, i.e. |
Modifier and Type | Method and Description |
---|---|
protected IAuthorizationService.AuthState |
AuthorizationService.eval(IAuthorizationService.AuthState currentAuthState,
Authorization reqAuth,
Authorization userAuth)
Evaluate
Authorization s to determine the final outcome as an AuthState Note that while evaluation Role are an extension of Authorization . |
IAuthorizationService.AuthState |
AuthorizationService.isAuthorized(Authorization reqAuth,
Collection<Authorization> userAuthsForFeature)
featureRequiredAuth is the Minimum required Authorization from the Collection of user auths
|
IAuthorizationService.AuthState |
IAuthorizationService.isAuthorized(Authorization featureRequiredAuth,
Collection<Authorization> userAuthsForFeature)
|
protected boolean |
AuthorizationService.isEqual(Authorization a1,
Authorization a2)
equals(Object) is not expected to be commutative. |
Modifier and Type | Method and Description |
---|---|
List<Authorization> |
AuthorizationService.getInOrderOfRestriction(Collection<Authorization> userAuthsForFeature,
boolean leastRestrictiveToMost)
When confronted with multiple Authorizations return a new List of
Authorization .Max weight, i.e. |
List<Authorization> |
IAuthorizationService.getInOrderOfRestriction(Collection<Authorization> userAuthsForFeature,
boolean leastRestrictiveToMost)
When confronted with multiple Authorizations return a new List of
Authorization .Max weight, i.e. |
Authorization |
AuthorizationService.getLeastRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the least restrictive
Authorization |
Authorization |
IAuthorizationService.getLeastRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the least restrictive
Authorization |
Authorization |
AuthorizationService.getMostRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the most restrictive
Authorization |
Authorization |
IAuthorizationService.getMostRestrictive(Collection<Authorization> userAuthsForFeature)
When confronted with multiple Authorizations return the most restrictive
Authorization |
IAuthorizationService.AuthState |
AuthorizationService.isAuthorized(Authorization reqAuth,
Collection<Authorization> userAuthsForFeature)
featureRequiredAuth is the Minimum required Authorization from the Collection of user auths
|
IAuthorizationService.AuthState |
IAuthorizationService.isAuthorized(Authorization featureRequiredAuth,
Collection<Authorization> userAuthsForFeature)
|
IAuthorizationService.AuthState |
AuthorizationService.isAuthorized(Collection<Authorization> featureRequiredAuths,
Collection<Authorization> userAuthsForFeature)
Check if userAuthsForFeature satisfies any one of the featureRequiredAuths
|
IAuthorizationService.AuthState |
AuthorizationService.isAuthorized(Collection<Authorization> featureRequiredAuths,
Collection<Authorization> userAuthsForFeature)
Check if userAuthsForFeature satisfies any one of the featureRequiredAuths
|
IAuthorizationService.AuthState |
IAuthorizationService.isAuthorized(Collection<Authorization> featureRequiredAuths,
Collection<Authorization> userAuthsForFeature)
Authorize the
User s Authorization s against the Authorization s required by the feature.This is completely left to implementation as a general rule the user must satisfy one of the roles demanded by the feature (but some implementation may choose to upset this rule if required) |
IAuthorizationService.AuthState |
IAuthorizationService.isAuthorized(Collection<Authorization> featureRequiredAuths,
Collection<Authorization> userAuthsForFeature)
Authorize the
User s Authorization s against the Authorization s required by the feature.This is completely left to implementation as a general rule the user must satisfy one of the roles demanded by the feature (but some implementation may choose to upset this rule if required) |
void |
AuthorizationService.setAuthComparator(Comparator<Authorization> authComparator) |
Modifier and Type | Method and Description |
---|---|
Collection<Authorization> |
AuthorizableTemplate.getAuthorizations()
Authorization s that can access this item |
Collection<Authorization> |
AuthorizableFacetMeta.getAuthorizations()
Authorization s that can access this item |
Modifier and Type | Method and Description |
---|---|
void |
AuthorizableTemplate.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
void |
AuthorizableFacetMeta.setAuthorizations(Collection<Authorization> authorizations)
Authorization s that can access this item |
Modifier and Type | Field and Description |
---|---|
static MarshalUtils.GenericTransformer<net.sf.ezmorph.bean.MorphDynaBean,Authorization> |
MarshalUtils.morphDynaBeanToAuthTransformer |
Copyright © 2018. All rights reserved.