|
||||||||||
PREV NEXT | FRAMES NO FRAMES |
Uses of UserStoreException in org.wso2.registry.jdbc.realm |
---|
Methods in org.wso2.registry.jdbc.realm that throw UserStoreException | |
---|---|
void |
RegistryUserStoreAdmin.addRole(java.lang.String roleName)
|
void |
RegistryUserStoreAdmin.addUser(java.lang.String userName,
java.lang.Object credential)
|
void |
RegistryUserStoreAdmin.addUserToRole(java.lang.String userName,
java.lang.String roleName)
|
void |
RegistryAccessControlAdmin.authorizeRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
RegistryAccessControlAdmin.authorizeUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
RegistryAccessControlAdmin.clearResourceAuthorizations(java.lang.String resourceId)
|
void |
RegistryAccessControlAdmin.clearRoleAuthorization(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
RegistryAccessControlAdmin.clearUserAuthorization(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
RegistryAccessControlAdmin.copyAuthorizations(java.lang.String fromResourceId,
java.lang.String toResourceId)
|
void |
RegistryUserStoreAdmin.deleteRole(java.lang.String roleName)
|
void |
RegistryUserStoreAdmin.deleteUser(java.lang.String userName)
|
void |
RegistryAccessControlAdmin.denyRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
RegistryAccessControlAdmin.denyUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
AccessControlAdmin |
RegistryRealm.getAccessControlAdmin()
|
java.lang.String[] |
RegistryAccessControlAdmin.getAllowedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
RegistryAccessControlAdmin.getAllowedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
RegistryUserStoreAdmin.getAllRoleNames()
|
java.lang.String[] |
RegistryUserStoreAdmin.getAllUserNames()
|
org.wso2.authenticator.Authenticator |
RegistryRealm.getAuthenticator()
|
Authorizer |
RegistryRealm.getAuthorizer()
|
java.lang.String[] |
RegistryAccessControlAdmin.getDeniedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
RegistryAccessControlAdmin.getDeniedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.Object |
RegistryRealm.getRealmConfiguration()
|
java.util.Map |
RegistryUserStoreAdmin.getRoleProperties(java.lang.String roleName)
|
java.lang.String[] |
RegistryUserStoreAdmin.getUserNamesWithPropertyValue(java.lang.String propertyName,
java.lang.String propetyValue)
|
java.util.Map |
RegistryUserStoreAdmin.getUserProperties(java.lang.String userName)
|
java.lang.String[] |
RegistryUserStoreAdmin.getUserPropertyNames()
|
java.lang.String[] |
RegistryUserStoreAdmin.getUserRoles(java.lang.String userName)
|
java.lang.String[] |
RegistryUserStoreAdmin.getUsersInRole(java.lang.String roleName)
|
UserStoreAdmin |
RegistryRealm.getUserStoreAdmin()
|
UserStoreReader |
RegistryRealm.getUserStoreReader()
|
void |
RegistryRealm.init(java.lang.Object configBean)
|
boolean |
RegistryUserStoreAdmin.isExistingRole(java.lang.String roleName)
|
boolean |
RegistryUserStoreAdmin.isExistingUser(java.lang.String userName)
|
boolean |
RegistryAccessControlAdmin.isRoleAuthorized(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
boolean |
RegistryAccessControlAdmin.isUserAuthorized(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
RegistryUserStoreAdmin.removeUserFromRole(java.lang.String userName,
java.lang.String roleName)
|
void |
RegistryUserStoreAdmin.setRoleProperties(java.lang.String roleName,
java.util.Map properties)
|
void |
RegistryUserStoreAdmin.setUserProperties(java.lang.String userName,
java.util.Map properties)
|
void |
RegistryUserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential)
|
void |
RegistryUserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential,
java.lang.Object oldCredential)
|
Uses of UserStoreException in org.wso2.registry.jdbc.realm.pathbased |
---|
Methods in org.wso2.registry.jdbc.realm.pathbased that throw UserStoreException | |
---|---|
void |
PathBasedAccessControlAdmin.authorizeRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
PathBasedAccessControlAdmin.authorizeUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
PathBasedAccessControlAdmin.clearResourceAuthorizations(java.lang.String resourceId)
|
void |
PathBasedAccessControlAdmin.clearRoleAuthorization(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
PathBasedAccessControlAdmin.clearUserAuthorization(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
PathBasedAccessControlAdmin.copyAuthorizations(java.lang.String fromResourceId,
java.lang.String toResourceId)
|
void |
PathBasedAccessControlAdmin.denyRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
PathBasedAccessControlAdmin.denyUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
AccessControlAdmin |
PathBasedRegistryRealm.getAccessControlAdmin()
|
java.lang.String[] |
PathBasedAuthorizer.getAllowedRolesForResource(java.lang.String resourcePath,
java.lang.String action)
|
java.lang.String[] |
PathBasedAccessControlAdmin.getAllowedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
PathBasedAuthorizer.getAllowedUsersForResource(java.lang.String resourcePath,
java.lang.String action)
|
java.lang.String[] |
PathBasedAccessControlAdmin.getAllowedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
org.wso2.authenticator.Authenticator |
PathBasedRegistryRealm.getAuthenticator()
|
Authorizer |
PathBasedRegistryRealm.getAuthorizer()
|
java.lang.String[] |
PathBasedAuthorizer.getDeniedRolesForResource(java.lang.String resourcePath,
java.lang.String action)
|
java.lang.String[] |
PathBasedAccessControlAdmin.getDeniedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
PathBasedAuthorizer.getDeniedUsersForResource(java.lang.String resourcePath,
java.lang.String action)
|
java.lang.String[] |
PathBasedAccessControlAdmin.getDeniedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.Object |
PathBasedRegistryRealm.getRealmConfiguration()
|
UserStoreAdmin |
PathBasedRegistryRealm.getUserStoreAdmin()
|
UserStoreReader |
PathBasedRegistryRealm.getUserStoreReader()
|
void |
PathBasedRegistryRealm.init(java.lang.Object configBean)
|
boolean |
PathBasedAuthorizer.isRoleAuthorized(java.lang.String roleName,
java.lang.String resourcePath,
java.lang.String action)
|
boolean |
PathBasedAccessControlAdmin.isRoleAuthorized(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
boolean |
PathBasedAuthorizer.isUserAuthorized(java.lang.String userName,
java.lang.String resourcePath,
java.lang.String action)
|
boolean |
PathBasedAccessControlAdmin.isUserAuthorized(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
Uses of UserStoreException in org.wso2.registry.users |
---|
Methods in org.wso2.registry.users that throw UserStoreException | |
---|---|
void |
UserStoreAdmin.addRole(java.lang.String roleName)
Add role to user store |
void |
UserStoreAdmin.addUser(java.lang.String userName,
java.lang.Object credential)
Add user to the user store |
void |
UserStoreAdmin.addUserToRole(java.lang.String userName,
java.lang.String roleName)
Add user to role |
void |
AccessControlAdmin.authorizeRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
Grant access to role |
void |
AccessControlAdmin.authorizeUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
Grant access to user. |
void |
AccessControlAdmin.clearResourceAuthorizations(java.lang.String resourceId)
Clears all authorizations on a Role |
void |
AccessControlAdmin.clearRoleAuthorization(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
Removes granted access from Role |
void |
AccessControlAdmin.clearUserAuthorization(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
Removes granted access from user |
void |
AccessControlAdmin.copyAuthorizations(java.lang.String fromResourceId,
java.lang.String toResourceId)
Duplicates granted/denied access |
void |
UserStoreAdmin.deleteRole(java.lang.String roleName)
Delete role from user store |
void |
UserStoreAdmin.deleteUser(java.lang.String userName)
Delete user from user store |
void |
AccessControlAdmin.denyRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
Deny access to role |
void |
AccessControlAdmin.denyUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
Deny access to user |
AccessControlAdmin |
UserRealm.getAccessControlAdmin()
The returned object can manipulate access controls |
java.lang.String[] |
Authorizer.getAllowedRolesForResource(java.lang.String resourceId,
java.lang.String action)
Returns all roles who are authorized to perform an action on a resource |
java.lang.String[] |
Authorizer.getAllowedUsersForResource(java.lang.String resourceId,
java.lang.String action)
Returns all users who are authorized to perform an action on a resource |
java.lang.String[] |
UserStoreReader.getAllRoleNames()
Retrieves all role names |
java.lang.String[] |
UserStoreReader.getAllUserNames()
Retrieves all user names |
org.wso2.authenticator.Authenticator |
UserRealm.getAuthenticator()
The returned object can perform authentication checks |
Authorizer |
UserRealm.getAuthorizer()
The returned object can perform authorization checks |
java.lang.String[] |
Authorizer.getDeniedRolesForResource(java.lang.String resourceId,
java.lang.String action)
Returns all roles who are authorized to perform an action on a resource |
java.lang.String[] |
Authorizer.getDeniedUsersForResource(java.lang.String resourceId,
java.lang.String action)
Returns all users who are authorized to perform an action on a resource |
java.lang.Object |
UserRealm.getRealmConfiguration()
Returns the realm configuration bean. |
java.util.Map |
UserStoreReader.getRoleProperties(java.lang.String roleName)
Retrieves role properties given the role name |
java.lang.String[] |
UserStoreReader.getUserNamesWithPropertyValue(java.lang.String propertyName,
java.lang.String propetyValue)
Retrieves user names with the given property values |
java.util.Map |
UserStoreReader.getUserProperties(java.lang.String userName)
Retrieves user properties given the user name |
java.lang.String[] |
UserStoreReader.getUserPropertyNames()
Retrieves user properties given the user name |
java.lang.String[] |
UserStoreReader.getUserRoles(java.lang.String userName)
Gets all user roles |
java.lang.String[] |
UserStoreReader.getUsersInRole(java.lang.String roleName)
Retrieves users in a role |
UserStoreAdmin |
UserRealm.getUserStoreAdmin()
The returned object can manipulate the user store |
UserStoreReader |
UserRealm.getUserStoreReader()
The returned object can read data from user store |
void |
UserRealm.init(java.lang.Object configBean)
Initializes the realm using the properties from the configuration bean passed in. |
boolean |
UserStoreReader.isExistingRole(java.lang.String roleName)
Checks whether a role exist in the user store |
boolean |
UserStoreReader.isExistingUser(java.lang.String userName)
Checks whether an user exist in the user store |
boolean |
Authorizer.isRoleAuthorized(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
Checks wheather an role is authorized to perfrom an action on a resource |
boolean |
Authorizer.isUserAuthorized(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
Checks wheather an user is authorized to perfrom an action on a resource |
void |
UserStoreAdmin.removeUserFromRole(java.lang.String userName,
java.lang.String roleName)
Delete user from role |
void |
UserStoreAdmin.setRoleProperties(java.lang.String roleName,
java.util.Map properties)
Set role properties in the user store |
void |
UserStoreAdmin.setUserProperties(java.lang.String userName,
java.util.Map properties)
Set user properties in the user store |
void |
UserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential)
Update method for admin |
void |
UserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential,
java.lang.Object oldCredential)
Update user in the user store |
Uses of UserStoreException in org.wso2.registry.users.accesscontrol |
---|
Subclasses of UserStoreException in org.wso2.registry.users.accesscontrol | |
---|---|
class |
UnauthorizedException
UnAuthorizedException is thrown when a user is not authorized. |
Methods in org.wso2.registry.users.accesscontrol that throw UserStoreException | |
---|---|
void |
ACLUserStoreAdmin.addRole(java.lang.String roleName)
Add role to user store |
void |
ACLUserStoreAdmin.addUser(java.lang.String userName,
java.lang.Object credential)
Add user to the user store |
void |
ACLUserStoreAdmin.addUserToRole(java.lang.String userName,
java.lang.String roleName)
Add user to role |
void |
ACLAccessControlAdmin.authorizeRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
Grant access to role |
void |
ACLAccessControlAdmin.authorizeUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
Authorize user |
void |
ACLAccessControlAdmin.clearResourceAuthorizations(java.lang.String resourceId)
Clears all authorizations on a Role |
void |
ACLAccessControlAdmin.clearRoleAuthorization(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
Removes granted access from Role |
void |
ACLAccessControlAdmin.clearUserAuthorization(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
Removes granted access from user |
void |
ACLAccessControlAdmin.copyAuthorizations(java.lang.String fromResourceId,
java.lang.String toResourceId)
Duplicates granted/denied access |
void |
ACLUserStoreAdmin.deleteRole(java.lang.String roleName)
Delete role from user store |
void |
ACLUserStoreAdmin.deleteUser(java.lang.String userName)
Delete user from user store |
void |
ACLAccessControlAdmin.denyRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
Deny access to role |
void |
ACLAccessControlAdmin.denyUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
Deny access to user |
protected void |
ACLAccessControlAdmin.doAuthorizationToAuthorize()
|
protected void |
ACLUserStoreReader.doAuthorizationToReadRole()
|
protected void |
ACLUserStoreReader.doAuthorizationToReadUser()
|
AccessControlAdmin |
AuthorizingRealm.getAccessControlAdmin()
|
java.lang.String[] |
ACLAuthorizer.getAllowedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
ACLAuthorizer.getAllowedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
ACLUserStoreReader.getAllRoleNames()
|
java.lang.String[] |
ACLUserStoreReader.getAllUserNames()
|
org.wso2.authenticator.Authenticator |
AuthorizingRealm.getAuthenticator()
|
Authorizer |
AuthorizingRealm.getAuthorizer()
|
java.lang.String[] |
ACLAuthorizer.getDeniedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
ACLAuthorizer.getDeniedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.Object |
AuthorizingRealm.getRealmConfiguration()
|
java.util.Map |
ACLUserStoreReader.getRoleProperties(java.lang.String roleName)
|
java.lang.String[] |
ACLUserStoreReader.getUserNamesWithPropertyValue(java.lang.String propertyName,
java.lang.String propetyValue)
|
java.util.Map |
ACLUserStoreReader.getUserProperties(java.lang.String userName)
|
java.lang.String[] |
ACLUserStoreReader.getUserPropertyNames()
|
java.lang.String[] |
ACLUserStoreReader.getUserRoles(java.lang.String userName)
|
java.lang.String[] |
ACLUserStoreReader.getUsersInRole(java.lang.String roleName)
|
UserStoreAdmin |
AuthorizingRealm.getUserStoreAdmin()
|
UserStoreReader |
AuthorizingRealm.getUserStoreReader()
|
void |
AuthorizingRealm.init(java.lang.Object configBean)
|
boolean |
ACLUserStoreReader.isExistingRole(java.lang.String roleName)
|
boolean |
ACLUserStoreReader.isExistingUser(java.lang.String userName)
|
boolean |
ACLAuthorizer.isRoleAuthorized(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
boolean |
ACLAuthorizer.isUserAuthorized(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
ACLUserStoreAdmin.removeUserFromRole(java.lang.String userName,
java.lang.String roleName)
Delete user from role |
void |
ACLUserStoreAdmin.setRoleProperties(java.lang.String roleName,
java.util.Map properties)
Set role properties in the user store |
void |
ACLUserStoreAdmin.setUserProperties(java.lang.String userName,
java.util.Map properties)
Set user properties in the user store |
void |
ACLUserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential)
|
void |
ACLUserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential,
java.lang.Object oldCredential)
Update user in the user store |
Uses of UserStoreException in org.wso2.registry.users.def |
---|
Methods in org.wso2.registry.users.def that throw UserStoreException | |
---|---|
protected void |
DefaultAccessControlAdmin.addAllowDenyRolePermission(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action,
short allow)
|
protected void |
DefaultAccessControlAdmin.addAllowDenyUserPermission(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action,
short allow)
|
void |
DefaultUserStoreAdmin.addRole(java.lang.String roleName)
|
void |
DefaultUserStoreAdmin.addUser(java.lang.String userName,
java.lang.Object credential)
|
void |
DefaultUserStoreAdmin.addUserToRole(java.lang.String userName,
java.lang.String roleName)
|
void |
DefaultAccessControlAdmin.authorizeRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
DefaultAccessControlAdmin.authorizeUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
DefaultAccessControlAdmin.clearResourceAuthorizations(java.lang.String resourceId)
|
void |
DefaultAccessControlAdmin.clearRoleAuthorization(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
DefaultAccessControlAdmin.clearUserAuthorization(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
DefaultAccessControlAdmin.copyAuthorizations(java.lang.String fromResourceId,
java.lang.String toResourceId)
|
void |
DefaultUserStoreAdmin.deleteRole(java.lang.String roleName)
|
void |
DefaultUserStoreAdmin.deleteUser(java.lang.String userName)
|
void |
DefaultAccessControlAdmin.denyRole(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
void |
DefaultAccessControlAdmin.denyUser(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
AccessControlAdmin |
DefaultRealm.getAccessControlAdmin()
|
java.lang.String[] |
DefaultAuthorizer.getAllowedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
DefaultAuthorizer.getAllowedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
DefaultUserStoreReader.getAllRoleNames()
|
java.lang.String[] |
DefaultUserStoreReader.getAllUserNames()
|
org.wso2.authenticator.Authenticator |
DefaultRealm.getAuthenticator()
|
Authorizer |
DefaultRealm.getAuthorizer()
|
java.lang.String[] |
DefaultAuthorizer.getDeniedRolesForResource(java.lang.String resourceId,
java.lang.String action)
|
java.lang.String[] |
DefaultAuthorizer.getDeniedUsersForResource(java.lang.String resourceId,
java.lang.String action)
|
protected int |
DefaultAccessControlAdmin.getOrAddPermissionId(java.sql.Connection dbConnection,
java.lang.String resourceId,
java.lang.String action)
Gets the permission if it exists, else create the permission and returns the id. |
java.lang.Object |
DefaultRealm.getRealmConfiguration()
|
java.util.Map |
DefaultUserStoreReader.getRoleProperties(java.lang.String roleName)
|
java.lang.String[] |
DefaultUserStoreReader.getUserNamesWithPropertyValue(java.lang.String propertyName,
java.lang.String propetyValue)
If propertyName is null then the value is searched If propertyName contains % then a likenss querry is searched |
java.util.Map |
DefaultUserStoreReader.getUserProperties(java.lang.String userName)
|
java.lang.String[] |
DefaultUserStoreReader.getUserPropertyNames()
|
java.lang.String[] |
DefaultUserStoreReader.getUserRoles(java.lang.String userName)
|
java.lang.String[] |
DefaultDataSupplier.getUserRoles(java.lang.String userName)
Retrieves the User Roles |
java.lang.String[] |
DefaultUserStoreReader.getUsersInRole(java.lang.String roleName)
|
UserStoreAdmin |
DefaultRealm.getUserStoreAdmin()
|
UserStoreReader |
DefaultRealm.getUserStoreReader()
|
void |
DefaultRealm.init(java.lang.Object configBean)
Initializes the realm using the properties from the configuration bean passed in. |
boolean |
DefaultUserStoreReader.isExistingRole(java.lang.String roleName)
|
boolean |
DefaultUserStoreReader.isExistingUser(java.lang.String userName)
|
boolean |
DefaultAuthorizer.isRoleAuthorized(java.lang.String roleName,
java.lang.String resourceId,
java.lang.String action)
|
boolean |
DefaultAuthorizer.isUserAuthorized(java.lang.String userName,
java.lang.String resourceId,
java.lang.String action)
|
void |
DefaultUserStoreAdmin.removeUserFromRole(java.lang.String userName,
java.lang.String roleName)
|
void |
DefaultUserStoreAdmin.setRoleProperties(java.lang.String roleName,
java.util.Map properties)
|
void |
DefaultUserStoreAdmin.setUserProperties(java.lang.String userName,
java.util.Map properties)
|
void |
DefaultUserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential)
|
void |
DefaultUserStoreAdmin.updateUser(java.lang.String userName,
java.lang.Object newCredential,
java.lang.Object oldCredential)
|
Uses of UserStoreException in org.wso2.registry.users.def.util |
---|
Methods in org.wso2.registry.users.def.util that throw UserStoreException | |
---|---|
static void |
DefaultDatabaseUtil.createDatabase(java.sql.Connection conn)
|
static int |
DefaultDatabaseUtil.getRoleId(java.sql.Connection dbConnection,
java.lang.String roleName)
|
java.lang.String |
DefaultDataSupplierImpl.getRoleId(java.lang.String roleName)
|
static int |
DefaultDatabaseUtil.getUserId(java.sql.Connection dbConnection,
java.lang.String userName)
|
java.lang.String |
DefaultDataSupplierImpl.getUserId(java.lang.String userName)
|
static java.lang.String[] |
DefaultDatabaseUtil.getUserRoles(java.sql.Connection dbConnection,
java.lang.String userName)
|
java.lang.String[] |
DefaultDataSupplierImpl.getUserRoles(java.lang.String userName)
|
Uses of UserStoreException in org.wso2.registry.users.verifier |
---|
Methods in org.wso2.registry.users.verifier that throw UserStoreException | |
---|---|
boolean |
EmailVerifier.confirmUser(java.lang.String confString)
The user has clicked on the string. |
protected static void |
EmailVerifier.createDatabase()
|
java.lang.String |
EmailVerifier.getUserName(java.lang.String confString)
Returns the user name for matching config string. |
static void |
EmailVerifier.init(UserRealm realmInstance,
EmailVerifierConfig verifierConfig)
Configures the Email Verifier |
void |
EmailVerifier.requestUserVerification(java.lang.String username,
java.lang.String emailAddress,
java.lang.String password,
java.util.Map properties,
java.lang.String salutation)
This method 1) Stores the user information. |
protected void |
EmailVerifier.sendEmail(java.lang.String confString,
java.lang.String emailAddr,
java.lang.String epr,
java.lang.String msgBody)
|
Uses of UserStoreException in org.wso2.registry.utils |
---|
Methods in org.wso2.registry.utils that throw UserStoreException | |
---|---|
static void |
AuthorizationUtils.populateUserStore(UserRealm realm)
Populates all necessary users, roles and authorizations related user store. |
|
||||||||||
PREV NEXT | FRAMES NO FRAMES |