#include <shibsp/handler/AssertionConsumerService.h>
Inheritance diagram for shibsp::AssertionConsumerService:
Public Member Functions | |
std::pair< bool, long > | run (SPRequest &request, bool isHandler=true) const |
Executes handler functionality as an incoming request. | |
void | receive (DDF &in, std::ostream &out) |
Remoted classes implement this method to process incoming messages. | |
const char * | getType () const |
Returns the "type" of the Handler plugin. | |
Protected Member Functions | |
AssertionConsumerService (const xercesc::DOMElement *e, const char *appId, xmltooling::logging::Category &log, xercesc::DOMNodeFilter *filter=NULL, const std::map< std::string, std::string > *remapper=NULL) | |
Constructor. | |
void | checkAddress (const Application &application, const xmltooling::HTTPRequest &httpRequest, const char *issuedTo) const |
Enforce address checking requirements. | |
void | generateMetadata (opensaml::saml2md::SPSSODescriptor &role, const char *handlerURL) const |
Generates and/or modifies metadata reflecting the Handler. | |
virtual opensaml::SecurityPolicy * | createSecurityPolicy (const Application &application, const xmltooling::QName *role, bool validate, const char *policyId) const |
Returns a SecurityPolicy instance to use for an incoming request. | |
virtual void | implementProtocol (const Application &application, const xmltooling::HTTPRequest &httpRequest, xmltooling::HTTPResponse &httpResponse, opensaml::SecurityPolicy &policy, const PropertySet *settings, const xmltooling::XMLObject &xmlObject) const =0 |
Implement protocol-specific handling of the incoming decoded message. | |
virtual void | extractMessageDetails (const opensaml::Assertion &assertion, const XMLCh *protocol, opensaml::SecurityPolicy &policy) const |
Extracts policy-relevant assertion details. | |
ResolutionContext * | resolveAttributes (const Application &application, const opensaml::saml2md::RoleDescriptor *issuer=NULL, const XMLCh *protocol=NULL, const opensaml::saml1::NameIdentifier *v1nameid=NULL, const opensaml::saml2::NameID *nameid=NULL, const XMLCh *authncontext_class=NULL, const XMLCh *authncontext_decl=NULL, const std::vector< const opensaml::Assertion * > *tokens=NULL) const |
Attempt SSO-initiated attribute resolution using the supplied information, including NameID and token extraction and filtering followed by secondary resolution. |
|
Constructor.
|
|
Enforce address checking requirements.
|
|
Returns a SecurityPolicy instance to use for an incoming request. Allows handlers to customize the type of policy object their policy rules might require. The caller MUST lock the application's MetadataProvider for the life of the returned object.
|
|
Extracts policy-relevant assertion details.
|
|
Generates and/or modifies metadata reflecting the Handler. The default implementation does nothing.
Reimplemented from shibsp::Handler. |
|
Returns the "type" of the Handler plugin.
Reimplemented from shibsp::Handler. |
|
Implement protocol-specific handling of the incoming decoded message. The result of implementing the protocol should be an exception or modifications to the request/response objects to reflect processing of the message.
|
|
Remoted classes implement this method to process incoming messages.
Implements shibsp::Remoted. |
|
Attempt SSO-initiated attribute resolution using the supplied information, including NameID and token extraction and filtering followed by secondary resolution. The caller must free the returned context handle.
|
|
Executes handler functionality as an incoming request. Handlers can be run either directly by incoming web requests or indirectly/implicitly during other SP processing.
Implements shibsp::Handler. |