@rockcarver/frodo-lib 0.16.2-8 → 0.17.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (434) hide show
  1. package/CHANGELOG.md +221 -1
  2. package/cjs/api/AgentApi.js +14 -61
  3. package/cjs/api/AgentApi.js.map +1 -1
  4. package/cjs/api/AgentApi.test.js.map +1 -1
  5. package/cjs/api/ApiTypes.js +0 -5
  6. package/cjs/api/ApiTypes.js.map +1 -1
  7. package/cjs/api/AuthenticateApi.js +9 -20
  8. package/cjs/api/AuthenticateApi.js.map +1 -1
  9. package/cjs/api/AuthenticateApi.test.js.map +1 -0
  10. package/cjs/api/BaseApi.js +82 -124
  11. package/cjs/api/BaseApi.js.map +1 -1
  12. package/cjs/api/CirclesOfTrustApi.js +8 -32
  13. package/cjs/api/CirclesOfTrustApi.js.map +1 -1
  14. package/cjs/api/IdmConfigApi.js +9 -34
  15. package/cjs/api/IdmConfigApi.js.map +1 -1
  16. package/cjs/api/LogApi.js +8 -31
  17. package/cjs/api/LogApi.js.map +1 -1
  18. package/cjs/api/ManagedObjectApi.js +34 -31
  19. package/cjs/api/ManagedObjectApi.js.map +1 -1
  20. package/cjs/api/NodeApi.js +10 -41
  21. package/cjs/api/NodeApi.js.map +1 -1
  22. package/cjs/api/NodeApi.test.js.map +1 -1
  23. package/cjs/api/OAuth2ClientApi.js +7 -26
  24. package/cjs/api/OAuth2ClientApi.js.map +1 -1
  25. package/cjs/api/OAuth2OIDCApi.js +28 -34
  26. package/cjs/api/OAuth2OIDCApi.js.map +1 -1
  27. package/cjs/api/OAuth2OIDCApi.test.js.map +1 -0
  28. package/cjs/api/OAuth2ProviderApi.js +5 -15
  29. package/cjs/api/OAuth2ProviderApi.js.map +1 -1
  30. package/cjs/api/RealmApi.js +8 -34
  31. package/cjs/api/RealmApi.js.map +1 -1
  32. package/cjs/api/Saml2Api.js +32 -118
  33. package/cjs/api/Saml2Api.js.map +1 -1
  34. package/cjs/api/ScriptApi.js +8 -30
  35. package/cjs/api/ScriptApi.js.map +1 -1
  36. package/cjs/api/SecretsApi.js +14 -64
  37. package/cjs/api/SecretsApi.js.map +1 -1
  38. package/cjs/api/SecretsApi.test.js.map +1 -1
  39. package/cjs/api/ServerInfoApi.js +6 -21
  40. package/cjs/api/ServerInfoApi.js.map +1 -1
  41. package/cjs/api/ServiceApi.js +49 -47
  42. package/cjs/api/ServiceApi.js.map +1 -1
  43. package/cjs/api/SocialIdentityProvidersApi.js +9 -36
  44. package/cjs/api/SocialIdentityProvidersApi.js.map +1 -1
  45. package/cjs/api/StartupApi.js +5 -24
  46. package/cjs/api/StartupApi.js.map +1 -1
  47. package/cjs/api/StartupApi.test.js.map +1 -1
  48. package/cjs/api/TreeApi.js +8 -30
  49. package/cjs/api/TreeApi.js.map +1 -1
  50. package/cjs/api/TreeApi.test.js.map +1 -1
  51. package/cjs/api/VariablesApi.js +9 -37
  52. package/cjs/api/VariablesApi.js.map +1 -1
  53. package/cjs/api/VariablesApi.test.js.map +1 -1
  54. package/cjs/api/utils/ApiUtils.js +47 -57
  55. package/cjs/api/utils/ApiUtils.js.map +1 -1
  56. package/cjs/api/utils/ApiUtils.test.js.map +1 -1
  57. package/cjs/api/utils/Base64.js +6 -15
  58. package/cjs/api/utils/Base64.js.map +1 -1
  59. package/cjs/ext/axios-curlirize/curlirize.js +2 -9
  60. package/cjs/ext/axios-curlirize/curlirize.js.map +1 -1
  61. package/cjs/ext/axios-curlirize/lib/CurlHelper.js +7 -22
  62. package/cjs/ext/axios-curlirize/lib/CurlHelper.js.map +1 -1
  63. package/cjs/index.js +30 -89
  64. package/cjs/index.js.map +1 -1
  65. package/cjs/ops/AdminOps.js +27 -165
  66. package/cjs/ops/AdminOps.js.map +1 -1
  67. package/cjs/ops/AgentOps.js +3 -160
  68. package/cjs/ops/AgentOps.js.map +1 -1
  69. package/cjs/ops/AgentOps.test.js.map +1 -1
  70. package/cjs/ops/AuthenticateOps.js +265 -226
  71. package/cjs/ops/AuthenticateOps.js.map +1 -1
  72. package/cjs/ops/AuthenticateOps.test.js.map +1 -1
  73. package/cjs/ops/CirclesOfTrustOps.js +13 -91
  74. package/cjs/ops/CirclesOfTrustOps.js.map +1 -1
  75. package/cjs/ops/ConnectionProfileOps.js +220 -136
  76. package/cjs/ops/ConnectionProfileOps.js.map +1 -1
  77. package/cjs/ops/ConnectionProfileOps.test.js.map +1 -1
  78. package/cjs/ops/EmailTemplateOps.js +35 -379
  79. package/cjs/ops/EmailTemplateOps.js.map +1 -1
  80. package/cjs/ops/EmailTemplateOps.test.js.map +1 -1
  81. package/cjs/ops/IdmOps.js +52 -426
  82. package/cjs/ops/IdmOps.js.map +1 -1
  83. package/cjs/ops/IdmOps.test.js.map +1 -1
  84. package/cjs/ops/IdpOps.js +11 -94
  85. package/cjs/ops/IdpOps.js.map +1 -1
  86. package/cjs/ops/IdpOps.test.js.map +1 -1
  87. package/cjs/ops/JoseOps.js +81 -0
  88. package/cjs/ops/JoseOps.js.map +1 -0
  89. package/cjs/ops/JoseOps.test.js.map +1 -0
  90. package/cjs/ops/JourneyOps.js +140 -371
  91. package/cjs/ops/JourneyOps.js.map +1 -1
  92. package/cjs/ops/JourneyOps.test.js.map +1 -1
  93. package/cjs/ops/LogOps.js +14 -47
  94. package/cjs/ops/LogOps.js.map +1 -1
  95. package/cjs/ops/ManagedObjectOps.js +4 -12
  96. package/cjs/ops/ManagedObjectOps.js.map +1 -1
  97. package/cjs/ops/NodeOps.js +9 -67
  98. package/cjs/ops/NodeOps.js.map +1 -1
  99. package/cjs/ops/OAuth2ClientOps.js +10 -40
  100. package/cjs/ops/OAuth2ClientOps.js.map +1 -1
  101. package/cjs/ops/OpsTypes.js +0 -5
  102. package/cjs/ops/OpsTypes.js.map +1 -1
  103. package/cjs/ops/OrganizationOps.js +6 -25
  104. package/cjs/ops/OrganizationOps.js.map +1 -1
  105. package/cjs/ops/RealmOps.js +0 -19
  106. package/cjs/ops/RealmOps.js.map +1 -1
  107. package/cjs/ops/Saml2Ops.js +258 -802
  108. package/cjs/ops/Saml2Ops.js.map +1 -1
  109. package/cjs/ops/Saml2Ops.test.js.map +1 -1
  110. package/cjs/ops/ScriptOps.js +28 -73
  111. package/cjs/ops/ScriptOps.js.map +1 -1
  112. package/cjs/ops/SecretsOps.js +2 -58
  113. package/cjs/ops/SecretsOps.js.map +1 -1
  114. package/cjs/ops/ServiceAccountOps.js +61 -0
  115. package/cjs/ops/ServiceAccountOps.js.map +1 -0
  116. package/cjs/ops/ServiceAccountOps.test.js.map +1 -0
  117. package/cjs/ops/ServiceOps.js +55 -101
  118. package/cjs/ops/ServiceOps.js.map +1 -1
  119. package/cjs/ops/StartupOps.js +2 -23
  120. package/cjs/ops/StartupOps.js.map +1 -1
  121. package/cjs/ops/ThemeOps.js +230 -436
  122. package/cjs/ops/ThemeOps.js.map +1 -1
  123. package/cjs/ops/ThemeOps.test.js.map +1 -0
  124. package/cjs/ops/VariablesOps.js +0 -38
  125. package/cjs/ops/VariablesOps.js.map +1 -1
  126. package/cjs/ops/utils/Console.js +29 -62
  127. package/cjs/ops/utils/Console.js.map +1 -1
  128. package/cjs/ops/utils/DataProtection.js +13 -47
  129. package/cjs/ops/utils/DataProtection.js.map +1 -1
  130. package/cjs/ops/utils/DataProtection.test.js.map +1 -1
  131. package/cjs/ops/utils/ExportImportUtils.js +36 -74
  132. package/cjs/ops/utils/ExportImportUtils.js.map +1 -1
  133. package/cjs/ops/utils/ExportImportUtils.test.js.map +1 -1
  134. package/cjs/ops/utils/OpsUtils.js +27 -43
  135. package/cjs/ops/utils/OpsUtils.js.map +1 -1
  136. package/cjs/ops/utils/OpsUtils.test.js.map +1 -1
  137. package/cjs/ops/utils/ValidationUtils.js +0 -13
  138. package/cjs/ops/utils/ValidationUtils.js.map +1 -1
  139. package/cjs/ops/utils/ValidationUtils.test.js.map +1 -1
  140. package/cjs/ops/utils/Version.js +2 -12
  141. package/cjs/ops/utils/Version.js.map +1 -1
  142. package/cjs/ops/utils/Version.test.js.map +1 -1
  143. package/cjs/ops/utils/Wordwrap.js +1 -2
  144. package/cjs/ops/utils/Wordwrap.js.map +1 -1
  145. package/cjs/ops/utils/Wordwrap.test.js.map +1 -0
  146. package/cjs/shared/State.js +239 -0
  147. package/cjs/shared/State.js.map +1 -0
  148. package/cjs/shared/State.test.js.map +1 -0
  149. package/cjs/storage/StaticStorage.js.map +1 -1
  150. package/cjs/test/mocks/AuthenticateApi/step/default_steps.json +88 -0
  151. package/cjs/test/mocks/ForgeRockApiMockEngine.js +184 -80
  152. package/cjs/test/mocks/ForgeRockApiMockEngine.js.map +1 -1
  153. package/cjs/test/mocks/IdmConfigApi/getConfigEntity/managed.json +4420 -0
  154. package/cjs/test/mocks/OAuth2OIDCApi/accessToken/body.json +6 -0
  155. package/cjs/test/mocks/OAuth2OIDCApi/accessToken/headers.json +19 -0
  156. package/cjs/test/mocks/OAuth2OIDCApi/authorize/headers.json +38 -0
  157. package/cjs/test/mocks/Saml2Api/findSaml2Providers/https:sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a_stub.json +18 -0
  158. package/cjs/test/mocks/Saml2Api/findSaml2Providers/iSPAzure_stub.json +18 -0
  159. package/cjs/test/mocks/Saml2Api/getProvider/aVNQQXp1cmU.json +1 -2
  160. package/cjs/test/mocks/Saml2Api/getProvider/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  161. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/U1BBenVyZQ.json +147 -0
  162. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQXp1cmU.json +182 -0
  163. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20.json +149 -0
  164. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQRmVkbGV0.json +141 -0
  165. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aVNQQXp1cmU.json +1 -2
  166. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/dm9sa2VyRGV2U1A.json +118 -0
  167. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zYW1sLm15dGVzdHJ1bi5jb20vc3A.json +66 -0
  168. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zdHMud2luZG93cy5uZXQvNzExZmZhOWMtNTk3Mi00NzEzLWFjZTMtNjg4Yzk3MzI2MTRhLw.json +35 -0
  169. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aWRw.json +83 -0
  170. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  171. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/SPAzure.xml +74 -0
  172. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPAzure.xml +78 -0
  173. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPBroadcom.xml +78 -0
  174. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPFedlet.xml +78 -0
  175. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fsaml.mytestrun.com%2Fsp.xml +13 -0
  176. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/{dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.xml → https%3A%2F%2Fsts.windows.net%2F711ffa9c-5972-4713-ace3-688c9732614a%2F.xml} +0 -0
  177. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/{aVNQQXp1cmU.xml → iSPAzure.xml} +0 -0
  178. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/urn%3Afederation%3AMicrosoftOnline.xml +84 -0
  179. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/SPAzure.saml.json +243 -0
  180. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/iSPAzure.saml.json +242 -0
  181. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPAzure.saml.json +454 -0
  182. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPBroadcom.saml.json +586 -0
  183. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPFedlet.saml.json +241 -0
  184. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idp.saml.json +185 -0
  185. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/saml.mytestrun.comsp.saml.json +101 -0
  186. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a.saml.json +113 -0
  187. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/urn:federation:MicrosoftOnline.saml.json +199 -0
  188. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/volkerDevSP.saml.json +212 -0
  189. package/cjs/test/mocks/Saml2Ops/importSaml2Providers/allAlphaProviders.saml.json +2414 -0
  190. package/cjs/test/mocks/ScriptApi/getScript/5b29c5b7-b161-4a42-a41f-d6c85316b951.json +13 -0
  191. package/cjs/test/mocks/ScriptApi/getScript/85523e71-2d77-4577-b078-6f9674cc54e2.json +13 -0
  192. package/cjs/test/mocks/ScriptApi/getScript/90c4eca5-05f0-42f5-b9bf-88b693eabbbd.json +13 -0
  193. package/cjs/test/mocks/ServerInfoApi/getServerInfo/info.json +25 -0
  194. package/cjs/test/mocks/ServerInfoApi/getServerVersionInfo/version.json +8 -0
  195. package/cjs/utils/AutoSetupPolly.js +79 -0
  196. package/cjs/utils/AutoSetupPolly.js.map +1 -0
  197. package/cjs/utils/SetupJest.js +6 -0
  198. package/cjs/utils/SetupJest.js.map +1 -0
  199. package/cjs/{test/mocks → utils}/snapshotResolve.js +10 -12
  200. package/cjs/utils/snapshotResolve.js.map +1 -0
  201. package/esm/api/AgentApi.mjs +19 -21
  202. package/esm/api/AgentApi.test.mjs +6 -15
  203. package/esm/api/ApiTypes.mjs +0 -5
  204. package/esm/api/AuthenticateApi.mjs +7 -10
  205. package/esm/api/AuthenticateApi.test.mjs +39 -0
  206. package/esm/api/BaseApi.mjs +96 -81
  207. package/esm/api/CirclesOfTrustApi.mjs +9 -12
  208. package/esm/api/IdmConfigApi.mjs +11 -12
  209. package/esm/api/LogApi.mjs +6 -10
  210. package/esm/api/ManagedObjectApi.mjs +23 -8
  211. package/esm/api/NodeApi.mjs +13 -15
  212. package/esm/api/NodeApi.test.mjs +13 -17
  213. package/esm/api/OAuth2ClientApi.mjs +7 -9
  214. package/esm/api/OAuth2OIDCApi.mjs +15 -9
  215. package/esm/api/OAuth2OIDCApi.test.mjs +53 -0
  216. package/esm/api/OAuth2ProviderApi.mjs +3 -5
  217. package/esm/api/RealmApi.mjs +10 -13
  218. package/esm/api/Saml2Api.mjs +31 -61
  219. package/esm/api/ScriptApi.mjs +9 -11
  220. package/esm/api/SecretsApi.mjs +21 -24
  221. package/esm/api/SecretsApi.test.mjs +9 -31
  222. package/esm/api/ServerInfoApi.mjs +5 -9
  223. package/esm/api/ServiceApi.mjs +53 -26
  224. package/esm/api/SocialIdentityProvidersApi.mjs +11 -13
  225. package/esm/api/StartupApi.mjs +5 -10
  226. package/esm/api/StartupApi.test.mjs +4 -7
  227. package/esm/api/TreeApi.mjs +9 -11
  228. package/esm/api/TreeApi.test.mjs +24 -61
  229. package/esm/api/VariablesApi.mjs +11 -13
  230. package/esm/api/VariablesApi.test.mjs +80 -222
  231. package/esm/api/utils/ApiUtils.mjs +45 -48
  232. package/esm/api/utils/ApiUtils.test.mjs +33 -32
  233. package/esm/api/utils/Base64.mjs +6 -9
  234. package/esm/ext/axios-curlirize/curlirize.mjs +2 -7
  235. package/esm/ext/axios-curlirize/lib/CurlHelper.mjs +7 -20
  236. package/esm/index.mjs +23 -13
  237. package/esm/ops/AdminOps.mjs +33 -119
  238. package/esm/ops/AgentOps.mjs +38 -81
  239. package/esm/ops/AgentOps.test.mjs +5 -45
  240. package/esm/ops/AuthenticateOps.mjs +241 -175
  241. package/esm/ops/AuthenticateOps.test.mjs +7 -9
  242. package/esm/ops/CirclesOfTrustOps.mjs +24 -61
  243. package/esm/ops/ConnectionProfileOps.mjs +192 -82
  244. package/esm/ops/ConnectionProfileOps.test.mjs +19 -19
  245. package/esm/ops/EmailTemplateOps.mjs +18 -276
  246. package/esm/ops/EmailTemplateOps.test.mjs +19 -44
  247. package/esm/ops/IdmOps.mjs +30 -327
  248. package/esm/ops/IdmOps.test.mjs +47 -54
  249. package/esm/ops/IdpOps.mjs +21 -59
  250. package/esm/ops/IdpOps.test.mjs +5 -5
  251. package/esm/ops/JoseOps.mjs +41 -0
  252. package/esm/ops/JoseOps.test.mjs +137 -0
  253. package/esm/ops/JourneyOps.mjs +147 -290
  254. package/esm/ops/JourneyOps.test.mjs +30 -28
  255. package/esm/ops/LogOps.mjs +15 -25
  256. package/esm/ops/ManagedObjectOps.mjs +6 -6
  257. package/esm/ops/NodeOps.mjs +9 -47
  258. package/esm/ops/OAuth2ClientOps.mjs +13 -19
  259. package/esm/ops/OpsTypes.mjs +1 -3
  260. package/esm/ops/OrganizationOps.mjs +7 -14
  261. package/esm/ops/RealmOps.mjs +4 -7
  262. package/esm/ops/Saml2Ops.mjs +199 -587
  263. package/esm/ops/Saml2Ops.test.mjs +303 -84
  264. package/esm/ops/ScriptOps.mjs +31 -47
  265. package/esm/ops/SecretsOps.mjs +15 -31
  266. package/esm/ops/ServiceAccountOps.mjs +41 -0
  267. package/esm/ops/ServiceAccountOps.test.mjs +51 -0
  268. package/esm/ops/ServiceOps.mjs +66 -83
  269. package/esm/ops/StartupOps.mjs +4 -13
  270. package/esm/ops/ThemeOps.mjs +189 -298
  271. package/esm/{api/ThemeApi.test.mjs → ops/ThemeOps.test.mjs} +91 -96
  272. package/esm/ops/VariablesOps.mjs +9 -18
  273. package/esm/ops/utils/Console.mjs +28 -46
  274. package/esm/ops/utils/DataProtection.mjs +15 -28
  275. package/esm/ops/utils/DataProtection.test.mjs +8 -8
  276. package/esm/ops/utils/ExportImportUtils.mjs +34 -43
  277. package/esm/ops/utils/ExportImportUtils.test.mjs +20 -18
  278. package/esm/ops/utils/OpsUtils.mjs +27 -21
  279. package/esm/ops/utils/OpsUtils.test.mjs +155 -27
  280. package/esm/ops/utils/ValidationUtils.mjs +0 -9
  281. package/esm/ops/utils/Version.mjs +2 -3
  282. package/esm/ops/utils/Version.test.mjs +0 -2
  283. package/esm/ops/utils/Wordwrap.mjs +1 -1
  284. package/esm/ops/utils/Wordwrap.test.mjs +19 -0
  285. package/esm/shared/State.mjs +164 -0
  286. package/esm/shared/State.test.mjs +249 -0
  287. package/esm/test/mocks/AuthenticateApi/step/default_steps.json +88 -0
  288. package/esm/test/mocks/ForgeRockApiMockEngine.mjs +169 -33
  289. package/esm/test/mocks/IdmConfigApi/getConfigEntity/managed.json +4420 -0
  290. package/esm/test/mocks/OAuth2OIDCApi/accessToken/body.json +6 -0
  291. package/esm/test/mocks/OAuth2OIDCApi/accessToken/headers.json +19 -0
  292. package/esm/test/mocks/OAuth2OIDCApi/authorize/headers.json +38 -0
  293. package/esm/test/mocks/Saml2Api/findSaml2Providers/https:sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a_stub.json +18 -0
  294. package/esm/test/mocks/Saml2Api/findSaml2Providers/iSPAzure_stub.json +18 -0
  295. package/esm/test/mocks/Saml2Api/getProvider/aVNQQXp1cmU.json +1 -2
  296. package/esm/test/mocks/Saml2Api/getProvider/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  297. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/U1BBenVyZQ.json +147 -0
  298. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQXp1cmU.json +182 -0
  299. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20.json +149 -0
  300. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQRmVkbGV0.json +141 -0
  301. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aVNQQXp1cmU.json +1 -2
  302. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/dm9sa2VyRGV2U1A.json +118 -0
  303. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zYW1sLm15dGVzdHJ1bi5jb20vc3A.json +66 -0
  304. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zdHMud2luZG93cy5uZXQvNzExZmZhOWMtNTk3Mi00NzEzLWFjZTMtNjg4Yzk3MzI2MTRhLw.json +35 -0
  305. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aWRw.json +83 -0
  306. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  307. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/SPAzure.xml +74 -0
  308. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPAzure.xml +78 -0
  309. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPBroadcom.xml +78 -0
  310. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPFedlet.xml +78 -0
  311. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fsaml.mytestrun.com%2Fsp.xml +13 -0
  312. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/{dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.xml → https%3A%2F%2Fsts.windows.net%2F711ffa9c-5972-4713-ace3-688c9732614a%2F.xml} +0 -0
  313. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/{aVNQQXp1cmU.xml → iSPAzure.xml} +0 -0
  314. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/urn%3Afederation%3AMicrosoftOnline.xml +84 -0
  315. package/esm/test/mocks/Saml2Ops/importSaml2Provider/SPAzure.saml.json +243 -0
  316. package/esm/test/mocks/Saml2Ops/importSaml2Provider/iSPAzure.saml.json +242 -0
  317. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPAzure.saml.json +454 -0
  318. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPBroadcom.saml.json +586 -0
  319. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPFedlet.saml.json +241 -0
  320. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idp.saml.json +185 -0
  321. package/esm/test/mocks/Saml2Ops/importSaml2Provider/saml.mytestrun.comsp.saml.json +101 -0
  322. package/esm/test/mocks/Saml2Ops/importSaml2Provider/sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a.saml.json +113 -0
  323. package/esm/test/mocks/Saml2Ops/importSaml2Provider/urn:federation:MicrosoftOnline.saml.json +199 -0
  324. package/esm/test/mocks/Saml2Ops/importSaml2Provider/volkerDevSP.saml.json +212 -0
  325. package/esm/test/mocks/Saml2Ops/importSaml2Providers/allAlphaProviders.saml.json +2414 -0
  326. package/esm/test/mocks/ScriptApi/getScript/5b29c5b7-b161-4a42-a41f-d6c85316b951.json +13 -0
  327. package/esm/test/mocks/ScriptApi/getScript/85523e71-2d77-4577-b078-6f9674cc54e2.json +13 -0
  328. package/esm/test/mocks/ScriptApi/getScript/90c4eca5-05f0-42f5-b9bf-88b693eabbbd.json +13 -0
  329. package/esm/test/mocks/ServerInfoApi/getServerInfo/info.json +25 -0
  330. package/esm/test/mocks/ServerInfoApi/getServerVersionInfo/version.json +8 -0
  331. package/esm/utils/AutoSetupPolly.mjs +72 -0
  332. package/esm/utils/SetupJest.mjs +3 -0
  333. package/esm/{test/mocks → utils}/snapshotResolve.mjs +10 -12
  334. package/package.json +38 -27
  335. package/types/api/AgentApi.d.ts.map +1 -1
  336. package/types/api/ApiTypes.d.ts +19 -15
  337. package/types/api/ApiTypes.d.ts.map +1 -1
  338. package/types/api/AuthenticateApi.d.ts +1 -1
  339. package/types/api/AuthenticateApi.d.ts.map +1 -1
  340. package/types/api/BaseApi.d.ts +2 -0
  341. package/types/api/BaseApi.d.ts.map +1 -1
  342. package/types/api/CirclesOfTrustApi.d.ts.map +1 -1
  343. package/types/api/IdmConfigApi.d.ts.map +1 -1
  344. package/types/api/LogApi.d.ts.map +1 -1
  345. package/types/api/ManagedObjectApi.d.ts +9 -1
  346. package/types/api/ManagedObjectApi.d.ts.map +1 -1
  347. package/types/api/NodeApi.d.ts.map +1 -1
  348. package/types/api/OAuth2ClientApi.d.ts.map +1 -1
  349. package/types/api/OAuth2OIDCApi.d.ts +4 -2
  350. package/types/api/OAuth2OIDCApi.d.ts.map +1 -1
  351. package/types/api/OAuth2ProviderApi.d.ts.map +1 -1
  352. package/types/api/RealmApi.d.ts.map +1 -1
  353. package/types/api/Saml2Api.d.ts +7 -13
  354. package/types/api/Saml2Api.d.ts.map +1 -1
  355. package/types/api/ScriptApi.d.ts.map +1 -1
  356. package/types/api/SecretsApi.d.ts.map +1 -1
  357. package/types/api/ServerInfoApi.d.ts.map +1 -1
  358. package/types/api/ServiceApi.d.ts +14 -7
  359. package/types/api/ServiceApi.d.ts.map +1 -1
  360. package/types/api/SocialIdentityProvidersApi.d.ts.map +1 -1
  361. package/types/api/StartupApi.d.ts.map +1 -1
  362. package/types/api/TreeApi.d.ts.map +1 -1
  363. package/types/api/VariablesApi.d.ts.map +1 -1
  364. package/types/api/utils/ApiUtils.d.ts +1 -0
  365. package/types/api/utils/ApiUtils.d.ts.map +1 -1
  366. package/types/api/utils/Base64.d.ts +1 -0
  367. package/types/api/utils/Base64.d.ts.map +1 -1
  368. package/types/index.d.ts +11 -5
  369. package/types/index.d.ts.map +1 -1
  370. package/types/ops/AgentOps.d.ts +1 -1
  371. package/types/ops/AgentOps.d.ts.map +1 -1
  372. package/types/ops/AuthenticateOps.d.ts +10 -2
  373. package/types/ops/AuthenticateOps.d.ts.map +1 -1
  374. package/types/ops/ConnectionProfileOps.d.ts +49 -21
  375. package/types/ops/ConnectionProfileOps.d.ts.map +1 -1
  376. package/types/ops/EmailTemplateOps.d.ts +14 -33
  377. package/types/ops/EmailTemplateOps.d.ts.map +1 -1
  378. package/types/ops/IdmOps.d.ts +29 -37
  379. package/types/ops/IdmOps.d.ts.map +1 -1
  380. package/types/ops/JoseOps.d.ts +33 -0
  381. package/types/ops/JoseOps.d.ts.map +1 -0
  382. package/types/ops/JourneyOps.d.ts.map +1 -1
  383. package/types/ops/LogOps.d.ts.map +1 -1
  384. package/types/ops/NodeOps.d.ts.map +1 -1
  385. package/types/ops/OAuth2ClientOps.d.ts.map +1 -1
  386. package/types/ops/OpsTypes.d.ts +17 -1
  387. package/types/ops/OpsTypes.d.ts.map +1 -1
  388. package/types/ops/OrganizationOps.d.ts.map +1 -1
  389. package/types/ops/Saml2Ops.d.ts +52 -55
  390. package/types/ops/Saml2Ops.d.ts.map +1 -1
  391. package/types/ops/ScriptOps.d.ts.map +1 -1
  392. package/types/ops/ServiceAccountOps.d.ts +20 -0
  393. package/types/ops/ServiceAccountOps.d.ts.map +1 -0
  394. package/types/ops/ServiceOps.d.ts +18 -10
  395. package/types/ops/ServiceOps.d.ts.map +1 -1
  396. package/types/ops/ThemeOps.d.ts +35 -50
  397. package/types/ops/ThemeOps.d.ts.map +1 -1
  398. package/types/ops/utils/Console.d.ts +1 -1
  399. package/types/ops/utils/Console.d.ts.map +1 -1
  400. package/types/ops/utils/DataProtection.d.ts.map +1 -1
  401. package/types/ops/utils/ExportImportUtils.d.ts +5 -2
  402. package/types/ops/utils/ExportImportUtils.d.ts.map +1 -1
  403. package/types/ops/utils/OpsUtils.d.ts +6 -0
  404. package/types/ops/utils/OpsUtils.d.ts.map +1 -1
  405. package/types/ops/utils/Wordwrap.d.ts.map +1 -1
  406. package/types/shared/State.d.ts +223 -0
  407. package/types/shared/State.d.ts.map +1 -0
  408. package/types/test/mocks/ForgeRockApiMockEngine.d.ts +21 -1
  409. package/types/test/mocks/ForgeRockApiMockEngine.d.ts.map +1 -1
  410. package/types/utils/AutoSetupPolly.d.ts +1 -0
  411. package/types/utils/AutoSetupPolly.d.ts.map +1 -0
  412. package/types/utils/SetupJest.d.ts +1 -0
  413. package/types/utils/SetupJest.d.ts.map +1 -0
  414. package/types/utils/snapshotResolve.d.ts +1 -0
  415. package/types/utils/snapshotResolve.d.ts.map +1 -0
  416. package/cjs/api/EmailTemplateApi.js +0 -73
  417. package/cjs/api/EmailTemplateApi.js.map +0 -1
  418. package/cjs/api/ThemeApi.js +0 -367
  419. package/cjs/api/ThemeApi.js.map +0 -1
  420. package/cjs/api/ThemeApi.test.js.map +0 -1
  421. package/cjs/storage/SessionStorage.js +0 -91
  422. package/cjs/storage/SessionStorage.js.map +0 -1
  423. package/cjs/test/mocks/snapshotResolve.js.map +0 -1
  424. package/esm/api/EmailTemplateApi.mjs +0 -34
  425. package/esm/api/ThemeApi.mjs +0 -271
  426. package/esm/storage/SessionStorage.mjs +0 -79
  427. package/types/api/EmailTemplateApi.d.ts +0 -22
  428. package/types/api/EmailTemplateApi.d.ts.map +0 -1
  429. package/types/api/ThemeApi.d.ts +0 -56
  430. package/types/api/ThemeApi.d.ts.map +0 -1
  431. package/types/storage/SessionStorage.d.ts +0 -71
  432. package/types/storage/SessionStorage.d.ts.map +0 -1
  433. package/types/test/mocks/snapshotResolve.d.ts +0 -1
  434. package/types/test/mocks/snapshotResolve.d.ts.map +0 -1
@@ -0,0 +1,586 @@
1
+ {
2
+ "meta": {
3
+ "origin": "https://openam-volker-dev.forgeblocks.com/am",
4
+ "originAmVersion": "7.3.0",
5
+ "exportedBy": "volker.scheuber@forgerock.com",
6
+ "exportDate": "2022-11-20T01:31:37.655Z",
7
+ "exportTool": "frodo",
8
+ "exportToolVersion": "v0.16.2-8 [v18.7.0]"
9
+ },
10
+ "script": {
11
+ "90c4eca5-05f0-42f5-b9bf-88b693eabbbd": {
12
+ "_id": "90c4eca5-05f0-42f5-b9bf-88b693eabbbd",
13
+ "name": "Saml2 IDP Attribute Mapper Script",
14
+ "description": null,
15
+ "script": [
16
+ "/*",
17
+ " * Copyright 2021 ForgeRock AS. All Rights Reserved",
18
+ " * Use of this code requires a commercial software license with ForgeRock AS.",
19
+ " * or with one of its affiliates. All use shall be exclusively subject",
20
+ " * to such license between the licensee and ForgeRock AS.",
21
+ " */",
22
+ "",
23
+ "/*",
24
+ " * This script returns a list of SAML Attribute objects for the IDP framework to insert into the generated Assertion.",
25
+ " *",
26
+ " * Defined variables:",
27
+ " * session - SSOToken (1)",
28
+ " * The single sign-on session.",
29
+ " * hostedEntityId - String (primitive).",
30
+ " * The hosted entity ID.",
31
+ " * remoteEntityId - String (primitive).",
32
+ " * The remote entity ID.",
33
+ " * realm - String (primitive).",
34
+ " * The name of the realm the user is authenticating to.",
35
+ " * logger - Always present, the debug logger instance:",
36
+ " * https://backstage.forgerock.com/docs/am/7/scripting-guide/scripting-api-global-logger.html#scripting-api-global-logger.",
37
+ " * Corresponding log files will be prefixed with: scripts.SAML2_IDP_ATTRIBUTE_MAPPER",
38
+ " * idpAttributeMapperScriptHelper - IdpAttributeMapperScriptHelper (2)",
39
+ " * - An IdpAttributeMapperScriptHelper instance containing methods used for IDP attribute mapping.",
40
+ " *",
41
+ " * Throws SAML2Exception:",
42
+ " * - on failing to map the IDP attributes.",
43
+ " *",
44
+ " * Return - a list of SAML Attribute (3) objects.",
45
+ " *",
46
+ " * Class reference:",
47
+ " * (1) SSOToken - https://backstage.forgerock.com/docs/am/7/apidocs/com/iplanet/sso/SSOToken.html.",
48
+ " * (2) IdpAttributeMapperScriptHelper - https://backstage.forgerock.com/docs/am/7/apidocs/com/sun/identity/saml2/plugins/scripted/IdpAttributeMapperScriptHelper.html.",
49
+ " * (3) Attribute - https://backstage.forgerock.com/docs/am/7/apidocs/com/sun/identity/saml2/assertion/Attribute.html.",
50
+ " */",
51
+ "",
52
+ "/**",
53
+ " * Default SAML2 IDP Attribute Mapper.",
54
+ " */",
55
+ "function getAttributes() {",
56
+ " var frJava = JavaImporter(",
57
+ " com.sun.identity.saml2.common.SAML2Exception",
58
+ " );",
59
+ "",
60
+ " const debugMethod = \"ScriptedIDPAttributeMapper.getAttributes:: \";",
61
+ "",
62
+ " try {",
63
+ "",
64
+ " if (!idpAttributeMapperScriptHelper.isSessionValid(session)) {",
65
+ " logger.error(debugMethod + \"Invalid session.\");",
66
+ " return null;",
67
+ " }",
68
+ "",
69
+ " var configMap = idpAttributeMapperScriptHelper.getRemoteSPConfigAttributeMap(realm, remoteEntityId);",
70
+ " logger.message(debugMethod + \"Remote SP attribute map = {}\", configMap);",
71
+ " if (configMap == null || configMap.isEmpty()) {",
72
+ " configMap = idpAttributeMapperScriptHelper.getHostedIDPConfigAttributeMap(realm, hostedEntityId);",
73
+ " if (configMap == null || configMap.isEmpty()) {",
74
+ " logger.message(debugMethod + \"Configuration map is not defined.\");",
75
+ " return null;",
76
+ " }",
77
+ " logger.message(debugMethod + \"Hosted IDP attribute map = {}\", configMap);",
78
+ " }",
79
+ "",
80
+ " var attributes = new java.util.ArrayList();",
81
+ " var stringValueMap = new java.util.HashSet();",
82
+ " var binaryValueMap;",
83
+ " var localAttribute;",
84
+ "",
85
+ " // Don't try to read the attributes from the datastore if the ignored profile is enabled in this realm.",
86
+ " if (!idpAttributeMapperScriptHelper.isIgnoredProfile(session, realm)) {",
87
+ " try {",
88
+ " // Resolve attributes to be read from the datastore.",
89
+ " var stringAttributes = new java.util.HashSet();",
90
+ " var binaryAttributes = new java.util.HashSet();",
91
+ " var keyIter = configMap.keySet().iterator();",
92
+ " while (keyIter.hasNext()) {",
93
+ " var key = keyIter.next();",
94
+ " localAttribute = configMap.get(key);",
95
+ " if (!idpAttributeMapperScriptHelper.isStaticAttribute(localAttribute)) {",
96
+ " if (idpAttributeMapperScriptHelper.isBinaryAttribute(localAttribute)) {",
97
+ " // add it to the list of attributes to treat as being binary",
98
+ " binaryAttributes.add(idpAttributeMapperScriptHelper.removeBinaryAttributeFlag(localAttribute));",
99
+ " } else {",
100
+ " stringAttributes.add(localAttribute);",
101
+ " }",
102
+ " }",
103
+ " }",
104
+ "",
105
+ " if (!stringAttributes.isEmpty()) {",
106
+ " stringValueMap = idpAttributeMapperScriptHelper.getAttributes(session, stringAttributes);",
107
+ " }",
108
+ " if (!binaryAttributes.isEmpty()) {",
109
+ " binaryValueMap = idpAttributeMapperScriptHelper.getBinaryAttributes(session, binaryAttributes);",
110
+ " }",
111
+ " } catch (error) {",
112
+ " logger.error(debugMethod + \"Error accessing the datastore. \" + error);",
113
+ " //continue to check in ssotoken.",
114
+ " }",
115
+ " }",
116
+ "",
117
+ " var keyIter = configMap.keySet().iterator();",
118
+ " while (keyIter.hasNext()) {",
119
+ " var key = keyIter.next()",
120
+ " var nameFormat = null;",
121
+ " var samlAttribute = key;",
122
+ " localAttribute = configMap.get(key);",
123
+ " // check if samlAttribute has format nameFormat|samlAttribute",
124
+ " var samlAttributes = String(new java.lang.String(samlAttribute));",
125
+ " var tokens = samlAttributes.split('|');",
126
+ "",
127
+ " if (tokens.length > 1) {",
128
+ " nameFormat = tokens[0];",
129
+ " samlAttribute = tokens[1];",
130
+ " }",
131
+ "",
132
+ " var attributeValues = new java.util.HashSet();",
133
+ " if (idpAttributeMapperScriptHelper.isStaticAttribute(localAttribute)) {",
134
+ " // Remove the static flag before using it as the static value",
135
+ " localAttribute = idpAttributeMapperScriptHelper.removeStaticAttributeFlag(localAttribute);",
136
+ " attributeValues = new java.util.HashSet([localAttribute]);",
137
+ " logger.message(debugMethod + \"Adding static value {} for attribute named {}\", localAttribute, samlAttribute);",
138
+ " } else {",
139
+ " if (idpAttributeMapperScriptHelper.isBinaryAttribute(localAttribute)) {",
140
+ " // Remove the flag as not used for lookup",
141
+ " localAttribute = idpAttributeMapperScriptHelper.removeBinaryAttributeFlag(localAttribute);",
142
+ " attributeValues = idpAttributeMapperScriptHelper.getBinaryAttributeValues(samlAttribute, localAttribute,",
143
+ " binaryValueMap);",
144
+ " } else {",
145
+ " if (stringValueMap != null && !stringValueMap.isEmpty()) {",
146
+ " attributeValues = stringValueMap.get(localAttribute);",
147
+ " } else {",
148
+ " logger.message(debugMethod + \"{} string value map was empty or null.\", localAttribute);",
149
+ " }",
150
+ " }",
151
+ "",
152
+ " // If all else fails, try to get the value from the users ssoToken",
153
+ " if (attributeValues == null || attributeValues.isEmpty()) {",
154
+ " logger.message(debugMethod + \"User profile does not have value for {}, checking SSOToken.\", localAttribute);",
155
+ " attributeValues = new java.util.HashSet(idpAttributeMapperScriptHelper.getPropertySet(session, localAttribute));",
156
+ " }",
157
+ " }",
158
+ "",
159
+ " if (attributeValues == null || attributeValues.isEmpty()) {",
160
+ " logger.message(debugMethod + \"{} not found in user profile or SSOToken.\", localAttribute);",
161
+ " } else {",
162
+ " attributes.add(idpAttributeMapperScriptHelper.createSAMLAttribute(samlAttribute, nameFormat, attributeValues));",
163
+ " }",
164
+ " }",
165
+ "",
166
+ " return attributes;",
167
+ "",
168
+ " } catch (error) {",
169
+ " logger.error(debugMethod + \"Error mapping IDP attributes. \" + error);",
170
+ " throw new frJava.SAML2Exception(error);",
171
+ " }",
172
+ "}",
173
+ "",
174
+ "getAttributes();"
175
+ ],
176
+ "default": false,
177
+ "language": "JAVASCRIPT",
178
+ "context": "SAML2_IDP_ATTRIBUTE_MAPPER",
179
+ "createdBy": "null",
180
+ "creationDate": 0,
181
+ "lastModifiedBy": "null",
182
+ "lastModifiedDate": 0
183
+ },
184
+ "5b29c5b7-b161-4a42-a41f-d6c85316b951": {
185
+ "_id": "5b29c5b7-b161-4a42-a41f-d6c85316b951",
186
+ "name": "Saml2 IDP Adapter Script",
187
+ "description": null,
188
+ "script": [
189
+ "/*",
190
+ " * Copyright 2021 ForgeRock AS. All Rights Reserved",
191
+ " * Use of this code requires a commercial software license with ForgeRock AS.",
192
+ " * or with one of its affiliates. All use shall be exclusively subject",
193
+ " * to such license between the licensee and ForgeRock AS.",
194
+ " */",
195
+ "",
196
+ "/*",
197
+ " * The script has these top level functions that could be executed during a SAML2 flow.",
198
+ " * - preSingleSignOn",
199
+ " * - preAuthentication",
200
+ " * - preSendResponse",
201
+ " * - preSignResponse",
202
+ " * - preSendFailureResponse",
203
+ " *",
204
+ " * Please see the javadoc for the interface definition and more information about these methods.",
205
+ " * https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/plugins/SAML2IdentityProviderAdapter.html",
206
+ " * Note that the initialize method is not supported in the scripts.",
207
+ " *",
208
+ " * Defined variables. Check the documentation on the respective functions for the variables available to it.",
209
+ " *",
210
+ " * hostedEntityId - String",
211
+ " * Entity ID for the hosted IDP",
212
+ " * realm - String",
213
+ " * Realm of the hosted IDP",
214
+ " * idpAdapterScriptHelper - IdpAdapterScriptHelper (1)",
215
+ " * An instance of IdpAdapterScriptHelper containing helper methods. See Javadoc for more details.",
216
+ " * request - HttpServletRequest (2)",
217
+ " * Servlet request object",
218
+ " * response - HttpServletResponse (3)",
219
+ " * Servlet response object",
220
+ " * authnRequest - AuthnRequest (4)",
221
+ " * The original authentication request sent from SP",
222
+ " * reqId - String",
223
+ " * The id to use for continuation of processing if the adapter redirects",
224
+ " * res - Response (5)",
225
+ " * The SAML Response",
226
+ " * session - SSOToken (6)",
227
+ " * The single sign-on session. The reference type of this is Object and would need to be casted to SSOToken.",
228
+ " * relayState - String",
229
+ " * The relayState that will be used in the redirect",
230
+ " * faultCode - String",
231
+ " * the fault code that will be returned in the SAML response",
232
+ " * faultDetail - String",
233
+ " * the fault detail that will be returned in the SAML response",
234
+ " * logger - Logger instance",
235
+ " * https://backstage.forgerock.com/docs/am/7/scripting-guide/scripting-api-global-logger.html#scripting-api-global-logger.",
236
+ " * Corresponding log files will be prefixed with: scripts.<script name>",
237
+ " *",
238
+ " * Throws SAML2Exception (7):",
239
+ " * for any exceptions occurring in the adapter. The federation process will continue",
240
+ " *",
241
+ " * Class reference:",
242
+ " * (1) idpAdapterScriptHelper - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/plugins/scripted/IdpAdapterScriptHelper.html.",
243
+ " * (2) HttpServletRequest - https://tomcat.apache.org/tomcat-7.0-doc/servletapi/javax/servlet/http/HttpServletRequest.html.",
244
+ " * (3) HttpServletResponse - https://tomcat.apache.org/tomcat-7.0-doc/servletapi/javax/servlet/http/HttpServletResponse.html.",
245
+ " * (4) AuthnRequest - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/protocol/AuthnRequest.html.",
246
+ " * (5) Response - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/protocol/Response.html.",
247
+ " * (6) SSOToken - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/iplanet/sso/SSOToken.html.",
248
+ " * (7) SAML2Exception - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/common/SAML2Exception.html.",
249
+ " */",
250
+ "",
251
+ "/*",
252
+ " * Template/default script for SAML2 IDP Adapter scripted plugin.",
253
+ " */",
254
+ "",
255
+ "/*",
256
+ " * Available variables for preSingleSignOn:",
257
+ " * hostedEntityId",
258
+ " * realm",
259
+ " * idpAdapterScriptHelper",
260
+ " * request",
261
+ " * authnRequest",
262
+ " * response",
263
+ " * reqId",
264
+ " * logger",
265
+ " *",
266
+ " * Return - true if browser redirection is happening after processing, false otherwise. Default to false.",
267
+ " */",
268
+ "function preSingleSignOn () {",
269
+ " return false;",
270
+ "}",
271
+ "",
272
+ "/*",
273
+ " * Available variables for preAuthentication:",
274
+ " * hostedEntityId",
275
+ " * realm",
276
+ " * idpAdapterScriptHelper",
277
+ " * request",
278
+ " * authnRequest",
279
+ " * response",
280
+ " * reqId",
281
+ " * session",
282
+ " * relayState",
283
+ " * logger",
284
+ " *",
285
+ " * Return - true if browser redirection is happening after processing, false otherwise. Default to false.",
286
+ " */",
287
+ "function preAuthentication () {",
288
+ " return false;",
289
+ "}",
290
+ "",
291
+ "/*",
292
+ " * Available variables for preSendResponse:",
293
+ " * hostedEntityId",
294
+ " * realm",
295
+ " * idpAdapterScriptHelper",
296
+ " * request",
297
+ " * authnRequest",
298
+ " * response",
299
+ " * reqId",
300
+ " * session",
301
+ " * relayState",
302
+ " * logger",
303
+ " *",
304
+ " * Return - true if browser redirection happened after processing, false otherwise. Default to false.",
305
+ " */",
306
+ "function preSendResponse () {",
307
+ " return false;",
308
+ "}",
309
+ "",
310
+ "/*",
311
+ " * Available variables for preSignResponse:",
312
+ " * hostedEntityId",
313
+ " * realm",
314
+ " * idpAdapterScriptHelper",
315
+ " * request",
316
+ " * authnRequest",
317
+ " * session",
318
+ " * relayState",
319
+ " * res",
320
+ " * logger",
321
+ " */",
322
+ "function preSignResponse () {",
323
+ "}",
324
+ "",
325
+ "/*",
326
+ " * Available variables for preSendFailureResponse:",
327
+ " * hostedEntityId",
328
+ " * realm",
329
+ " * idpAdapterScriptHelper",
330
+ " * request",
331
+ " * response",
332
+ " * faultCode",
333
+ " * faultDetail",
334
+ " * logger",
335
+ " */",
336
+ "function preSendFailureResponse () {",
337
+ "}"
338
+ ],
339
+ "default": false,
340
+ "language": "JAVASCRIPT",
341
+ "context": "SAML2_IDP_ADAPTER",
342
+ "createdBy": "null",
343
+ "creationDate": 0,
344
+ "lastModifiedBy": "null",
345
+ "lastModifiedDate": 0
346
+ }
347
+ },
348
+ "saml": {
349
+ "hosted": {
350
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20": {
351
+ "_id": "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20",
352
+ "_rev": "-728528736",
353
+ "entityId": "https://idc.scheuber.io/am/saml2/IDPBroadcom",
354
+ "identityProvider": {
355
+ "assertionContent": {
356
+ "signingAndEncryption": {
357
+ "requestResponseSigning": {},
358
+ "encryption": {},
359
+ "secretIdAndAlgorithms": {}
360
+ },
361
+ "nameIdFormat": {
362
+ "nameIdFormatList": [
363
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
364
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
365
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
366
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
367
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName",
368
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos",
369
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"
370
+ ],
371
+ "nameIdValueMap": [
372
+ {
373
+ "key": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
374
+ "value": "mail",
375
+ "binary": false
376
+ }
377
+ ]
378
+ },
379
+ "authenticationContext": {
380
+ "authenticationContextMapper": "com.sun.identity.saml2.plugins.DefaultIDPAuthnContextMapper",
381
+ "authContextItems": [
382
+ {
383
+ "contextReference": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
384
+ "level": 0
385
+ }
386
+ ]
387
+ },
388
+ "assertionTime": {
389
+ "notBeforeTimeSkew": 600,
390
+ "effectiveTime": 600
391
+ },
392
+ "basicAuthentication": {},
393
+ "assertionCache": {}
394
+ },
395
+ "assertionProcessing": {
396
+ "attributeMapper": {
397
+ "attributeMapper": "com.sun.identity.saml2.plugins.DefaultIDPAttributeMapper",
398
+ "attributeMapperScript": "90c4eca5-05f0-42f5-b9bf-88b693eabbbd"
399
+ },
400
+ "accountMapper": {
401
+ "accountMapper": "com.sun.identity.saml2.plugins.DefaultIDPAccountMapper",
402
+ "disableNameIdPersistence": false
403
+ },
404
+ "localConfiguration": {}
405
+ },
406
+ "services": {
407
+ "metaAlias": "/alpha/IDPBroadcom",
408
+ "serviceAttributes": {
409
+ "artifactResolutionService": [
410
+ {
411
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
412
+ "location": "https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPBroadcom"
413
+ }
414
+ ],
415
+ "singleLogoutService": [
416
+ {
417
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
418
+ "location": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom",
419
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom"
420
+ },
421
+ {
422
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
423
+ "location": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom",
424
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom"
425
+ },
426
+ {
427
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
428
+ "location": "https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPBroadcom"
429
+ }
430
+ ],
431
+ "nameIdService": [
432
+ {
433
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
434
+ "location": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom",
435
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom"
436
+ },
437
+ {
438
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
439
+ "location": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom",
440
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom"
441
+ },
442
+ {
443
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
444
+ "location": "https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPBroadcom"
445
+ }
446
+ ],
447
+ "singleSignOnService": [
448
+ {
449
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
450
+ "location": "https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPBroadcom"
451
+ },
452
+ {
453
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
454
+ "location": "https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPBroadcom"
455
+ },
456
+ {
457
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
458
+ "location": "https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPBroadcom"
459
+ }
460
+ ]
461
+ },
462
+ "nameIdMapping": [
463
+ {
464
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
465
+ "location": "https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPBroadcom"
466
+ }
467
+ ],
468
+ "assertionIdRequest": [
469
+ {
470
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
471
+ "location": "https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPBroadcom"
472
+ },
473
+ {
474
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:URI",
475
+ "location": "https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPBroadcom"
476
+ }
477
+ ]
478
+ },
479
+ "advanced": {
480
+ "saeConfiguration": {
481
+ "idpUrl": "https://idc.scheuber.io/am/idpsaehandler/metaAlias/alpha/IDPBroadcom"
482
+ },
483
+ "ecpConfiguration": {
484
+ "idpSessionMapper": "com.sun.identity.saml2.plugins.DefaultIDPECPSessionMapper"
485
+ },
486
+ "sessionSynchronization": {
487
+ "enabled": false
488
+ },
489
+ "idpFinderImplementation": {
490
+ "enableProxyIdpFinderForAllSps": false
491
+ },
492
+ "relayStateUrlList": {},
493
+ "idpAdapter": {
494
+ "idpAdapterScript": "5b29c5b7-b161-4a42-a41f-d6c85316b951"
495
+ }
496
+ }
497
+ }
498
+ }
499
+ },
500
+ "remote": {},
501
+ "metadata": {
502
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20": [
503
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
504
+ "<EntityDescriptor entityID=\"https://idc.scheuber.io/am/saml2/IDPBroadcom\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
505
+ " <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
506
+ " <KeyDescriptor use=\"signing\">",
507
+ " <ds:KeyInfo>",
508
+ " <ds:X509Data>",
509
+ " <ds:X509Certificate>",
510
+ "MIIDXzCCAkegAwIBAgIEXw0sqjANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
511
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
512
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIxMDMwNjAyMTgzNVoXDTMxMDMwNDAyMTgzNVowYDELMAkG",
513
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
514
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
515
+ "ADCCAQoCggEBAI7DfQgOfXacEXp9EUBbH4PosMK36VIeZDO/gllKmJYnOsa+7FPHMJi7OETsF7sF",
516
+ "FkiL63+3KiqBIk1b9cIp6SWnp7Z2Hvz+WwgF6o0ZhRWbpF1FyLHZWKB2H30BdY6I3keE2xnvOsmq",
517
+ "X9pyTdap52WatS06GMAzpisMEZsremV49vc5zuVS//QWSmv6r0S9UNfgW1iICKfqxeYibAND2kgc",
518
+ "2+0I9QTabH59601aGm2bgTr+EOVtbQUEvblz7/l6b4Q4y8o+BmwXk+olPKgBruPa0XOXBpCa7b/d",
519
+ "SfLI7z2XHyMzqNG9IGg0LWMtlj7WC0V2gJIrvoxBkSApDUWxyOkCAwEAAaMhMB8wHQYDVR0OBBYE",
520
+ "FMfL4Owt4dhAwUApAiUclxOHGeUcMA0GCSqGSIb3DQEBCwUAA4IBAQA3xUrvKeQcTMaywcrv8KPP",
521
+ "WWz5ybb5TxW/5T/W7BtOwFqgEIPQcnauBQ6Pv2tEGWW83lPTan6+boDTTtzASKn9oO0P+dqIH6iw",
522
+ "ARGw/beScRk3xYpnhUsuMb/RDU5IhQYksD/95Ep9Kx3bDMFjFw7ShE0teHq/GAbymUj5vJQfEKZl",
523
+ "9G+UByYkvoSoFFjQKK+T2JUVpmernGqVkDZ35oRSktgz0xesZkiKkc0iczAmgBY2w95bxrK4rfA5",
524
+ "S6PFTRF06pZG55r+bcQAhZXEMzbchHh7WaxqEev97s7JlqyLl3VoIC7UBJcCasJLNeGE551r0R0/",
525
+ "noRTsMSbQ3Eex5Kt",
526
+ " </ds:X509Certificate>",
527
+ " </ds:X509Data>",
528
+ " </ds:KeyInfo>",
529
+ " </KeyDescriptor>",
530
+ " <KeyDescriptor use=\"encryption\">",
531
+ " <ds:KeyInfo>",
532
+ " <ds:X509Data>",
533
+ " <ds:X509Certificate>",
534
+ "MIIDRzCCAi+gAwIBAgIEHYaG7jANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
535
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
536
+ "EwR0ZXN0MB4XDTIxMDMwNjAyMTgzNloXDTMxMDMwNDAyMTgzNlowVDELMAkGA1UEBhMCVUsxEDAO",
537
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
538
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJXDj9VJdnw0X/g2NS8A",
539
+ "4AEJp5OmaspGrrFkDyZll+niAPNHfE74v9UB1fvH5SJTRiq81HS3sVSwMjjThstkZ81AeMFQeGaB",
540
+ "Y16Dilkvi2vhIqoxSTjTs11lo5hSfMPOSPmRbH3jJ3Ta1FyywLKWsfM8lmhw+H17/jrViZxghPVt",
541
+ "KqIaTz+VainC45bgxnZZ/eJSfyPoYTHf+AQRMKEeAxolvOOhwk6xoo3eRMLPhJm1LnwsfYJxJTbE",
542
+ "aPwlYHkzmG3VF/X3dCRuXvgjA+whD/e0qSfjrUe1r5X/x0NSygE716IKip3iBuNxZR4s8NrF+N6V",
543
+ "H44aZEE6nxdqh5BOPU0CAwEAAaMhMB8wHQYDVR0OBBYEFPY8mXz+eNBNDNOfShi1X3RNHXqUMA0G",
544
+ "CSqGSIb3DQEBCwUAA4IBAQBK9OIz9XW+PX8A29PKSUgRJbDPqIWyCilnKyV00Rpxe40KhQqUV8ur",
545
+ "PioiVxz+YIgf+6VtNhF6ClUX4pDOT48QxnSqX5Qy3Xm/+Sfsm6Sa4EPkLaZYspqoySAHv9FcdLWJ",
546
+ "u7VvWbDw9oDWG2fZCatNXFzhLWC2EI+vF5tmKDatJLbRHGqQ1jQQpVlYsHcCvaJUThO+jA8X8Yq6",
547
+ "UqYxD2Z+RV/WboIBbx21sS1HQTeR3tUhz4y4+FYr2c4o2VPrrzQ2NmUN/I5iMxWIGOgHm5/2ZAhl",
548
+ "J/Ap7YiDLr8eMtidvAdXmN9Sg7iTNVi6ylhqanZh56MKWXDKD2BxLXiQgJge",
549
+ " </ds:X509Certificate>",
550
+ " </ds:X509Data>",
551
+ " </ds:KeyInfo>",
552
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
553
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
554
+ " </EncryptionMethod>",
555
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
556
+ " <xenc:KeySize>128</xenc:KeySize>",
557
+ " </EncryptionMethod>",
558
+ " </KeyDescriptor>",
559
+ " <ArtifactResolutionService index=\"0\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPBroadcom\"/>",
560
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom\"/>",
561
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom\"/>",
562
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPBroadcom\"/>",
563
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom\"/>",
564
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom\"/>",
565
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPBroadcom\"/>",
566
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
567
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
568
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
569
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
570
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat>",
571
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat>",
572
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat>",
573
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPBroadcom\"/>",
574
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPBroadcom\"/>",
575
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPBroadcom\"/>",
576
+ " <NameIDMappingService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPBroadcom\"/>",
577
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPBroadcom\"/>",
578
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:URI\" Location=\"https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPBroadcom\"/>",
579
+ " </IDPSSODescriptor>",
580
+ "</EntityDescriptor>",
581
+ "",
582
+ ""
583
+ ]
584
+ }
585
+ }
586
+ }