Uses of Package
org.keycloak.representations.idm.authorization
Package
Description
Provides the domain model and any other type related with it
Provides classes related with the evaluation of policies.
Provides classes and a SPI to plug different policy providers.
Provides classes and a SPI to plug different metadata storage implementations.
-
-
ClassDescriptionOne or more resources that the resource server manages as a set of protected resources.A bounded extent of access that is possible to perform on a resource set.
-
ClassDescriptionOne or more resources that the resource server manages as a set of protected resources.A bounded extent of access that is possible to perform on a resource set.
-
-
-
-
ClassDescriptionOne or more resources that the resource server manages as a set of protected resources.
-
-
ClassDescriptionThe decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The policy enforcement mode dictates how authorization requests are handled by the server.
-
ClassDescriptionThe decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The policy enforcement mode dictates how authorization requests are handled by the server.
-
ClassDescriptionThe decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The policy enforcement mode dictates how authorization requests are handled by the server.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
ClassDescriptionOne or more resources that the resource server manages as a set of protected resources.A bounded extent of access that is possible to perform on a resource set.
-
-
ClassDescriptionThe decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The policy enforcement mode dictates how authorization requests are handled by the server.
-
ClassDescriptionThe decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The policy enforcement mode dictates how authorization requests are handled by the server.
-
ClassDescriptionOne or more resources that the resource server manages as a set of protected resources.A bounded extent of access that is possible to perform on a resource set.
-
-
ClassDescriptionOne or more resources that the resource server manages as a set of protected resources.
-
-
ClassDescriptionThe decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The decision strategy dictates how the policies associated with a given policy are evaluated and how a final decision is obtained.The policy enforcement mode dictates how authorization requests are handled by the server.One or more resources that the resource server manages as a set of protected resources.A bounded extent of access that is possible to perform on a resource set.
-
ClassDescriptionOne or more resources that the resource server manages as a set of protected resources.A bounded extent of access that is possible to perform on a resource set.