View Javadoc

1   /**
2    * Licensed to the Apache Software Foundation (ASF) under one
3    * or more contributor license agreements. See the NOTICE file
4    * distributed with this work for additional information
5    * regarding copyright ownership. The ASF licenses this file
6    * to you under the Apache License, Version 2.0 (the
7    * "License"); you may not use this file except in compliance
8    * with the License. You may obtain a copy of the License at
9    *
10   * http://www.apache.org/licenses/LICENSE-2.0
11   *
12   * Unless required by applicable law or agreed to in writing,
13   * software distributed under the License is distributed on an
14   * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15   * KIND, either express or implied. See the License for the
16   * specific language governing permissions and limitations
17   * under the License.
18   */
19  
20  package org.apache.ws.security.saml.ext.builder;
21  
22  
23  /**
24   * Class SAML1Constants provides static constant definitions associated with
25   * the SAML v1.x specification.
26   * <p/>
27   * Created on May 18, 2009
28   */
29  public final class SAML1Constants {
30      
31      //
32      // NAME ID FORMAT
33      //
34      
35      public static final String NAMEID_FORMAT_UNSPECIFIED = 
36          "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified";
37      
38      public static final String NAMEID_FORMAT_EMAIL_ADDRESS = 
39          "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress";
40      
41      public static final String NAMEID_FORMAT_X509_SUBJECT_NAME = 
42          "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName";
43      
44      public static final String NAMEID_FORMAT_WINDOWS_DQN = 
45          "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName";
46  
47      //
48      // SUBJECT CONFIRMATION
49      // 
50      
51      /**
52       * Assertion Bearer Confirmation Method Identifier
53       */
54      public static final String CONF_BEARER = 
55          "urn:oasis:names:tc:SAML:1.0:cm:bearer";
56  
57      /**
58       * Holder of Key Confirmation Method Identifier
59       */
60      public static final String CONF_HOLDER_KEY = 
61          "urn:oasis:names:tc:SAML:1.0:cm:holder-of-key";
62  
63      /**
64       * Sender Vouches Confirmation Method Identifier
65       */
66      public static final String CONF_SENDER_VOUCHES = 
67          "urn:oasis:names:tc:SAML:1.0:cm:sender-vouches";
68  
69      //
70      // AUTH METHOD
71      //
72      
73      /**
74       * The authentication was performed by means of a password.
75       */
76      public static final String AUTH_METHOD_PASSWORD = 
77          "urn:oasis:names:tc:SAML:1.0:am:password";
78  
79      /**
80       * The authentication was performed by means of the Kerberos protocol [RFC 1510],
81       * an instantiation of the Needham-Schroeder symmetric key authentication mechanism [Needham78].
82       */
83      public static final String AUTH_METHOD_KERBEROS = "urn:ietf:rfc:1510";
84  
85      /**
86       * The authentication was performed by means of Secure Remote Password protocol as specified in 
87       * [RFC 2945].
88       */
89      public static final String AUTH_METHOD_SRP = "urn:ietf:rfc:2945";
90  
91      /**
92       * The authentication was performed by means of an unspecified hardware token.
93       */
94      public static final String AUTH_METHOD_HARDWARE_TOKEN = 
95          "urn:oasis:names:tc:SAML:1.0:am:HardwareToken";
96  
97      /**
98       * The authentication was performed using either the SSL or TLS protocol with certificate 
99       * based client authentication. TLS is described in [RFC 2246].
100      */
101     public static final String AUTH_METHOD_TLS_CLIENT = "urn:ietf:rfc:2246";
102 
103     /**
104      * The authentication was performed by some (unspecified) mechanism on a key authenticated by
105      * means of an X.509 PKI [X.500][PKIX]. It may have been one of the mechanisms for which a more
106      * specific identifier has been defined.
107      */
108     public static final String AUTH_METHOD_X509 = 
109         "urn:oasis:names:tc:SAML:1.0:am:X509-PKI";
110 
111     /**
112      * The authentication was performed by some (unspecified) mechanism on a key authenticated by 
113      * means of a PGP web of trust [PGP]. It may have been one of the mechanisms for which a more 
114      * specific identifier has been defined.
115      */
116     public static final String AUTH_METHOD_PGP = 
117         "urn:oasis:names:tc:SAML:1.0:am:PGP";
118 
119     /**
120      * The authentication was performed by some (unspecified) mechanism on a key authenticated by 
121      * means of a SPKI PKI [SPKI]. It may have been one of the mechanisms for which a more specific 
122      * identifier has been defined.
123      */
124     public static final String AUTH_METHOD_SPKI = 
125         "urn:oasis:names:tc:SAML:1.0:am:SPKI";
126 
127     /**
128      * The authentication was performed by some (unspecified) mechanism on a key authenticated by 
129      * means of a XKMS trust service [XKMS]. It may have been one of the mechanisms for which a more
130      * specific identifier has been defined.
131      */
132     public static final String AUTH_METHOD_XKMS = 
133         "urn:oasis:names:tc:SAML:1.0:am:XKMS";
134 
135     /**
136      * The authentication was performed by means of an XML digital signature [RFC 3075].
137      */
138     public static final String AUTH_METHOD_DSIG = "urn:ietf:rfc:3075";
139 
140     /**
141      * The authentication was performed by an unspecified means.
142      */
143     public static final String AUTH_METHOD_UNSPECIFIED = 
144         "urn:oasis:names:tc:SAML:1.0:am:unspecified";
145     
146     private SAML1Constants() {
147         // Complete
148     }
149 }