Deprecated API
Contents
-
ElementDescriptionsince AM 7.3.0 Implement use-case specific
IDPAdapter
implementations instead.since AM 7.3.0 Implement use-case specificIDPFinder
implementations instead.since AM 7.3.0 Implement use-case specificSPAdapter
implementations instead.This header is no longer supported by browsers. UseSetCookieHeader
instead.for removal withEncryptedPrivateKeyJwtClientAuthenticationFilter.Builder.withEncryptionPurpose(Purpose)
. Will be removed in winter 2021 season.Please useEncryptedPrivateKeyJwtClientAuthenticationFilter.Builder.withEncryptionSecretReference(SecretReference)
instead. Will be removed in winter 2021 season.for removal withPrivateKeyJwtClientAuthenticationFilter.Builder.withSigningPurpose(Purpose)
. Will be removed in winter 2021 season.Please useSecretReference
API instead. Will be removed in winter 2021 season.Please usePrivateKeyJwtClientAuthenticationFilter.Builder.withSigningSecretReference(SecretReference)
instead. Will be removed in winter 2021 season.since 7.3.0 useInitializablePlugin.initialize(Map)
.
-
InterfaceDescriptionsince AM 7.3.0 Implement use-case specific
IDPAdapter
implementations instead.since AM 7.3.0 Implement use-case specificIDPFinder
implementations instead.UseListMultimap
instead.UseMultimap
instead.UseMultiset
instead.since 7.2.0
-
ClassDescriptionAs of OpenSSO Express 8.0, use
com.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, useEntitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, useResourceMatch
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.As of OpenSSO Express 8.0, usecom.sun.identity.entitlement
instead asEntitlement
has replacedPolicy
.since AM 7.3.0 Implement use-case specificFedletAdapter
implementations instead.since AM 7.3.0 Implement use-case specificSPAdapter
implementations instead.UseLogger
instead.This class is currently only used in conjunction with the PropertyResolverSecretStore and this pairing is deprecated. Instead, use the FileSystemSecretStore.Will be replaced in a later release byClient
.This header is no longer supported by browsers. UseSetCookieHeader
instead.since 26.2. SeeFilters.newUrlEncodedHttpBasicAuthFilter(String, SecretReference)
for a replacement.The “/oauth2/tokeninfo” endpoint was deprecated in AM 6.5.OpenAmAccessTokenResolver
is deprecated and should not be used.TheAuthenticatedEncryptionCryptographyHandler
should be preferred.TheAuthenticatedEncryptionCryptographyHandler
should be preferred.UseEncryptedThenSignedJwtHeaderBuilder
instead.UseEncryptedThenSignedJwtBuilder
instead.UseContentEncryptionHandler
instead.UseRSAEncryptionHandler
andAESCBCHMACSHA2ContentEncryptionHandler
instead.UseRSAEncryptionHandler
andAESCBCHMACSHA2ContentEncryptionHandler
instead.UseSecretECDSASigningHandler
insteadUseSecretEdDSASigningHandler
instead.UseSecretHmacSigningHandler
insteadThis algorithm is inherently insecure and shouldn't be used.UseSecretRSASigningHandler
insteadUseEncryptedThenSignedJwt
instead.PreferSecretsJwtTokenHandler
instead.RequestHandler
now has default methods which implement the not-supported behavior. This class is here for transition from pre-JDK8 impelementations.useClaim
-
FieldDescriptionuse
Action.identifiedIdentity
instead.useIdmIntegrationService.OBJECT_ATTRIBUTES
instead.UseTreeContext.getStateFor(Node)
instead as this method does not leak implementation detail of the specific type of state.UseTreeContext.getStateFor(Node)
instead as this method does not leak implementation detail of the specific type of state.For internal use only. This option will be removed in future version and will not be replaced.
-
MethodDescriptionuse
getAll()
Use #getLdapErrorIntCode() instead. The ldap error code is always an intAs of Sun Java System Access Manager 7.1.This method is deprecated. The setting for recursive search should be configured via the data store.This method is deprecated. The setting for recursive search should be configured via the data store.This method is deprecated, useHex.encode(byte[])
} instead. Converts byte array toHex
String.This method is deprecated, useHex.decode(String)
instead. ConvertsHex
String to Byte Array.UseServiceConfigManager.addListener(ServiceListener)
instead.This method has been deprecated, usegetAssignedServices()
instead.UseServiceConfigManager.removeListener(String)
instead.The labeledURI setting shall not be used for storing configuration data.The labeledURI setting shall not be used for storing configuration data.The labeledURI setting shall not be used for storing configuration data.UseIdentityStore.searchForIdentity(IdType, String)
insteadIn favour ofPropertyResolver.getProperty(String, boolean)
Replaced byContentTypeHeader.getDirectives()
for removal withEncryptedPrivateKeyJwtClientAuthenticationFilter.Builder.withEncryptionPurpose(Purpose)
. Will be removed in winter 2021 season.Please useEncryptedPrivateKeyJwtClientAuthenticationFilter.Builder.withEncryptionSecretReference(SecretReference)
instead. Will be removed in winter 2021 season.UseOAuth2Error.asWwwAuthenticateHeader()
instead.for removal withPrivateKeyJwtClientAuthenticationFilter.Builder.withSigningPurpose(Purpose)
. Will be removed in winter 2021 season.Please useSecretReference
API instead. Will be removed in winter 2021 season.Please usePrivateKeyJwtClientAuthenticationFilter.Builder.withSigningSecretReference(SecretReference)
instead. Will be removed in winter 2021 season.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Only valid for RFC 2965 cookies ("Cookie2"), which have been deprecated and removed by most clients.Because Entity content should be read asynchronously. Instead retrieve theForm
withEntity.getFormAsync()
.useForm.fromFormString(String)
instead.useForm.toFormString()
instead.UseJweHeaderBuilder.epk(JWK)
instead.PreferJwtBuilderFactory.jwe(EncryptionKey)
instead.This method provides no security at all and shouldn't be used.PreferSignedJwtBuilderImpl.encrypt(EncryptionKey)
instead.PreferEncryptedJwt.decrypt(SecretsProvider, Purpose)
instead.PreferEncryptedJwt.decryptRawPayload(SecretsProvider, Purpose)
instead.replaced byEcJWK.getEllipticCurve()
.replaced byJWK.getJwaAlgorithm()
UseJWK.getX509Thumbprint()
instead.UseJWKSetParser.jwkSetAsync(URL)
instead.UseJwksStore.findJwkAsync(String)
instead.UseJwksStore.findJwkAsync(String)
instead.UseJwksStore.reloadJwksAsync()
instead.UseJwksStore.setJwkUrlAsync(URL)
instead.UseJwksStoreService.configureJwksStore(String, Duration, Duration, URL, Clock)
with an explicit clock.PreferEncryptedThenSignedJwt.decrypt(SecretsProvider, Purpose)
instead.Replaced byJwsAlgorithm.parseCryptographicAlgorithm(String)
useSigningManager.newEcdsaSigningHandler(SigningKey)
} insteaduseSigningManager.newEcdsaSigningHandler(SigningKey)
} insteaduseSigningManager.newHmacSigningHandler(SigningKey)
insteaduseSigningManager.newHmacSigningHandler(SigningKey)
insteadThis method is inherently insecure and shouldn't be used.UseSigningManager.newSigningHandler(SigningKey)
insteaduseJsonValue::copy
directly insteadin favor ofResourceException.newResourceException(int)
UseResources.newHandler(Object)
instead.UseResources.newHandler(Object)
instead.UseResources.newHandler(Object)
instead.UseResponses.newQueryResponse(String, CountPolicy, int)
instead.UseOAuth2Client.createAuthRedirectUri(String, String)
and specify a PKCE challenge.UseOAuth2Client.createAuthRedirectUri(String, String)
and specify a PKCE verifier.UseOAuth2ClientConfiguration.getClientSecretReference()
instead.UseOpenIDConnectClient.createAuthRedirectUri(String, String, String)
and specify a PKCE challenge.Replaced byOpenIdResolverFactory.createJWKResolver(String, URL)
()}UseAccessToken.addExtraData(String, Supplier)
instead.since 7.2.0 UseAuthorizeEndpointDataProvider.provide(Map, OAuth2Request)
instead.since 7.2.0 UseAccessTokenModifier.modifyAccessToken(AccessToken, OAuth2Request)
instead. Functionality provided by Access Token Modification plugin supersedes the functionality this extension point was originally intended to provide.since 7.2.0 UseScopeEvaluator.evaluateScope(AccessToken)
instead.org.forgerock.oauth2.core.ScopeValidator.getUserInfo(ClientRegistration, AccessToken, OAuth2Request) since 7.2.0 UseUserInfoClaimsPlugin.getUserInfo(ClientRegistration, AccessToken, OAuth2Request)
instead.since 7.2.0 UseAccessTokenModifier.modifyAccessToken(AccessToken, OAuth2Request)
instead.since 7.2.0 Use#validateAccessTokenScope(ClientRegistration, Set, OAuth2Request)
instead.since 7.2.0 Use#validateAuthorizationScope(ClientRegistration, Set, OAuth2Request)
instead.since 7.2.0 Use#validateBackChannelAuthorizationScope(ClientRegistration, Set, OAuth2Request)
instead.since 7.2.0 Use#validateRefreshTokenScope(ClientRegistration, Set, Set, OAuth2Request)
instead.in favour ofAbstractNodeAmPlugin.getNodesByVersion()
UseTreeContext.getStateFor(Node)
instead as this method does not leak implementation detail of the specific type of state.UseTreeContext.getStateFor(Node)
instead as this method performs the same function but supports filtering of the available state based on the nodes declared inputs.UseTreeContext.getStateFor(Node)
instead as this method does not leak implementation detail of the specific type of state.UseAmPlugin.onStartup(StartupType)
instead.UsePluginTools.installAuthNode(Class)
andPluginTools.startAuthNode(Class)
as appropriate.UsePluginTools.installService(Class)
andPluginTools.startService(Class)
as appropriate.since 7.3.0 useInitializablePlugin.initialize(Map)
.useDn.isEmpty()
insteaduseDn.emptyDn()
insteadUseSecretBuilder.build(Purpose)
instead.org.forgerock.secrets.vault.VaultSignature.GenericRsaPssSignature.engineSetParameter(String, Object) UseBase64.decode(byte[])
instead.UseBase64.decode(char[])
instead.UseBase64.decode(String)
instead.Since 25.0.0. Prefer usingPromise.getOrThrow()
and handle properly theInterruptedException
in the calling code, or usePromise.getOrThrowIfInterrupted()
.Since 25.0.0. Prefer usingPromise.get(long, TimeUnit)
and handle properly theInterruptedException
in the calling code, or usePromise.getOrThrowIfInterrupted()
.useObjects.requireNonNull(Object)
} insteaduseObjects.requireNonNull(Object, String)
insteadExperience has shown thatReject.ifFalse
can be hard to read. Prefer to useReject.unless(boolean)
(which works identically) or rewrite to useReject.ifTrue(boolean)
instead.Experience has shown thatReject.ifFalse
can be hard to read. Prefer to useReject.unless(boolean, String)
(which works identically) or rewrite to useReject.ifTrue(boolean, String)
instead.ExecutorServiceFactory.createCachedThreadPool(String)
orExecutorServiceFactory.createCachedThreadPool(ThreadFactory)
should be used so that threads have meaningful names.ExecutorServiceFactory.createFixedThreadPool(int, String)
should be used so that threads have meaningful names.ExecutorServiceFactory.createScheduledService(int, String)
should be used so that threads have meaningful names.ExecutorServiceFactory.createThreadPool(int, int, long, TimeUnit, BlockingQueue, String)
should be used so that threads have meaningful names.
-
ConstructorDescriptionUse the other constructor
AMIdentityRepository(String, SSOToken)
Passing in an ldapErrorCode as a String is not recommended, use the OO ctor instead.Replaced byTransactionIdInboundFilter(boolean)
Replaced byContentTypeHeader(String, Map)
Replaced byContentTypeHeader(String, Map)
Since 25.0.0. Prefer usingPipeBufferedStream(Factory)
to provide your own Buffer FactoryThe clock attribute is not used anymore. UseResourceServerFilter(AccessTokenResolver, ResourceAccess, String)
instead. Deprecated in 25.0.0.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.Use the builder instead.It is recommended to useJwksStore.newJwksStore(Duration, Duration, URL, JWKSetParser, Clock)
.Prefer using the constructorJwksStoreService(Client client)
in which you provide your own instance ofClient
. This one does instantiate a specific instance of AsyncHttpClient but does not allow any custom filter processing, nor does it close it properly.Prefer using the constructorJwksStoreService(Client client)
where timeouts are in control of the client applicationPlease useRSASigningHandler(Key)
.useSigningManager(SecretsProvider)
insteadUseSecretsJwtTokenHandler.builder()
instead.UseJsonPointer.rootPtr()
instead.Use org.forgerock.oauth.resolvers.OpenIdResolverFactory#OpenIdResolverFactory (org.forgerock.http.Client) insteadUse org.forgerock.oauth.resolvers.service.OpenIdResolverServiceImpl#OpenIdResolverServiceImpl (org.forgerock.http.Client) instead.Use org.forgerock.oauth.resolvers.WellKnownOpenIdConfigurationFactory# WellKnownOpenIdConfigurationFactory(org.forgerock.http.Client) insteadUse org.forgerock.oauth.resolvers.WellKnownOpenIdConfigurationFactory# WellKnownOpenIdConfigurationFactory(org.forgerock.http.Client, java.time.Clock) insteaduseHsmKeyStoreLoader(Provider hsmProvider)
instead so that management of the provider can be left to the caller.Prefer usingSecretsProvider(Clock)
and provide your own clock instance.Prefer usingRequestAuditContext(Context, Instant)
not to rely on the system clock.Prefer usingRequestAuditContext(Context, Instant)
.Prefer the use ofDuration.duration(long, TimeUnit)
.
-
Enum ConstantDescriptionthis should never be used as it is a security risk.RSA1_5 is an insecure encryption mode. Use
JweAlgorithm.RSA_OAEP_256
instead.This algorithm is inherently insecure and should not be used.This algorithm is inherently insecure and shouldn't be used.PreferPropertyFormat.PEM
for keys.PreferPropertyFormat.ENCRYPTED_PEM
for keys.PreferPropertyFormat.GOOGLE_KMS_ENCRYPTED_PEM
for keys.
FedletAdapter
implementations instead.