Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The inbound and outbound hooks are primarily used by the system to plug in security handling code and to allow for very specialized kinds of customization, and are not commonly used by deployers. In contrast, the post-authentication hook is a very fruitful injection point for supporting many useful features. Several predefined examples come with the software, and can be used to help develop your own custom behaviors.

General Configuration

Defining

...

Interceptors

The intercept/profile-intercept.xml file is where all supported interceptor flows are (very minimally) described to the system.

...

Enabling

...

Interceptors

The three interception points above correspond to three properties that can be specified on the profile configuration beans in the RelyingPartyConfiguration. Each property is a list of intercept flow IDs (excluding the "intercept/" prefix) to run.

...