-
bigbank.webclient.services.profile.LoginService.login()
-
br.gov.frameworkdemoiselle.security.SecurityContext.login()
Executes the login of a user to the application.
@throws AuthorizationException When the logon process fails, this exception is thrown.
-
c.b.a._2006._07.authentication.AuthenticationInterface.login()
-
cgl.shindig.security.AuthContext.login()
Perform the authentication and, if successful, associate Principals and Credentials with the authenticatedSubject
.
@see javax.security.auth.login.LoginContext#login()
@throws LoginException if the authentication fails.
-
cn.edu.pku.dr.requirement.elicitation.action.LoginAction.login()
-
cn.edu.zju.acm.onlinejudge.persistence.UserPersistence.login()
-
com.anzsoft.client.iJabConstants.login()
-
com.art.anette.client.controller.BasicController.login()
Loggt den Mitarbeiter mit der angegebenen E-Mail Adresse und Passwort ein.
@param lr Der Login-Request mit den Daten für den Login.
@throws LoginFailedException Wird geworfen, wenn der Login-Versuch fehlgeschlagen ist.
@throws NetworkException Wird geworfen, wenn die Verbindung zum Server fehlgeschlagen ist.
-
com.calclab.emite.core.client.xmpp.session.Session.login()
Start a login process with the current xmpp uri and password. Use onLoggedIn method to know when you are really logged in. If the uri doesn't provide a resource, the session will generate one.
You can use Session.ANONYMOUS and null as password to do an anonymous login.
@param uri the user's uri to loggin
@param password the user's password
-
com.caucho.security.FormLogin.login()
-
com.caucho.security.Login.login()
Logs a user in. The authenticate method is called during the security check. If the user does not exist, authenticate
sets the reponse error page and returns null.
@param request servlet request
@param response servlet response for a failed authentication.
@param isFail true if the authorization has failed
@return the logged in principal on success, null on failure.
-
com.caucho.server.http.CauchoRequest.login()
-
com.cc.myaop.learning.logging.AuthService.login()
-
com.citrix.netscaler.nitro.service.nitro_service.login()
Use this API to login into Netscaler.
@return status of the operation performed.
@throws nitro_exception nitro exception is thrown.
-
com.commafeed.backend.service.UserService.login()
try to log in with given credentials
-
com.commander4j.db.JDBUser.login()
Method login.
@return boolean
-
com.cosmo.security.auth.Authentication.login()
Verifica las credenciales de un usuario.
@param login Login del usuario.
@param password Contrase�a (sin encriptar) del usuario.
@return Una instancia de {@link User} que representa el usuario al que corresponden las credenciales proporcionadas.
@throws UserNotFoundException
@throws AuthenticationException
-
com.cubusmail.mail.IMailbox.login()
Login and creates a mail store
@throws MessagingException
-
com.cubusmail.server.mail.IMailbox.login()
Login and creates a mail store
@throws MessagingException
-
com.defaultcompany.login.LoginService.login()
-
com.dotmarketing.cms.login.action.LoginAction.login()
-
com.dyn.client.v3.traffic.features.SessionApi.login()
-
com.ecyrd.jspwiki.auth.AuthenticationManager.login()
Logs in the user by attempting to populate a WikiSession Subject from a web servlet request by examining the request for the presence of container credentials and user cookies. The processing logic is as follows:
- If the WikiSession had previously been unauthenticated, check to see if user has subsequently authenticated. To be considered "authenticated," the request must supply one of the following (in order of preference): the container
userPrincipal
, container remoteUser
, or authentication cookie. If the user is authenticated, this method fires event {@link com.ecyrd.jspwiki.event.WikiSecurityEvent#LOGIN_AUTHENTICATED}with two parameters: a Principal representing the login principal, and the current WikiSession. In addition, if the authorizer is of type WebContainerAuthorizer, this method iterates through the container roles returned by {@link com.ecyrd.jspwiki.auth.authorize.WebContainerAuthorizer#getRoles()}, tests for membership in each one, and adds those that pass to the Subject's principal set. - If, after checking for authentication, the WikiSession is still Anonymous, this method next checks to see if the user has "asserted" an identity by supplying an assertion cookie. If the user is found to be asserted, this method fires event {@link com.ecyrd.jspwiki.event.WikiSecurityEvent#LOGIN_ASSERTED}with two parameters:
WikiPrincipal(cookievalue)
, and the current WikiSession. - If, after checking for authenticated and asserted status, the WikiSession is still anonymous, this method fires event {@link com.ecyrd.jspwiki.event.WikiSecurityEvent#LOGIN_ANONYMOUS} withtwo parameters:
WikiPrincipal(remoteAddress)
, and the current WikiSession
@param request servlet request for this user
@return always returns
true
(because anonymous login, at least, will always succeed)
@throws com.ecyrd.jspwiki.auth.WikiSecurityException if the user cannot be logged in for any reason
@since 2.3
-
com.enterprisedt.net.ftp.FTPClient.login()
Login into an account on the FTP server. This call completes the entire login process. Note that connect() must be called first.
@param user user name
@param password user's password
-
com.github.ebnew.ki4so.core.service.Ki4soService.login()
使用一个用户凭据登录ki4so中心认证服务。
@param credential 用户凭据。
@return 登录结果。
-
com.google.appengine.tck.driver.LoginHandler.login()
-
com.google.enterprise.connector.filenet4.FileConnector.login()
-
com.google.enterprise.connector.jcr.JcrConnector.login()
-
com.google.enterprise.connector.mock.jcr.MockJcrRepository.login()
-
com.google.enterprise.connector.notes.NotesConnector.login()
-
com.google.enterprise.connector.spi.Connector.login()
Gets a session with sufficient privileges to perform all actions related to the SPI. Credentials, if needed, are supplied externally through injection via Spring or some other mechanism. If an exception is thrown, the implementor should provide an explanatory message.
@return an object implementing the {@link Session} interface
@throws RepositoryLoginException if there is a credentials-related problem
@throws RepositoryException if there is a more general problem, such as the system is unreachable or down
-
com.gvaneyck.rtmp.LoLRTMPSClient.login()
Logs into Riot's servers
@throws IOException
-
com.ibm.sbt.services.endpoints.BasicEndpoint.login()
-
com.ibm.sbt.services.endpoints.ConnectionsOAuth2Endpoint.login()
-
com.ibm.sbt.services.endpoints.FormEndpoint.login()
-
com.ibm.sbt.services.endpoints.SmartCloudOAuthEndpoint.login()
-
com.ibm.ws.security.core.ContextManager.login()
-
com.ikanow.infinit.e.data_model.driver.InfiniteDriver.login()
Logs the user in specified by setUser() using the password specified by setPassword().
@return true if the user was logged in successfully.
-
com.jcabi.github.Organization.login()
Get this organization's login.
@return Login name
-
com.liferay.portal.auth.AutoLogin.login()
-
com.mojang.authlib.yggdrasil.YggdrasilUserAuthentication.logIn()
-
com.ngt.jopenmetaverse.shared.sim.NetworkManager.Login()
-
com.openkm.ws.client.OKMAuth.login()
-
com.oroinc.net.ftp.FTPClient.login()
-
com.pccw.service.acrm.AcrmApi.login()
-
com.pccw.service.acrm.PublicService.login()
-
com.proyecto.miniplan.client.LoginServiceAsync.login()
-
com.rackspacecloud.client.cloudfiles.FilesClient.login()
Log in to CloudFiles. This method performs the authentication and sets up the client's internal state.
@return true if the login was successful, false otherwise.
@throws IOException There was an IO error doing network communication
@throws HttpException There was an error with the http protocol
-
com.salesforce.ide.core.remote.Connection.login()
Login to the organization using the partner connection, and setup the metadataUrl to use later on.
@throws ForceConnectionException
@throws InsufficientPermissionsException
-
com.sforce.soap.enterprise.SoapBindingStub.login()
-
com.sforce.soap.partner.PartnerConnection.login()
-
com.splunk.Service.login()
Authenticates the {@code Service} instance with the username and passwordthat were specified when the instance was created.
@return The current {@code Service} instance.
-
com.sun.appserv.security.ProgrammaticLogin.login()
Attempt to login.
Upon successful return from this method the SecurityContext will be set in the name of the given user as its Subject.
On client side, realm and errors parameters will be ignored and the actual login will not occur until we actually access a resource requiring a login. And a java.rmi.AccessException with COBRA NO_PERMISSION will occur when actual login is failed.
This method is intented primarily for EJBs wishing to do programmatic login. If servlet code used this method the established identity will be propagated to EJB calls but will not be used for web container manager authorization. In general servlets should use the servlet-specific version of login instead.
@param user User name.
@param password Password for user.
@param realm the realm name in which the user should be logged in.
@param errors errors=true, propagate any exception encountered to the usererrors=false, no exceptions are propagated.
@return Boolean containing true or false to indicate success orfailure of login.
@throws Exception any exception encountered during Login.
-
com.sun.identity.authentication.AuthContext.login()
-
com.sun.security.auth.module.KeyStoreLoginModule.login()
Authenticate the user.
Get the Keystore alias and relevant passwords. Retrieve the alias's principal and credentials from the Keystore.
@exception FailedLoginException if the authentication fails.
@return true in all cases (this LoginModule
should not be ignored).
-
com.sun.security.auth.module.Krb5LoginModule.login()
Authenticate the user
@return true in all cases since this LoginModule
should not be ignored.
@exception FailedLoginException if the authentication fails.
@exception LoginException if this LoginModule
is unable to perform the authentication.
-
com.sun.security.auth.module.LdapLoginModule.login()
Begin user authentication.
Acquire the user's credentials and verify them against the specified LDAP directory.
@return true always, since this LoginModule
should not be ignored.
@exception FailedLoginException if the authentication fails.
@exception LoginException if this LoginModule
is unable to perform the authentication.
-
com.sun.sgs.client.simple.SimpleClient.login()
Initiates a login session with the server. A session is established asynchronously with the server as follows:
First, this client attempts to establish a connection with the server. If the client fails to establish a connection, then the client listener's {@link SimpleClientListener#disconnected disconnected} method is invoked with a {@code String} indicating thereason for the failure.
If a connection with the server is successfully established, this client's {@link PasswordAuthentication login credential} is obtained by invoking its {@link SimpleClientListener listener}'s {@link SimpleClientListener#getPasswordAuthentication getPasswordAuthentication} method with a login prompt.
Next, this client sends a login request to the server. If the login request is malformed, the client listener's {@link SimpleClientListener#disconnected disconnected} method is invokedwith a {@code String} indicating the reason for the failure or{@code null} if no reason can be determined.
If the client's login credential (as obtained above) is verified, then the client listener's {@link SimpleClientListener#loggedIn loggedIn} method is invoked. If,however, the login fails due to a login authentication failure or some other failure on the server while processing the login request, the client listener's {@link SimpleClientListener#loginFailed loginFailed} method is invoked with a {@code String} indicating thereason for the failure.
If this client is disconnected for any reason (including login failure), this method may be used again to log in.
The supported connection properties are:
Key | Description of Associated Value |
{@code host} | SGS host address (required) |
{@code port} | SGS port (required) |
@param props the connection properties to use in creating theclient's session
@throws IOException if a synchronous IO error occurs
@throws IllegalStateException if this session is already connectedor connecting
@throws SecurityException if the caller does not have permissionto connect to the remote endpoint
-
com.uphea.service.UserAuthManager.login()
Logins user.
-
com.vmware.vim.binding.vim.SessionManager.login()
-
com.xeiam.xchange.coinsetter.service.polling.CoinsetterClientSessionServiceRaw.login()
-
controller.ControllerLogIn.LogIn()
-
cz.cuni.mff.inetpaint.ConnectionManager.login()
Provadí autorizaci na serveru a vysílá signály o stavu připojování aplikaci.
@param username JID uživatele
@param server Adresa serveru
@param password Heslo
@param resource Zdroj
@param statusMode Počáteční prezence uživatele
@return Výsledný status připojení
- {@link Program#STATUS_OK} Při úspěšném přihlášení
- {@link Program#STATUS_BAD_LOGIN} Při zadání nesprávných přihlašovacích údajů
- {@link Program#STATUS_UNKNOWN_ERROR} Při neznámé chybě připojení
-
dao.DaoUser.login()
-
de.boksa.rt.rest.RTRESTClient.login()
-
de.innovationgate.webgate.api.auth.AuthenticationModule.login()
Called to verify a login. Returns a session object if it succeeds.
@param user The user
@param credentials The users credentials, f.e. a password
@return An authentication session object if the login succeeds. null otherwise.
@throws AuthenticationException If the login cannot be verified
-
de.iritgo.aktera.authentication.AuthenticationManager.login()
Attempt to log the user in
@param ue The user environment which holds the login-context and JAAS subject
@throws LoginException
-
de.spotnik.mail.core.accounts.AccountController.login()
Login a user with username and password
@param user the username
@param password the password
@return the user account object
@throws DatabaseException
-
domain.UserDomainController.login()
Comprova que l'usuari existeix i retorna la seva id. Crea una instància de la classe User amb els paràmetres de l'usuari que ha fet el login.
@author Oriol Caño
@param String name: Nom de l'usuari a cercar
@param String password: Contrasenya de l'usuari a cercar
@return retorna l'id de l'usuari amb el nom d'usuari name i la contrasenya pass,si l'usuari no existeix retorna 0
@throws si hi ha un error retorna -1
-
edu.indiana.extreme.gfac.beanutils.ApplicationGlobalContext.login()
@throws GfacException
-
edu.stanford.bmir.protege.web.client.ui.login.LoginUtil.login()
-
edu.wpi.cs.wpisuitetng.authentication.Authenticator.login()
Logs the user in. Assumes the output of parsePost(str) will be a string array of the format: [
, ].
@param postString the POST body from the request object.
@return a Session for the authenticated user, if login is successful.
@throws AuthenticationException When the user's credentials are invalid or do not parse.
@throws WPISuiteException if an error occurs in getEntity
-
edu.wpi.cs.wpisuitetng.authentication.BasicAuth.login()
-
es.udc.tfg.journals.model.userservice.UserService.login()
-
es.urjc.escet.semium.SessionManager.logIn()
-
fr.aston.administration.services.impl.ServiceAuthentificationImpl.Login()
-
framework.beans.security.LoginRemoteAbstarct.login()
-
gmusic.api.impl.GoogleMusicAPI.login()
-
gmusic.api.interfaces.IGoogleMusicAPI.login()
-
gwtappcontainer.client.LoginServiceAsync.login()
-
honeycrm.client.services.AuthServiceAsync.login()
-
htsjdk.samtools.util.ftp.FTPClient.login()
-
hu.u_szeged.nbo.server.NBOServerIF.login()
-
info.bliki.api.Connector.login()
Complete the Users login information The user must contain a username, password and actionURL
@param user the completed user information or null
, if the login fails
@return
-
info.bliki.api.User.login()
-
io.undertow.security.api.SecurityContext.login()
Attempts to log the user in using the provided credentials. This result will be stored in the current {@link AuthenticatedSessionManager} (if any), so subsequent requests will automatically be authenticatedas this user.
This operation may block
@param username The username
@param password The password
@return
true
if the login succeeded, false otherwise
-
iqq.im.module.ProcModule.login()
login.
@param listener a {@link iqq.im.QQActionListener} object.
@return a {@link iqq.im.event.QQActionFuture} object.
-
it.freedomotic.marketplace.postplugin.JavaUploader.login()
Login to the drupal web service.
@param username Drupal valid username
@param password Drupal Valid password for the previous username
@return String the drupal Json response
-
it.sauronsoftware.ftp4j.FTPClient.login()
This method authenticates the user against the server.
@param username The username.
@param password The password (if none set it to null).
@throws IllegalStateException If the client is not connected. Call the connect() method before!
@throws IOException If an I/O error occurs.
@throws FTPIllegalReplyException If the server replies in an illegal way.
@throws FTPException If login fails.
-
java.security.AuthProvider.login()
Log in to this provider.
The provider relies on a CallbackHandler
to obtain authentication information from the caller (a PIN, for example). If the caller passes a null
handler to this method, the provider uses the handler set in the setCallbackHandler
method. If no handler was set in that method, the provider queries the auth.login.defaultCallbackHandler security property for the fully qualified class name of a default handler implementation. If the security property is not set, the provider is assumed to have alternative means for obtaining authentication information.
@param subject the Subject
which may containprincipals/credentials used for authentication, or may be populated with additional principals/credentials after successful authentication has completed. This parameter may be null
.
@param handler the CallbackHandler
used bythis provider to obtain authentication information from the caller, which may be null
@exception LoginException if the login operation fails
@exception SecurityException if the caller does not pass asecurity check for SecurityPermission("authProvider.name")
, where name is the value returned by this provider's getName
method
-
javax.jcr.Repository.login()
Opens a new session, specifying the security credentials and a workspace.
@param credentials the security credentials
@param workspaceName select an optional workspace
-
javax.security.auth.login.LoginContext.login()
-
javax.security.auth.spi.LoginModule.login()
Method to authenticate a {@code Subject} (phase 1).
The implementation of this method authenticates a {@code Subject}. For example, it may prompt for {@code Subject} information suchas a username and password and then attempt to verify the password. This method saves the result of the authentication attempt as private state within the LoginModule.
@exception LoginException if the authentication fails
@return true if the authentication succeeded, or false if this{@code LoginModule} should be ignored.
-
javax.servlet.http.HttpServletRequest.login()
Authenticate the provided user name and password and then associated the authenticated user with the request.
@param username The user name to authenticate
@param password The password to use to authenticate the user
@throws ServletException If any of {@link #getRemoteUser()}, {@link #getUserPrincipal()} or {@link #getAuthType()} arenon-null, if the configured authenticator does not support user name and password authentication or if the authentication fails
@since Servlet 3.0
-
kfmes.natelib.NateonMessenger.login()
-
labsis.usuario.managers.Manager.login()
-
marauroa.client.ClientFramework.login()
Login to server using the given username and password.
@param username Player username
@param password Player password
@throws InvalidVersionException if we are not using a compatible version
@throws TimeoutException if timeout happens while waiting for the message.
@throws LoginFailedException if login is rejected
@throws BannedAddressException
-
marauroa.functional.SimpleClient.login()
-
net.datacrow.core.security.SecurityCentre.login()
-
net.sf.arianne.marboard.client.core.MarboardClientFramework.login()
-
net.sf.jftp.net.FtpConnection.login()
Connect to the server an log in. Does also fire directory update and connection initialized event if successful or connection failed event if failed.
@param username The username
@param password The password
@return WRONG_LOGIN_DATA, OFFLINE, GENERIC_FAILED or LOGIN_OK status code
-
net.sf.jftp.net.wrappers.Sftp2Connection.login()
-
net.sf.jml.MsnMessenger.login()
Login.
-
net.sf.jportlet.service.login.LoginService.login()
Authenticate a user. This methods expects from the request the following form parameters:
- {@link #USER_ID}: the ID of the user
- {@link #PASSWORD}: The user's password.
If the user is authenticated, this method will notify all the portlet by calling {@link net.sf.jportlet.portlet.Portlet#login()}
@param request
@return
true
if the user is logged in
@throws PortletServiceException if any error occurs
-
net.sf.pmr.core.service.SecurityService.login()
return the user corresponding to he login and password or null if any If a user is found, the password is remove from the instance variable Login and password aren't case sensitive
@param login login
@param password password
@return User or null
-
net.solosky.maplefetion.FetionClient.login()
客户端登录 这是个异步操作,会把登录的操作封装在单线程池里去执行,登录结果应该通过NotifyEventListener异步通知结果
@param presence 在线状态 定义在Presence中
-
net.yacy.cora.protocol.ftp.FTPClient.login()
Login to server
@param account
@param password
@throws IOException
-
nexj.core.runtime.InvocationContext.login()
Logs a user into the invocation context.
@param principal The JAAS principal to login.
-
no.ugland.utransprod.service.ApplicationUserManager.login()
Login bruker.
@param userName
@param password
@return bruker dersom bruker kan logges inn
-
oracle.toplink.sessions.DatabaseSession.login()
-
org.apache.ace.client.workspace.Workspace.login()
Login to the repository as the specified User. Note that if the login was not successful (as indicated by the return value of this method), modifying the state of the Workspace and then committing it may not work as intended.
@param user the user
@return true if the login was successful, false otherwise
-
org.apache.aries.samples.ariestrader.api.persistence.AccountDataBean.login()
-
org.apache.beehive.netui.pageflow.handler.LoginHandler.login()
Log in the given user.
@param username the user to log in.
@param password the user's password.
@throws LoginException if the login fails.
-
org.apache.blur.console.providers.BaseProvider.login()
-
org.apache.camel.component.salesforce.internal.SalesforceSession.login()
-
org.apache.cassandra.stress.util.CassandraClient.login()
-
org.apache.cocoon.portal.coplet.adapter.CopletAdapter.login()
User logs in to a coplet This method is invoked when a user logs in for each coplet instance of the user
-
org.apache.cocoon.portal.profile.ProfileManager.login()
-
org.apache.cocoon.webapps.authentication.AuthenticationManager.login()
Try to login the user. If the authentication is successful, the user handler is returned. If not, null
is returned.
-
org.apache.commons.net.ftp.FTPClient.login()
Login to the FTP server using the provided username and password.
@param username The username to login under.
@param password The password to use.
@return True if successfully completed, false if not.
@exception FTPConnectionClosedException If the FTP server prematurely closes the connection as a result of the client being idle or some other reason causing the server to send FTP reply code 421. This exception may be caught either as an IOException or independently as itself.
@exception IOException If an I/O error occurs while either sending acommand to the server or receiving a reply from the server.
-
org.apache.commons.net.ftp.FTPSClient.login()
-
org.apache.commons.net.imap.IMAPClient.login()
Login to the IMAP server with the given username and password. You must first connect to the server with {@link org.apache.commons.net.SocketClient#connect connect }before attempting to login. A login attempt is only valid if the client is in the NOT_AUTH_STATE. After logging in, the client enters the AUTH_STATE.
@param username The account name being logged in to.
@param password The plain text password of the account.
@return True if the login attempt was successful, false if not.
@exception IOException If a network I/O error occurs in the process oflogging in.
-
org.apache.commons.net.pop3.POP3Client.login()
Login to the POP3 server with the given username and password. You must first connect to the server with {@link org.apache.commons.net.SocketClient#connect connect }before attempting to login. A login attempt is only valid if the client is in the {@link org.apache.commons.net.pop3.POP3#AUTHORIZATION_STATE AUTHORIZATION_STATE }. After logging in, the client enters the {@link org.apache.commons.net.pop3.POP3#TRANSACTION_STATE TRANSACTION_STATE }.
@param username The account name being logged in to.
@param password The plain text password of the account.
@return True if the login attempt was successful, false if not.
@exception IOException If a network I/O error occurs in the process oflogging in.
-
org.apache.commons.net.smtp.AuthSMTPClient.login()
-
org.apache.commons.net.smtp.SMTPClient.login()
Login to the SMTP server by sending the HELO command with the given hostname as an argument. Before performing any mail commands, you must first login.
@param hostname The hostname with which to greet the SMTP server.
@return True if successfully completed, false if not.
@exception SMTPConnectionClosedException If the SMTP server prematurely closes the connection as a result of the client being idle or some other reason causing the server to send SMTP reply code 421. This exception may be caught either as an IOException or independently as itself.
@exception IOException If an I/O error occurs while either sending acommand to the server or receiving a reply from the server.
-
org.apache.hadoop.hbase.client.UserProvider.login()
Log in the current process using the given configuration keys for the credential file and login principal.
This is only applicable when running on secure Hadoop -- see org.apache.hadoop.security.SecurityUtil#login(Configuration,String,String,String). On regular Hadoop (without security features), this will safely be ignored.
@param conf The configuration data to use
@param fileConfKey Property key used to configure path to the credential file
@param principalConfKey Property key used to configure login principal
@param localhost Current hostname to use in any credentials
@throws IOException underlying exception from SecurityUtil.login() call
-
org.apache.hadoop.hbase.security.UserProvider.login()
Log in the current process using the given configuration keys for the credential file and login principal.
This is only applicable when running on secure Hadoop -- see org.apache.hadoop.security.SecurityUtil#login(Configuration,String,String,String). On regular Hadoop (without security features), this will safely be ignored.
@param fileConfKey Property key used to configure path to the credential file
@param principalConfKey Property key used to configure login principal
@param localhost Current hostname to use in any credentials
@throws IOException underlying exception from SecurityUtil.login() call
-
org.apache.harmony.auth.module.JndiLoginModule.login()
-
org.apache.harmony.auth.module.KeyStoreLoginModule.login()
-
org.apache.harmony.auth.module.Krb5LoginModule.login()
-
org.apache.harmony.auth.module.LdapLoginModule.login()
-
org.apache.isis.viewer.dnd.awt.LoginDialog.login()
-
org.apache.jackrabbit.api.JackrabbitRepository.login()
Equivalent to {@code login(credentials, workspaceName)} except that the returnedSession instance contains the given extra session attributes in addition to any included in the given Credentials instance. Attribute names from the credentials and the attribute map must not overlap. In case of an overlap implementation may throw an
RepositoryException
.
The attributes are implementation-specific and may affect the behavior of the returned session. Unlike credentials attributes, these separately passed session attributes are guaranteed not to affect the authentication of the client.
An implementation that does not support a particular session attribute is expected to ignore it and not make it available through the returned session. A client that depends on specific behavior defined by a particular attribute can check whether the returned session contains that attribute to verify whether the underlying repository implementation supports that feature.
@param credentials the credentials of the user
@param workspaceName the name of a workspace
@param attributes implementation-specific session attributes
@return a valid session for the user to access the repository
@throws LoginException if authentication or authorization for the specified workspace fails
@throws NoSuchWorkspaceException if the specified workspace is not recognized
@throws RepositoryException if another error occurs
-
org.apache.jackrabbit.core.RepositoryImpl.login()
{@inheritDoc}
-
org.apache.jackrabbit.core.TransientRepository.login()
Logs in to the content repository. Initializes the underlying repository instance if needed. The opened session is added to the set of open sessions and a session listener is added to track when the session gets closed.
@param credentials login credentials
@param workspaceName workspace name
@return new session
@throws RepositoryException if the session could not be created
@see javax.jcr.Repository#login(Credentials,String)
-
org.apache.jackrabbit.core.security.AuthContext.login()
Perform the authentication and, if successful, associate Principals and Credentials with the authenticatedSubject
.
@see LoginContext#login()
@throws LoginException if the authentication fails.
-
org.apache.jackrabbit.core.security.JahiaLoginModule.login()
-
org.apache.jackrabbit.core.security.authentication.AuthContext.login()
Perform the authentication and, if successful, associate Principals and Credentials with the authenticatedSubject
.
@see javax.security.auth.login.LoginContext#login()
@throws LoginException if the authentication fails.
-
org.apache.jackrabbit.oak.api.ContentRepository.login()
the session } finally { session.close(); }
@param credentials access credentials, or {@code null}
@param workspaceName The workspace name or {@code null} if the defaultworkspace should be used.
@return authenticated repository session
@throws LoginException if authentication failed
@throws NoSuchWorkspaceException if the specified workspace name is invalid.
-
org.apache.jackrabbit.oak.api.RepositoryService.login()
Try to login a user identified by the passed {@code credentials}. On success this method returns a {@link Connection} to the given {@code workspace}.
@param credentials
@param workspaceName
@return
@throws LoginException
@throws NoSuchWorkspaceException
-
org.apache.jackrabbit.oak.core.ContentRepositoryImpl.login()
-
org.apache.jackrabbit.oak.jcr.repository.RepositoryImpl.login()
@see javax.jcr.Repository#login(javax.jcr.Credentials,String)
-
org.apache.jackrabbit.oak.spi.security.authentication.LoginContext.login()
@see javax.security.auth.login.LoginContext#login()
-
org.apache.jackrabbit.rmi.repository.RMIRemoteRepository.login()
-
org.apache.jackrabbit.rmi.repository.URLRemoteRepository.login()
-
org.apache.james.mailbox.MailboxManager.login()
Autenticates the given user against the given password.
When authentic and authorized, a session will be supplied
@param userid user name
@param passwd password supplied
@param log context sensitive log
@return a MailboxSession
when the user is authentic andauthorized to access
@throws BadCredentialsException when system access is denighed for the given user
@throws MailboxException when the creation fails for other reasons
-
org.apache.james.remotemanager.UserManagerAdmin.login()
This method is used to login to James to admin the User.
@param login admin username
@param password admin password
@return Remote UserManager object if login was successful otherwise null
@exception RemoteException
-
org.apache.maven.scm.provider.accurev.AccuRev.login()
Logins in as the given user, retains authtoken for use with subsequent commands.
@param user
@param password
@return
@throws AccuRevException
-
org.apache.maven.scm.provider.accurev.command.login.AccuRevLoginCommand.login()
-
org.apache.olio.webapp.model.ModelFacade.login()
-
org.apache.olio.webapp.security.SecurityHandler.login()
-
org.apache.openejb.spi.SecurityService.login()
Active
-
org.apache.shiro.mgt.SecurityManager.login()
Logs in the specified Subject using the given {@code authenticationToken}, returning an updated Subject instance reflecting the authenticated state if successful or throwing {@code AuthenticationException} if it isnot.
Note that most application developers should probably not call this method directly unless they have a good reason for doing so. The preferred way to log in a Subject is to call
subject. {@link org.apache.shiro.subject.Subject#login login(authenticationToken)}
(usually after acquiring the Subject by calling {@link org.apache.shiro.SecurityUtils#getSubject() SecurityUtils.getSubject()}).
Framework developers on the other hand might find calling this method directly useful in certain cases.
@param subject the subject against which the authentication attempt will occur
@param authenticationToken the token representing the Subject's principal(s) and credential(s)
@return the subject instance reflecting the authenticated state after a successful attempt
@throws AuthenticationException if the login attempt failed.
@since 1.0
-
org.apache.shiro.subject.Subject.login()
Performs a login attempt for this Subject/user. If unsuccessful, an {@link AuthenticationException} is thrown, the subclass of which identifies why the attempt failed.If successful, the account data associated with the submitted principals/credentials will be associated with this {@code Subject} and the method will return quietly.
Upon returning quietly, this {@code Subject} instance can be consideredauthenticated and {@link #getPrincipal() getPrincipal()} will be non-null and{@link #isAuthenticated() isAuthenticated()} will be {@code true}.
@param token the token encapsulating the subject's principals and credentials to be passed to theAuthentication subsystem for verification.
@throws org.apache.shiro.authc.AuthenticationException if the authentication attempt fails.
@since 0.9
-
org.apache.sling.api.auth.Authenticator.login()
Tries to login a request user for the current request.
To identify the resource to which access should be authenticated the {@link #LOGIN_RESOURCE resource}
request attribute is considered. If the request attribute is not set the request path info ( HttpServletRequest.getPathInfo()
) is used.
This method must be called on an uncommitted response since the implementation may want to reset the response to start the authentication process with a clean response. If the response is already committed an IllegalStateException
is thrown.
After this method has finished, request processing should be terminated and the response be considered committed and finished unless the {@link NoAuthenticationHandlerException} exception is thrown in whichcase no response has been sent to the client.
@param request The object representing the client request.
@param response The object representing the response to the client.
@throws NoAuthenticationHandlerException If the service cannot find a wayto authenticate a request user.
@throws IllegalStateException If the response has already been committed.
-
org.apache.sling.engine.auth.Authenticator.login()
Finds an {@link AuthenticationHandler} for the given request and call its{@link AuthenticationHandler#requestAuthentication(HttpServletRequest,HttpServletResponse)}method to initiate an authentication process with the client to login to Sling.
This method must be called on an uncommitted response since the implementation may want to reset the response to start the authentication process with a clean response. If the response is already committed an IllegalStateException
is thrown.
After this method has finished, request processing should be terminated and the response be considered committed and finished.
@param request The object representing the client request.
@param response The object representing the response to the client.
@throws NoAuthenticationHandlerException If no authentication handlerclaims responsibility to authenticate the request.
@throws IllegalStateException If the response has already been committed.
-
org.apache.sling.jcr.api.SlingRepository.login()
-
org.apache.stonehenge.stocktrader.dal.CustomerDAO.login()
-
org.apache.tapestry.vlib.ejb.IOperations.login()
Attempts to login the user in.
@return the user
@throws LoginException if the email address is invalid, the passwordis invalid, or the user may not log in for other reasons.
-
org.apache.wicket.security.WaspSession.login()
Attempts to login with the current login info.
@param context any type of information required to login
@throws LoginException
@see WaspAuthorizationStrategy#login(Object)
-
org.apache.wiki.auth.AuthenticationManager.login()
Logs in the user by attempting to populate a WikiSession Subject from a web servlet request by examining the request for the presence of container credentials and user cookies. The processing logic is as follows:
- If the WikiSession had previously been unauthenticated, check to see if user has subsequently authenticated. To be considered "authenticated," the request must supply one of the following (in order of preference): the container
userPrincipal
, container remoteUser
, or authentication cookie. If the user is authenticated, this method fires event {@link org.apache.wiki.event.WikiSecurityEvent#LOGIN_AUTHENTICATED}with two parameters: a Principal representing the login principal, and the current WikiSession. In addition, if the authorizer is of type WebContainerAuthorizer, this method iterates through the container roles returned by {@link org.apache.wiki.auth.authorize.WebContainerAuthorizer#getRoles()}, tests for membership in each one, and adds those that pass to the Subject's principal set. - If, after checking for authentication, the WikiSession is still Anonymous, this method next checks to see if the user has "asserted" an identity by supplying an assertion cookie. If the user is found to be asserted, this method fires event {@link org.apache.wiki.event.WikiSecurityEvent#LOGIN_ASSERTED}with two parameters:
WikiPrincipal(cookievalue)
, and the current WikiSession. - If, after checking for authenticated and asserted status, the WikiSession is still anonymous, this method fires event {@link org.apache.wiki.event.WikiSecurityEvent#LOGIN_ANONYMOUS} withtwo parameters:
WikiPrincipal(remoteAddress)
, and the current WikiSession
@param request servlet request for this user
@return always returns
true
(because anonymous login, at least, will always succeed)
@throws org.apache.wiki.auth.WikiSecurityException if the user cannot be logged in for any reason
@since 2.3
-
org.asteriskjava.manager.ManagerConnection.login()
Logs in to the Asterisk server with the username and password specified when this connection was created and a given event mask.
@param events the event mask. Set to "on" if all events should be send,"off" if not events should be sent or a combination of "system", "call" and "log" (separated by ',') to specify what kind of events should be sent.
@throws IllegalStateException if connection is not in state INITIAL orDISCONNECTED.
@throws IOException if the network connection is disrupted.
@throws AuthenticationFailedException if the username and/or password areincorrect or the ChallengeResponse could not be built.
@throws TimeoutException if a timeout occurs while waiting for theprotocol identifier. The connection is closed in this case.
@since 0.3
@see org.asteriskjava.manager.action.LoginAction
@see org.asteriskjava.manager.action.ChallengeAction
-
org.cloudfoundry.client.lib.CloudFoundryClient.login()
-
org.cloudfoundry.client.lib.CloudFoundryOperations.login()
Login using the credentials already set for the client.
@return authentication token
-
org.cloudfoundry.ide.eclipse.server.core.internal.CloudFoundryLoginHandler.login()
Attempts to log in once. If login fails, Core exception is thrown
@throws CoreException if login failed. The reason for the login failureis contained in the core exception's
-
org.codehaus.swizzle.confluence.Confluence.login()
-
org.davinci.server.user.IUserManager.login()
-
org.deepak.util.SSHClient.login()
-
org.eclipse.egit.ui.common.LoginDialogTester.login()
-
org.eclipse.jetty.security.LoginService.login()
Login a user.
@param username The user name
@param credentials The users credentials
@return A UserIdentity if the credentials matched, otherwise null
-
org.eclipse.persistence.internal.sessions.DatabaseSessionImpl.login()
PUBLIC: Connect to the database using the predefined login. The login must have been assigned when or after creating the session.
@see #login(Login)
-
org.eclipse.persistence.sessions.DatabaseSession.login()
PUBLIC: Connect to the database using the predefined login. The login must have been assign when or after creating the session.
@see #login(Login)
-
org.eclipse.persistence.sessions.server.ServerSession.login()
-
org.exoplatform.services.jcr.core.ManageableRepository.login()
-
org.exoplatform.services.jcr.impl.core.RepositoryImpl.login()
{@inheritDoc}
-
org.gatein.wci.ServletContainer.login()
Authentication support.
@param request the request valid in the current servlet context
@param response the response valid in the current servlet context
@param credentials the credentials which try to authenticate
@throws org.gatein.wci.authentication.AuthenticationException when authentication fails
@throws IllegalStateException when the user is already authenticated
@throws ServletException any servlet exception that would prevent authentication to be performed
@throws IOException any io exception that would prevent authentication to be performed
-
org.glassfish.security.services.api.authentication.AuthenticationService.login()
Log in a user with username and password.
@param username The username.
@param password The password.
@param subject An optional Subject to receive principals and credentials for the logged in user.If provided, it will be returned as the return value; if not, a new Subject will be returned.
@return A Subject representing the logged in user.
@throws LoginException
-
org.h2.dev.ftp.FtpClient.login()
Login to this FTP server (USER, PASS, SYST, SITE, STRU F, TYPE I).
@param userName the user name
@param password the password
-
org.jboss.seam.security.Identity.login()
Attempts to authenticate the user. This method raises the following events in response to whether authentication is successful or not. The following events may be raised during the call to login():
org.jboss.seam.security.events.LoggedInEvent - raised when authentication is successful org.jboss.seam.security.events.LoginFailedEvent - raised when authentication fails org.jboss.seam.security.events.AlreadyLoggedInEvent - raised if the user is already authenticated
@return String returns RESPONSE_LOGIN_SUCCESS if user is authenticated, RESPONSE_LOGIN_FAILED if authentication failed, or RESPONSE_LOGIN_EXCEPTION if an exception occurred during authentication. These response codes may be used to control user navigation. For deferred authentication methods, such as Open ID the login() method will return an immediate result of RESPONSE_LOGIN_FAILED (and subsequently fire a LoginFailedEvent) however in these conditions it is the responsibility of the Authenticator implementation to take over the authentication process, for example by redirecting the user to another authentication service.
-
org.jboss.seam.security.external.openid.api.OpenIdRelyingPartyApi.login()
Start an OpenID login dialogue.
@param identifier either a Claimed Identifier (identifying the user) or anOP Identifier (identifying the OpenID Provider where the user has an account)
@param attributes attributes that are requested (they should havedifferent aliases)
@param response the HTTP servlet response
-
org.jboss.security.client.SecurityClient.login()
Login with the desired method
@throws LoginException
-
org.jboss.web.tomcat.security.login.WebAuthentication.login()
Login an user via the CLIENT-CERT method
@param certs X509 certificates
@return Authenticated User Principal
-
org.jclouds.dynect.v3.features.SessionApi.login()
-
org.jdesktop.wonderland.client.comms.CellClientSession.login()
Override the login message to connect clients after the login succeeds. If a client fails to connect, the login will be aborted and a LoginFailureException will be thrown
@param loginParameters the parameters to login with
@throws LoginFailureException if the login fails or any of the clientsfail to connect
-
org.jdesktop.wonderland.client.comms.WonderlandSession.login()
Log in to the server. This will connect to the given server, and wait for the login to succeed. If the login succeeds, negotiate a protocol using the Wonderland protocol negotiation mechanism. This method blocks until both the login and protocol selection have been verified by the server.
If this method returns normally, then the login and protocol selection succeeded. If it throws a LoginFailureException, the login has failed.
@param loginParams the parameters required for login
@throws LoginFailureException if the login fails
-
org.jdesktop.wonderland.client.comms.WonderlandSessionImpl.login()
-
org.jitterbit.integration.client.server.login.Authenticate.login()
@param credentials
@throws IntegrationServerException
-
org.jitterbit.integration.client.server.login.LoginService.login()
Attempts to log in to the specified server, using the specified credentials.
@param credentials the credentials to use when logging in.
@throws NullPointerException if credentials
is null.
-
org.jitterbit.integration.client.server.ui.login.LoginServiceUi.login()
Displays a login dialog that allows the user to enter a username, password, and the server to log in to. It then spawns a new thread in which a login request is made to the {@link LoginService#login(LoginCredentials) LoginService}.
@param externalCallback an optional LoginCallback
that will be notified on the outcome of the login request
-
org.jivesoftware.smack.Connection.login()
Logs in to the server using the strongest authentication mode supported by the server, then sets presence to available. If the server supports SASL authentication then the user will be authenticated using SASL if not Non-SASL authentication will be tried. If more than five seconds (default timeout) elapses in each step of the authentication process without a response from the server, or if an error occurs, a XMPPException will be thrown.
Before logging in (i.e. authenticate) to the server the connection must be connected. It is possible to log in without sending an initial available presence by using {@link ConnectionConfiguration#setSendPresence(boolean)}. If this connection is not interested in loading its roster upon login then use {@link ConnectionConfiguration#setRosterLoadedAtLogin(boolean)}. Finally, if you want to not pass a password and instead use a more advanced mechanism while using SASL then you may be interested in using {@link ConnectionConfiguration#setCallbackHandler(javax.security.auth.callback.CallbackHandler)}. For more advanced login settings see {@link ConnectionConfiguration}.
@param username the username.
@param password the password or null if using a CallbackHandler.
@throws XMPPException if an error occurs.
-
org.jivesoftware.smack.XMPPConnection.login()
-
org.jmanage.core.services.AuthService.login()
@param context
@param username
@param password
-
org.jvnet.hudson.test.JenkinsRule.WebClient.login()
-
org.knopflerfish.cpaexample.service.user.UserService.login()
-
org.mbhcare.client.LoginServiceAsync.login()
-
org.mc4j.ems.impl.jmx.connection.support.providers.JBossConnectionProvider.login()
-
org.modeshape.jcr.api.Repository.login()
-
org.mule.transport.sftp.SftpClient.login()
-
org.ofbiz.guiapp.xui.XuiSession.login()
-
org.ofbiz.ldap.commons.InterfaceOFBizAuthenticationHandler.login()
Login a user.
@param request HttpServletRequest
@param response HttpServletResponse
@param rootElement Element root element of ldap config file
@return success if the user can login successfully; otherwise, error.
@throws Exception
-
org.ogce.expbuilder.context.ApplicationGlobalContext.login()
@throws GfacException
-
org.openoffice.gdocs.util.Wrapper.login()
-
org.picketlink.Identity.login()
-
org.picketlink.identity.federation.core.wstrust.auth.AbstractSTSLoginModule.login()
Subclasses must implement the login to perform their specific tasks. The login module should call {@link #setSamlToken(Element)} with the saml token element that should be added to thepublic credentials in {@link #commit()}.
@return true If the login was successful otherwise false.
@throws LoginException If an error occurs while trying to perform the authentication.
-
org.picketlink.identity.federation.core.wstrust.auth.STSIssuingLoginModule.login()
-
org.picketlink.identity.federation.core.wstrust.auth.STSValidatingLoginModule.login()
-
org.rhq.enterprise.clientapi.RemoteClient.login()
Connects to the remote server and logs in with the given credentials. After successfully executing this, {@link #isLoggedIn()} will be true
and {@link #getSubject()} will return the subject that this method returns.
@param user
@param password
@return the logged in user
@throws Exception if failed to connect to the server or log in
-
org.rosuda.REngine.Rserve.RConnection.login()
-
org.sd_network.vfs.VfsService.login()
Login to this system by specified user account. The user account was registered to this system first. In order to register user account, you can call {@link #addUser} method.
@param loginName Login name of user.
@param password password of user.
@return the session ID if login was successful.
@throws NullPointerException Throws if null was specified to these parameters.
@throws AuthenticationException Throws if login failed.
-
org.sonar.api.issue.internal.IssueChangeContext.login()
-
org.sonar.server.user.UserSession.login()
-
org.sonar.wsclient.user.User.login()
Unique login
-
org.sonatype.security.SecuritySystem.login()
Authenticates a user and logs them in. If successful returns a Subject.
@return the Subject representing the logged in user.
@throws AuthenticationException if the user can not be authenticated
-
org.springframework.nanotrader.data.service.TradingService.login()
-
org.traccar.web.client.model.UserProperties.login()
-
org.vietspider.browser.HttpSessionUtils.login()
-
org.wicketstuff.security.WaspSession.login()
Attempts to login with the current login info.
@param context any type of information required to login
@throws LoginException
@see WaspAuthorizationStrategy#login(Object)
-
org.wikipedia.Wiki.login()
Logs in to the wiki. This method is thread-safe. If the specified username or password is incorrect, the thread blocks for 20 seconds then throws an exception.
@param username a username
@param password a password (as a char[] due to JPasswordField)
@throws FailedLoginException if the login failed due to incorrectusername and/or password
@throws IOException if a network error occurs
@see #logout
-
org.wikipediacleaner.api.API.login()
iki/API:Login">API:Login
-
org.wikipediacleaner.api.request.ApiLoginRequest.login()
Login.
@param username User name.
@param password Password.
@return Login result.
-
org.wso2.carbon.authenticator.proxy.AuthenticationAdminClient.login()
-
org.wso2.carbon.authenticator.proxy.AuthenticationAdminStub.login()
-
org.wso2.carbon.authenticator.stub.AuthenticationAdminStub.login()
-
org.wso2.carbon.core.services.authentication.AuthenticationAdminServiceStub.login()
Auto generated method signature
@see org.wso2.carbon.core.services.authentication.AuthenticationAdminService#login
@param login26
@throws org.wso2.carbon.core.services.authentication.AuthenticationExceptionException :
-
org.wso2.carbon.core.services.authentication.AuthenticationAdminStub.login()
-
org.wso2.carbon.event.client.stub.generated.authentication.AuthenticationAdminServiceStub.login()
-
org.wso2.carbon.identity.authenticator.saml2.sso.ui.client.SAML2SSOAuthenticationClient.login()
-
org.wso2.carbon.issue.tracker.mgt.IssueTrackerAdmin.login()
admin service to capture credentials and login
@param credentials
@return
@throws IssueTrackerException
-
org.wso2.carbon.issue.tracker.ui.IssueTrackerClient.login()
-
org.wso2.carbon.jira.reporting.JiraIssueReporter.login()
method to log in to jira
@param credentials credentials of a jira account
@return authentication token
@throws IssueTrackerException thrown if credentials are invalid or jira sever is unavailable
-
org.xmlBlaster.protocol.corba.authenticateIdl.AuthServer.login()
-
org.xwiki.test.ui.xe.elements.AllDocsPage.login()
-
org.xwiki.xmlrpc.XWikiXmlRpcClient.login()
-
rocks.xmpp.core.session.XmppSession.login()
Authenticates against the server and binds a random resource (assigned by the server).
@param user The user name. Usually this is the local part of the user's JID. Must not be null.
@param password The password. Must not be null.
@throws LoginException If the login failed, due to a SASL error reported by the server.
@throws FailedLoginException If the login failed, due to a wrong username or password. It is thrown if the server reports a {@code
} SASL error.
@throws AccountLockedException If the login failed, because the account has been disabled. It is thrown if the server reports a {@code
} SASL error.
@throws CredentialExpiredException If the login failed, because the credentials have expired. It is thrown if the server reports a {@code
} SASL error.
-
scotlandyard.engine.impl.Engine.login()
inserts player into the engine with duplicate name and email provide, or third party authorisation information
@param email - email of user
@param name - name of user
@param sid
@return user object
@throws Exception - throws if the input detail is invalid
-
simpleserver.Authenticator.login()
LOGIN
-
sos.net.SOSFTP.login()
-
sos.net.SOSFTPS.login()
-
sun.net.ftp.FtpClient.login()
login user to a host with username user and password password
@param user Username to use at login
@param password Password to use at login or null of none is needed
@exception FtpLoginException if login is unsuccesful
-
uk.ac.ebi.age.admin.client.AgeAdminService.login()
-
unibg.overencrypt.core.User.login()
Check if the passed password is equals to the result of hashing of the password in db
@param username - username of the user
@param password - password to check
@return true if the passed password is equals to the password into DB, false otherwise
@throws Exception
-
utils.Secure.login()
-
waffle.apache.catalina.SimpleHttpRequest.login()
-
welcome.client.LoginServiceAsync.login()