Uses of Class
io.helidon.security.integration.grpc.GrpcSecurityHandler
Packages that use GrpcSecurityHandler
-
Uses of GrpcSecurityHandler in io.helidon.security.integration.grpc
Fields in io.helidon.security.integration.grpc with type parameters of type GrpcSecurityHandlerModifier and TypeFieldDescriptionstatic final io.grpc.Context.Key<GrpcSecurityHandler>GrpcSecurity.GRPC_SECURITY_HANDLERThe default security handler gRPC metadata header key.Methods in io.helidon.security.integration.grpc that return GrpcSecurityHandlerModifier and TypeMethodDescriptionstatic GrpcSecurityHandlerGrpcSecurity.allowAnonymous()If called, authentication failure will not abort request and will continue as anonymous (defaults to false).static GrpcSecurityHandlerGrpcSecurity.audit()Whether to audit this request - defaults to false for GET and HEAD methods, true otherwise.GrpcSecurityHandler.audit()Audit this request for any method.GrpcSecurityHandler.auditEventType(String eventType) Override for event-type, defaults to "grpcRequest".GrpcSecurityHandler.auditMessageFormat(String messageFormat) Override for audit message format, defaults to "%2$s %1$s %4$s %5$s requested by %3$s".static GrpcSecurityHandlerGrpcSecurity.authenticate()If called, request will go through authentication process - defaults to false (even if authorize is true).GrpcSecurityHandler.authenticate()If called, request will go through authentication process - (authentication is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...).GrpcSecurityHandler.authenticationOptional()If called, authentication failure will not abort request and will continue as anonymous (authentication is not optional by default).static GrpcSecurityHandlerGrpcSecurity.authenticator(String explicitAuthenticator) Use a named authenticator (as supported by security - if not defined, default authenticator is used).GrpcSecurityHandler.authenticator(String explicitAuthenticator) Use a named authenticator (as supported by security - if not defined, default authenticator is used).static GrpcSecurityHandlerGrpcSecurity.authorize()Enable authorization for this route.GrpcSecurityHandler.authorize()If called, request will go through authorization process - (authorization is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...).static GrpcSecurityHandlerGrpcSecurity.authorizer(String explicitAuthorizer) Use a named authorizer (as supported by security - if not defined, default authorizer is used, if none defined, all is permitted).GrpcSecurityHandler.authorizer(String explicitAuthorizer) Use a named authorizer (as supported by security - if not defined, default authorizer is used, if none defined, all is permitted).GrpcSecurityHandler.customObject(Object object) Register a custom object for security request(s).static GrpcSecurityHandlerGrpcSecurity.enforce()Return a default instance to create a default enforcement point (or modify the result further).static GrpcSecurityHandlerGrpcSecurity.rolesAllowed(String... roles) An array of allowed roles for this path - must have a security provider supporting roles.GrpcSecurityHandler.rolesAllowed(String... roles) An array of allowed roles for this path - must have a security provider supporting roles (either authentication or authorization provider).static GrpcSecurityHandlerGrpcSecurity.secure()Secure access using authentication and authorization.GrpcSecurityHandler.skipAudit()Disable auditing of this request.GrpcSecurityHandler.skipAuthentication()If called, request will NOT go through authentication process.GrpcSecurityHandler.skipAuthorization()Skip authorization for this route.Methods in io.helidon.security.integration.grpc with parameters of type GrpcSecurityHandlerModifier and TypeMethodDescriptionGrpcSecurity.securityDefaults(GrpcSecurityHandler defaultHandler) Create a new gRPC security instance using the default handler as base defaults for all handlers used.