- Page 2 and 3: This documentation and any related
- Page 5 and 6: ContentsChapter 1: Java API Overvie
- Page 7 and 8: Make Policy Management API Requests
- Page 9: Set Search Parameters When You Crea
- Page 12 and 13: Code SamplesCode SamplesThe SiteMin
- Page 14 and 15: Policy Management APIThe SiteMinder
- Page 16 and 17: How Java Components Fit TogetherHow
- Page 20 and 21: Java API FlowIf you do not already
- Page 22 and 23: Java API FlowYou might already have
- Page 24 and 25: Javadoc ReferenceJavadoc ReferenceT
- Page 26 and 27: Connection ClassConnection ClassYou
- Page 28 and 29: Result ClassInterpret a Result Obje
- Page 30 and 31: Property ClassThe core methods of t
- Page 32 and 33: Agent API Class HierarchyThe Agent
- Page 34 and 35: Implement the Pure Java Agent API5.
- Page 36 and 37: Connection to a Policy Server■■
- Page 38 and 39: User Access to Resources5. Audit ca
- Page 40 and 41: Java Agent API ServicesJava Agent A
- Page 42 and 43: Authorization ServicesSession Termi
- Page 44 and 45: Tunnel ServicesTunnel ServicesTunne
- Page 46 and 47: Single Sign-on4. Custom agent creat
- Page 48 and 49: Server ClustersAdvantages of Sessio
- Page 50 and 51: Server ClustersCluster failover occ
- Page 52 and 53: Agent TypeAgent TypeThe Agent Type
- Page 54 and 55: About Policy ManagementAbout Policy
- Page 56 and 57: Policy Store Objects■■■■■
- Page 58 and 59: Write a Policy Management Applicati
- Page 60 and 61: Agent Configuration Object MethodsA
- Page 62 and 63: General Object MethodsMethoddeleteD
- Page 64 and 65: ODBC Query Scheme MethodsODBC Query
- Page 66 and 67: Realm MethodsMethoddoImport()Descri
- Page 68 and 69:
Self-Registration MethodsSelf-Regis
- Page 70 and 71:
Utility MethodsMethodgetUserPolicie
- Page 72 and 73:
Retrieve Objects from the Policy St
- Page 74 and 75:
Authentication Scheme Configuration
- Page 76 and 77:
Authentication Scheme Configuration
- Page 79 and 80:
Authentication Scheme Configuration
- Page 81:
individuals might increase their in
- Page 84 and 85:
Authentication Scheme Configuration
- Page 86 and 87:
Authentication Scheme Configuration
- Page 88 and 89:
Authentication Scheme Configuration
- Page 90 and 91:
Authentication Scheme Configuration
- Page 92 and 93:
Authentication Scheme Configuration
- Page 94 and 95:
Authentication Scheme Configuration
- Page 96 and 97:
Authentication Scheme Configuration
- Page 98 and 99:
Authentication Scheme Configuration
- Page 100 and 101:
Authentication Scheme Configuration
- Page 102 and 103:
Authentication Scheme Configuration
- Page 104 and 105:
Authentication Scheme Configuration
- Page 106 and 107:
Authentication Scheme Configuration
- Page 108 and 109:
Authentication Scheme Configuration
- Page 110 and 111:
Authentication Scheme Configuration
- Page 113 and 114:
Chapter 5: Authentication andAuthor
- Page 115 and 116:
Shared InformationShared Informatio
- Page 117 and 118:
Create a Custom Authentication Sche
- Page 119 and 120:
Create a Custom Authentication Sche
- Page 121 and 122:
Create a Custom Authentication Sche
- Page 123 and 124:
Create a Custom Authentication Sche
- Page 125 and 126:
Create a Custom Authentication Sche
- Page 127 and 128:
Use the Authorization API8. After t
- Page 129 and 130:
Use the Authorization APIInterpret
- Page 131 and 132:
Use the Authorization APIOther Clas
- Page 133 and 134:
Use the Authorization APIActive Rul
- Page 135 and 136:
Use the Authorization APITo modify
- Page 137:
Use the Authorization API■■To e
- Page 140 and 141:
The Required JAR File■■Adding a
- Page 142 and 143:
Attribute-based DelegationAttribute
- Page 144 and 145:
Implementation Class■SiteMinder a
- Page 146 and 147:
Search ClassThe objects correspondi
- Page 148 and 149:
Write a Directory Management Applic
- Page 150 and 151:
Write a Directory Management Applic
- Page 152 and 153:
Write a Directory Management Applic
- Page 154 and 155:
Write a Directory Management Applic
- Page 156 and 157:
Write a Directory Management Applic
- Page 158 and 159:
SearchesSet Search Parameters When
- Page 160 and 161:
SearchesSet the Search FilterThe se
- Page 162 and 163:
SearchesSearch an OrganizationIn th
- Page 164 and 165:
User Password StateThe following co
- Page 166 and 167:
Restricted Methods■■SmDmsUser.a
- Page 168 and 169:
Restricted MethodsMethodsearchForwa
- Page 170 and 171:
Authentication Scheme Dialog • 11
- Page 172 and 173:
getDmsContext() • 144, 166getDmsD
- Page 174 and 175:
organizations in flat directories
- Page 176 and 177:
SmApiResult class • 27SmApiSessio