diff --git a/openid-connect-server-webapp/src/main/resources/db/clients.sql b/openid-connect-server-webapp/src/main/resources/db/clients.sql
index cb8a6c236..7e7a8a53d 100644
--- a/openid-connect-server-webapp/src/main/resources/db/clients.sql
+++ b/openid-connect-server-webapp/src/main/resources/db/clients.sql
@@ -11,9 +11,7 @@ START TRANSACTION;
--
INSERT INTO client_details_TEMP (client_id, client_secret, client_name, dynamically_registered, refresh_token_validity_seconds, access_token_validity_seconds, id_token_validity_seconds, allow_introspection) VALUES
- ('client', 'secret', 'Test Client', false, null, 3600, 600, true),
- ('rs', 'secret', 'Test UMA RS', false, null, null, 600, false),
- ('c', 'secret', 'Test UMA Client', false, null, null, 600, false);
+ ('client', 'secret', 'Test Client', false, null, 3600, 600, true);
INSERT INTO client_scope_TEMP (owner_id, scope) VALUES
('client', 'openid'),
@@ -21,9 +19,7 @@ INSERT INTO client_scope_TEMP (owner_id, scope) VALUES
('client', 'email'),
('client', 'address'),
('client', 'phone'),
- ('client', 'offline_access'),
- ('rs', 'uma_protection'),
- ('c', 'uma_authorization');
+ ('client', 'offline_access');
INSERT INTO client_redirect_uri_TEMP (owner_id, redirect_uri) VALUES
('client', 'http://localhost/'),
@@ -33,11 +29,7 @@ INSERT INTO client_grant_type_TEMP (owner_id, grant_type) VALUES
('client', 'authorization_code'),
('client', 'urn:ietf:params:oauth:grant_type:redelegate'),
('client', 'implicit'),
- ('client', 'refresh_token'),
- ('rs', 'authorization_code'),
- ('rs', 'implicit'),
- ('c', 'authorization_code'),
- ('c', 'implicit');
+ ('client', 'refresh_token');
--
-- Merge the temporary clients safely into the database. This is a two-step process to keep clients from being created on every startup with a persistent store.
diff --git a/openid-connect-server-webapp/src/main/resources/db/scopes.sql b/openid-connect-server-webapp/src/main/resources/db/scopes.sql
index e0345dce0..27792880f 100644
--- a/openid-connect-server-webapp/src/main/resources/db/scopes.sql
+++ b/openid-connect-server-webapp/src/main/resources/db/scopes.sql
@@ -16,9 +16,7 @@ INSERT INTO system_scope_TEMP (scope, description, icon, restricted, default_sco
('email', 'email address', 'envelope', false, true, false, null),
('address', 'physical address', 'home', false, true, false, null),
('phone', 'telephone number', 'bell', false, true, false, null),
- ('offline_access', 'offline access', 'time', false, false, false, null),
- ('uma_protection', 'manage protected resources', 'briefcase', false, false, false, null),
- ('uma_authorization', 'request access to protected resources', 'share', false, false, false, null);
+ ('offline_access', 'offline access', 'time', false, false, false, null);
--
-- Merge the temporary scopes safely into the database. This is a two-step process to keep scopes from being created on every startup with a persistent store.
diff --git a/openid-connect-server-webapp/src/main/webapp/WEB-INF/application-context.xml b/openid-connect-server-webapp/src/main/webapp/WEB-INF/application-context.xml
index 836ec75d6..ea1cf3fc8 100644
--- a/openid-connect-server-webapp/src/main/webapp/WEB-INF/application-context.xml
+++ b/openid-connect-server-webapp/src/main/webapp/WEB-INF/application-context.xml
@@ -119,24 +119,6 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
@@ -154,7 +136,7 @@
create-session="stateless"
authentication-manager-ref="clientAuthenticationManager">
-
+
diff --git a/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/actionmenu.tag b/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/actionmenu.tag
index 47df4a361..d391a30ad 100644
--- a/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/actionmenu.tag
+++ b/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/actionmenu.tag
@@ -14,7 +14,6 @@
-
diff --git a/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/footer.tag b/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/footer.tag
index d5888ef7c..a089cc2bb 100644
--- a/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/footer.tag
+++ b/openid-connect-server-webapp/src/main/webapp/WEB-INF/tags/footer.tag
@@ -30,7 +30,6 @@
-
diff --git a/openid-connect-server-webapp/src/main/webapp/WEB-INF/user-context.xml b/openid-connect-server-webapp/src/main/webapp/WEB-INF/user-context.xml
index edddd37cf..54b8b5a9b 100644
--- a/openid-connect-server-webapp/src/main/webapp/WEB-INF/user-context.xml
+++ b/openid-connect-server-webapp/src/main/webapp/WEB-INF/user-context.xml
@@ -29,97 +29,6 @@
http://www.springframework.org/schema/tx http://www.springframework.org/schema/tx/spring-tx-4.1.xsd
http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context-4.1.xsd">
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- openid
- profile
- email
- phone
- address
-
-
-
-
-
- #{configBean.issuer + "openid_connect_login"}
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
@@ -127,16 +36,14 @@
-
-
+
-
+
-
diff --git a/openid-connect-server-webapp/src/main/webapp/resources/js/admin.js b/openid-connect-server-webapp/src/main/webapp/resources/js/admin.js
index 98be97a2a..7bf63180a 100644
--- a/openid-connect-server-webapp/src/main/webapp/resources/js/admin.js
+++ b/openid-connect-server-webapp/src/main/webapp/resources/js/admin.js
@@ -503,8 +503,6 @@ var AppRouter = Backbone.Router.extend({
"user/approved":"approvedSites",
"user/tokens":"tokens",
"user/profile":"profile",
- "user/policy":"policy",
- "user/policy/:rsid":"editPolicy",
"dev/dynreg":"dynReg",
"dev/dynreg/new":"newDynReg",
@@ -536,7 +534,6 @@ var AppRouter = Backbone.Router.extend({
this.clientStats = new StatsModel();
this.accessTokensList = new AccessTokenCollection();
this.refreshTokensList = new RefreshTokenCollection();
- this.resourceSetList = new ResourceSetCollection();
this.breadCrumbView = new BreadCrumbView({
collection:new Backbone.Collection()
@@ -1071,62 +1068,13 @@ var AppRouter = Backbone.Router.extend({
this.updateSidebar('user/profile');
- var view = new UserProfileView({model: getUserInfo()});
- $('#content').html(view.render().el);
+ this.userProfileView = new UserProfileView({model: getUserInfo()});
+ $('#content').html(this.userProfileView.render().el);
setPageTitle($.t('admin.user-profile.show'));
},
- policy:function() {
- this.breadCrumbView.collection.reset();
- this.breadCrumbView.collection.add([
- {text:$.t('admin.home'), href:""},
- {text:$.t('policy.resource-sets'), href:"manage/#user/policy"}
- ]);
-
- this.updateSidebar('user/policy');
-
- var view = new ResourceSetListView({model: this.resourceSetList, clientList: this.clientList, systemScopeList: this.systemScopeList});
-
- view.load(function() {
- $('#content').html(view.render().el);
- setPageTitle($.t('policy.resource-sets'));
- });
-
- },
-
- editPolicy:function(rsid) {
- this.breadCrumbView.collection.reset();
- this.breadCrumbView.collection.add([
- {text:$.t('admin.home'), href:""},
- {text:$.t('policy.resource-sets'), href:"manage/#user/policy"},
- {text:$.t('policy.edit-policy'), href:"manage/#user/policy/" + rsid}
- ]);
-
- this.updateSidebar('user/policy');
-
- var rs = this.resourceSetList.get(rsid);
- if (rs == null) {
- // need to load it directly
- var claims = new ClaimCollection();
- } else {
- // the resource set is loaded, preload the claims
- var claims = new ClaimCollection(rs.get('claimsRequired'));
- claims.isFetched = true;
- }
- // set the URL for the collection
- claims.url = 'api/claims/' + rsid;
-
- var view = new ClaimListView({model: claims, rs: rs});
-
- view.load(function() {
- $('#content').html(view.render().el);
- setPageTitle($.t('policy.edit-policy'));
- });
-
- },
-
updateSidebar:function(item) {
$('.sidebar-nav li.active').removeClass('active');
@@ -1154,8 +1102,7 @@ $(function () {
$.get('resources/template/whitelist.html', _load),
$.get('resources/template/dynreg.html', _load),
$.get('resources/template/rsreg.html', _load),
- $.get('resources/template/token.html', _load),
- $.get('resources/template/policy.html', _load)
+ $.get('resources/template/token.html', _load)
).done(function() {
$.ajaxSetup({cache:false});
app = new AppRouter();
diff --git a/openid-connect-server-webapp/src/main/webapp/resources/js/locale/en/messages.json b/openid-connect-server-webapp/src/main/webapp/resources/js/locale/en/messages.json
index 40a1338e3..e0b176d49 100644
--- a/openid-connect-server-webapp/src/main/webapp/resources/js/locale/en/messages.json
+++ b/openid-connect-server-webapp/src/main/webapp/resources/js/locale/en/messages.json
@@ -17,8 +17,7 @@
"show": "View User Profile",
"text": "Your user profile has the following information:",
"value": "Claim value:"
- },
- "policies": "Manage Protected Resource Policies"
+ }
},
"client": {
"client-form": {
@@ -338,29 +337,6 @@
"whitelist-table": {
"no-sites": "There are no whitelisted sites. Use the whitelist button on the client management page to create one."
}
- },
- "policy" : {
- "resource-sets": "Resource Sets",
- "edit-policy": "Edit Policy",
- "required-claims": "Required Claims",
- "policy-table": {
- "confirm": "Are you sure you want to delete this resource set?",
- "delete": "Delete",
- "edit": "Edit Policies",
- "email-address": "email address",
- "required-claims": "Users that you share this resource will with need to be able to present the following claims in order to access the resource.",
- "no-resource-sets": "There are no resource sets registered. Introduce a protected to this authorization server to let it register some.",
- "no-required-claims": "There are no required claims for this resource set: This resource set is inaccessible by others.",
- "share-email": "Share with email address",
- "shared-with": "Shared with:",
- "shared-nobody": "NOBODY",
- "shared-nobody-tooltip": "This resource is not accessible by anyone else, edit the policies and share it with someone.",
- "issuers": "Issuers",
- "claim": "Claim",
- "value": "Value"
- },
- "webfinger-error": "Error",
- "webfinger-error-description": "The server was unable to find an identity provider for __email__
."
},
"copyright": "Powered by MITREid Connect {0} © 2015 The MITRE Corporation and MIT KIT..",
"about": {
@@ -420,8 +396,7 @@
"title": "Personal",
"approved_sites": "Manage Approved Sites",
"active_tokens": "Manage Active Tokens",
- "profile_information": "View Profile Information",
- "resource_policies": "Manage Protected Resource Policies"
+ "profile_information": "View Profile Information"
},
"developer": {
"title": "Developer",
diff --git a/pom.xml b/pom.xml
index 1e660ce47..b1fe303e4 100644
--- a/pom.xml
+++ b/pom.xml
@@ -510,11 +510,6 @@
3.9
-
- org.mitre
- openid-connect-client
- ${project.version}
-
@@ -573,4 +568,4 @@
-
\ No newline at end of file
+