generateUserInfoClaims(AccessToken, UserModel) |  | 0% |  | 0% | 28 | 28 | 61 | 61 | 1 | 1 |
validateToken(KeycloakSession, UriInfo, ClientConnection, RealmModel, RefreshToken, HttpHeaders) |  | 0% |  | 0% | 15 | 15 | 52 | 52 | 1 | 1 |
checkTokenValidForIntrospection(KeycloakSession, RealmModel, AccessToken, boolean) |  | 0% |  | 0% | 20 | 20 | 41 | 41 | 1 | 1 |
refreshAccessToken(KeycloakSession, UriInfo, ClientConnection, RealmModel, ClientModel, String, EventBuilder, HttpHeaders, HttpRequest) |  | 0% |  | 0% | 7 | 7 | 26 | 26 | 1 | 1 |
attachAuthenticationSession(KeycloakSession, UserSessionModel, AuthenticationSessionModel) |  | 0% |  | 0% | 5 | 5 | 24 | 24 | 1 | 1 |
verifyRefreshToken(KeycloakSession, RealmModel, ClientModel, HttpRequest, String, boolean) |  | 0% |  | 0% | 11 | 11 | 25 | 25 | 1 | 1 |
getTokenExpiration(RealmModel, ClientModel, UserSessionModel, AuthenticatedClientSessionModel, boolean) |  | 0% |  | 0% | 11 | 11 | 21 | 21 | 1 | 1 |
initToken(RealmModel, ClientModel, UserModel, UserSessionModel, ClientSessionContext, UriInfo) |  | 0% |  | 0% | 5 | 5 | 22 | 22 | 1 | 1 |
isValidScope(String, AuthorizationRequestContext, ClientModel) |  | 0% |  | 0% | 10 | 10 | 20 | 20 | 1 | 1 |
verifyLogoutToken(KeycloakSession, RealmModel, String) |  | 0% |  | 0% | 10 | 10 | 22 | 22 | 1 | 1 |
validateTokenReuseForRefresh(KeycloakSession, RealmModel, RefreshToken, TokenManager.TokenValidation) |  | 0% |  | 0% | 3 | 3 | 13 | 13 | 1 | 1 |
isValidScope(String, ClientModel) |  | 0% |  | 0% | 8 | 8 | 16 | 16 | 1 | 1 |
validateTokenReuse(KeycloakSession, RealmModel, AccessToken, AuthenticatedClientSessionModel, boolean) |  | 0% |  | 0% | 8 | 8 | 15 | 15 | 1 | 1 |
validateTokenReuseForIntrospection(KeycloakSession, RealmModel, AccessToken) |  | 0% |  | 0% | 2 | 2 | 11 | 11 | 1 | 1 |
getAccess(UserModel, ClientModel, Stream) |  | 0% |  | 0% | 4 | 4 | 13 | 13 | 1 | 1 |
isUserValid(KeycloakSession, RealmModel, AccessToken, UserModel) |  | 0% |  | 0% | 3 | 3 | 12 | 12 | 1 | 1 |
verifyIDToken(KeycloakSession, RealmModel, String) |  | 0% | | n/a | 1 | 1 | 8 | 8 | 1 | 1 |
getRequestedClientScopes(String, ClientModel) |  | 0% |  | 0% | 2 | 2 | 8 | 8 | 1 | 1 |
getOIDCIdentityProviders(RealmModel, KeycloakSession) |  | 0% | | n/a | 1 | 1 | 7 | 7 | 1 | 1 |
verifyConsentStillAvailable(KeycloakSession, UserModel, ClientModel, Stream) |  | 0% |  | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
lookupUserFromStatelessToken(KeycloakSession, RealmModel, AccessToken) |  | 0% |  | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
checkLogoutTokenForEvents(LogoutToken) |  | 0% |  | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
createClientAccessToken(KeycloakSession, RealmModel, ClientModel, UserModel, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 3 | 3 | 1 | 1 |
lambda$verifyConsentStillAvailable$6(UserConsentModel, ClientModel, UserModel, ClientScopeModel) |  | 0% |  | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
toRefreshToken(KeycloakSession, String) |  | 0% |  | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
verifyIDTokenSignature(KeycloakSession, String) |  | 0% |  | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
transformAccessToken(KeycloakSession, AccessToken, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
transformAccessTokenResponse(KeycloakSession, AccessTokenResponse, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
transformUserInfoAccessToken(KeycloakSession, AccessToken, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
transformIDToken(KeycloakSession, IDToken, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
toLogoutToken(String) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
lambda$validateLogoutTokenAgainstIdpProvider$13(String, OIDCIdentityProvider) |  | 0% | | n/a | 1 | 1 | 5 | 5 | 1 | 1 |
responseBuilder(RealmModel, ClientModel, EventBuilder, KeycloakSession, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
validateLogoutTokenAgainstIdpProvider(Stream, String, LogoutToken) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
lambda$getAccess$5(ClientModel, ClientScopeModel) |  | 0% | | n/a | 1 | 1 | 3 | 3 | 1 | 1 |
dettachClientSession(AuthenticatedClientSessionModel) |  | 0% |  | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
formatTokenType(ClientModel) |  | 0% |  | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
getValidOIDCIdentityProvidersForBackchannelLogout(RealmModel, KeycloakSession, String, LogoutToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validateLogoutTokenAgainstIdpProvider$11(OIDCIdentityProvider) |  | 0% |  | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
lambda$checkTokenValidForIntrospection$1(ClientModel, UserSessionModel) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$getOIDCIdentityProviders$14(KeycloakSession, IdentityProviderModel) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validateTokenReuseForIntrospection$2(KeycloakSession, RealmModel, AccessToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validateToken$0(KeycloakSession, RealmModel, RefreshToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
parseScopeParameter(String) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validateLogoutTokenAgainstIdpProvider$12(LogoutToken, OIDCIdentityProvider) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validateTokenReuseForIntrospection$3(UserSessionManager, RealmModel, AccessToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$transformIDToken$10(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$transformUserInfoAccessToken$9(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$transformAccessTokenResponse$8(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$transformAccessToken$7(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
static {...} |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
TokenManager() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$getAccess$4(ClientScopeModel) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |