Apache Syncope Authentication
CAS support handling the authentication event via Apache Syncope. This
is done by using the rest/users/self
REST API that is exposed by a running Syncope instance.
As part of a successful authentication attempt, the properties of the provided user object
are transformed into CAS attributes that can then be released to applications, etc.
Components
Support is enabled by including the following dependency in the WAR overlay:
1
2
3
4
5
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-server-support-syncope-authentication</artifactId>
<version>${cas.version}</version>
</dependency>
1
implementation "org.apereo.cas:cas-server-support-syncope-authentication:${project.'cas.version'}"
1
2
3
4
5
6
7
8
9
dependencyManagement {
imports {
mavenBom "org.apereo.cas:cas-server-support-bom:${project.'cas.version'}"
}
}
dependencies {
implementation "org.apereo.cas:cas-server-support-syncope-authentication"
}
1
2
3
4
5
6
7
8
9
10
dependencies {
/*
The following platform references should be included automatically and are listed here for reference only.
implementation enforcedPlatform("org.apereo.cas:cas-server-support-bom:${project.'cas.version'}")
implementation platform(org.springframework.boot.gradle.plugin.SpringBootPlugin.BOM_COORDINATES)
*/
implementation "org.apereo.cas:cas-server-support-syncope-authentication"
}
The following settings and properties are available from the CAS configuration catalog:
cas.authn.syncope.password-encoder.encoding-algorithm=
The encoding algorithm to use such as
|
cas.authn.syncope.password-encoder.type=NONE
Define the password encoder type to use. Type may be specified as blank or
|
cas.authn.syncope.principal-transformation.groovy.location=
The location of the resource. Resources can be URLS, or files found either on the classpath or outside somewhere in the file system. In the event the configured resource is a Groovy script, specially if the script set to reload on changes, you may need to adjust the total number ofinotify instances. On Linux, you may need to add the following line to /etc/sysctl.conf : fs.inotify.max_user_instances = 256 . You can check the current value via cat /proc/sys/fs/inotify/max_user_instances .
|
cas.authn.syncope.domain=Master
Syncope domain used for authentication, etc. Multiple domains can be separated via comma. Each domain entry results in a separate authentication attempt and transaction by CAS.
|
cas.authn.syncope.url=
Syncope instance URL primary used for REST.
|
cas.authn.syncope.password-encoder.character-encoding=UTF-8
The encoding algorithm to use such as 'UTF-8'. Relevant when the type used is
|
cas.authn.syncope.password-encoder.hash-length=16
When used by
|
cas.authn.syncope.password-encoder.secret=
Secret to use with
|
cas.authn.syncope.password-encoder.strength=16
Strength or number of iterations to use for password hashing. Usually relevant when dealing with
|
cas.authn.syncope.principal-transformation.blocking-pattern=
A regular expression that will be used against the username to match for blocking/forbidden values. If a match is found, an exception will be thrown and principal transformation will fail.
|
cas.authn.syncope.principal-transformation.case-conversion=NONE
Indicate whether the principal identifier should be transformed into upper-case, lower-case, etc. Available values are as follows:
|
cas.authn.syncope.principal-transformation.pattern=
A regular expression that will be used against the provided username for username extractions. On a successful match, the first matched group in the pattern will be used as the extracted username.
|
cas.authn.syncope.principal-transformation.prefix=
Prefix to add to the principal id prior to authentication.
|
cas.authn.syncope.principal-transformation.suffix=
Suffix to add to the principal id prior to authentication.
|