Azure Active Directory
For an overview of the delegated authentication flow, please see this guide.
The following settings and properties are available from the CAS configuration catalog:
cas.authn.pac4j.oidc[0].azure.discovery-uri=
The discovery endpoint to locate the provide metadata.
|
cas.authn.pac4j.oidc[0].azure.id=
The client id.
|
cas.authn.pac4j.oidc[0].azure.secret=
The client secret.
|
cas.authn.pac4j.oidc[0].azure.allow-unsigned-id-tokens=
Whether unsigned id tokens issued as plain JWTs are accepted.
|
cas.authn.pac4j.oidc[0].azure.auto-redirect-type=NONE
Auto-redirect to this client.
|
cas.authn.pac4j.oidc[0].azure.callback-url=
Callback URL to use to return the flow back to the CAS server one the identity provider is successfully done. This may be used at the discretion of the client and its type to build service parameters, redirect URIs, etc. If none is specified, the CAS server's login endpoint will be used as the basis of the final callback url.
|
cas.authn.pac4j.oidc[0].azure.callback-url-type=QUERY_PARAMETER
Determine how the callback url should be resolved.
Default is
|
cas.authn.pac4j.oidc[0].azure.client-name=
Name of the client mostly for UI purposes and uniqueness. This name, with 'non-word' characters converted to '-' (e.g. "This Org (New)" becomes "This-Org--New-") is added to the "class" attribute of the redirect link on the login page, to allow for custom styling of individual IdPs (e.g. for an organization logo).
|
cas.authn.pac4j.oidc[0].azure.connect-timeout=PT5S
Read timeout of the OIDC client. This settings supports the
|
cas.authn.pac4j.oidc[0].azure.css-class=
CSS class that should be assigned to this client.
|
cas.authn.pac4j.oidc[0].azure.custom-params=
Custom parameters to send along in authZ requests, etc.
|
cas.authn.pac4j.oidc[0].azure.disable-pkce=
Disable PKCE support for the provider.
|
cas.authn.pac4j.oidc[0].azure.display-name=
Indicate the title or display name of the client for decoration and client presentation purposes. If left blank, the client original name would be used by default.
|
cas.authn.pac4j.oidc[0].azure.enabled=true
Whether the client/external identity provider should be considered active and enabled for integration purposes.
|
cas.authn.pac4j.oidc[0].azure.expire-session-with-token=
Checks if sessions expire with token expiration.
|
cas.authn.pac4j.oidc[0].azure.include-access-token-claims=
If enabled, try to process the access token as a JWT and include its claims in the profile. Only enable this if there is an agreement between the IdP and CAS about the format of the access token. If not, the token format could change at any time.
|
cas.authn.pac4j.oidc[0].azure.logout-url=
Logout url used for this provider.
|
cas.authn.pac4j.oidc[0].azure.mapped-claims=
List arbitrary mappings of claims when fetching user profiles.
Uses a "directed list" where the allowed
syntax would be
|