RC5 Release Notes

We strongly recommend that you take advantage of the release candidates as they come out. Waiting for a GA release is only going to set you up for unpleasant surprises. A GA is a tag and nothing more. Note that CAS releases are strictly time-based releases; they are not scheduled or based on specific benchmarks, statistics or completion of features. To gain confidence in a particular release, it is strongly recommended that you start early by experimenting with release candidates and/or follow-up snapshots.

Apereo Membership

If you benefit from Apereo CAS as free and open-source software, we invite you to join the Apereo Foundation and financially support the project at a capacity that best suits your deployment. Note that all development activity is performed almost exclusively on a voluntary basis with no expectations, commitments or strings attached. Having the financial means to better sustain engineering activities will allow the developer community to allocate dedicated and committed time for long-term support, maintenance and release planning, especially when it comes to addressing critical and security issues in a timely manner. Funding will ensure support for the software you rely on and you gain an advantage and say in the way Apereo, and the CAS project at that, runs and operates. If you consider your CAS deployment to be a critical part of the identity and access management ecosystem, this is a viable option to consider.

Get Involved

Resources

Overlay

In the gradle.properties of the CAS WAR Overlay, adjust the following setting:

1
cas.version=6.6.0-RC5
System Requirements
There are no changes to the minimum system/platform requirements for this release.

New & Noteworthy

The following items are new improvements and enhancements presented in this release.

Refreshable JDBC/JPA Integrations

CAS modules that offer an integration with a relational database, such as JPA Service Registry, are now extensively enhanced and tested to ensure the underlying components can correctly respond to refresh events, when the application context is reloaded once a property is changed.

Refreshable Delegated Identity Providers

The collection of external identity providers that are used for delegated authentication can now be registered with CAS using an external REST API that is able to produce identity provider configuration using a collection of CAS-owned properties as the final payload.

DPoP Access Tokens

Initial support for DPoP access tokens is now available when CAS is acting as an OpenID Connect provider. DPoP is a security extension for binding access tokens to a private key that belongs to the client. The binding makes the DPoP access token sender-constrained and its replay, if leaked or stolen token, can be effectively detected and prevented, as opposed to the common Bearer token.

SSO Sessions

A modest version of the user’s active SSO sessions is included in the account profile dashboard. Authentication requests that can be linked to user agents and devices may also be automatically geo-tracked and located on the dashboard.

Testing Strategy

The collection of end-to-end browser tests based on Puppeteer continue to grow to cover more use cases and scenarios. At the moment, total number of jobs stands at approximately 317 distinct scenarios. The overall test coverage of the CAS codebase is approximately 94%.

OpenID Connect ID Tokens

The expiration policy of OpenID Connect ID Tokens is now separated from SSO expiration policy and session length, and is given its own independant setting in the CAS configuration schema, though the default continues to match the default SSO session timeout.

IP Geo Location

Geo tracking authentication requests is now possible using IP GeoLocation.

Other Stuff

  • The configuration for the embedded Apache Tomcat is now allowed to create multiple connectors and ports. The secure and scheme attributes are also customizable.
  • Rules for redirecting to a service after a logout operation are now tightened to make sure protocol cross-over is not possible.
  • The OpenID Connect userinfo endpoint is now able to correctly process mapped claims defined in CAS configuration.
  • Account profile management is now able to allow entry access when CAS is set to disallow missing service parameters.
  • Certain ticket-related operations are now removed from the CentralAuthenticationService interface, as all transaction-bound operations should now be moved inside the TicketRegistry interface.
  • The NotOnOrAfter attribute in SAML1 responses is using now as the basis for calculating the final value.
  • Minor adjustments to attribute release policies, with particular attention to reusing resolved attributes as part of a chain.
  • Minor adjustments to documentation validation processes when publishing to the documentation website.
  • The issuer length setting that allows one to skew the SAML1 conditions can now be specified as a Duration.
  • On successful login attempts and in case no service is specified, CAS will redirect to Account profile management in case the feature is enabled.
  • RESTful attribute release policy is now able to optionally remap received attributes.
  • The CAS Gradle build is now able to support aarch64 architectures for internal builds.
  • The Argon2 hashing function is now supported for password encoding operations.
  • Disabling SSO globally via CAS settings should now disregard SSO sessions for all scenarios.

Library Upgrades

  • Spring Security
  • Google Firebase
  • Spring Data
  • Spring Boot
  • Spring Boot Admin
  • Spring Shell
  • Spring Integration
  • Dropwizard
  • Gradle
  • Amazon SDK
  • Okio
  • Acme4j
  • Twilio
  • CosmosDb
  • MariaDb
  • MongoDb
  • Netty
  • Micrometer
  • Apache Groovy
  • Apache Log4j
  • Apache Curator
  • Spring Boot Admin
  • Apache Tomcat
  • Hibernate
  • Lettuce
  • Infinispan
  • Caffein