Tracking Authentication Interrupts Per Service
Application definitions may be assigned a dedicated webflow interrupt policy. A sample JSON file follows:
1
2
3
4
5
6
7
8
9
10
11
12
13
{
"@class" : "org.apereo.cas.services.CasRegisteredService",
"serviceId" : "^https://.+",
"name" : "sample service",
"id" : 100,
"webflowInterruptPolicy" : {
"@class" : "org.apereo.cas.services.DefaultRegisteredServiceWebflowInterruptPolicy",
"enabled": true,
"forceExecution": "TRUE",
"attributeName": "mem...of",
"attributeValue": "^st[a-z]ff$"
}
}

Authentication interrupts should work for all client application types supported by CAS, regardless of authentication protocol. Whether your application speaks CAS, SAML2, OpenID Connect, etc, the interrupt policy should equally apply and its method of configuration in the application definition remains the same.
The following policy settings are supported:
Field | Description |
---|---|
enabled |
Whether interrupt notifications are enabled for this application. Default is true . |
forceExecution |
Whether execution should proceed anyway, regardless. Accepted values are TRUE , FALSE or UNDEFINED . |
attributeName |
Regular expression pattern to compare against authentication and principal attribute names to trigger interrupt. |
attributeValue |
Regular expression pattern to compare against authentication and principal attribute values to trigger interrupt. |