WORKERS AHEAD!
You are viewing the development documentation for the Apereo CAS server. The functionality presented here is not officially released yet. This is a work in progress and will be continually updated as development moves forward. You are most encouraged to test the changes presented.
Delegated Authentication
CAS can act as a client (i.e. service provider or proxy) using the Pac4j library and delegate the authentication to:
- CAS servers
- SAML2 identity providers
- OAuth2 providers such as Facebook, Twitter, GitHub, Google, LinkedIn, etc
- OpenID Connect identity providers such as Google, Apple
- ADFS
Support is enabled by including the following dependency in the WAR overlay:
1
2
3
4
5
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-server-support-pac4j-webflow</artifactId>
<version>${cas.version}</version>
</dependency>
1
implementation "org.apereo.cas:cas-server-support-pac4j-webflow:${project.'cas.version'}"
1
2
3
4
5
6
7
8
9
dependencyManagement {
imports {
mavenBom "org.apereo.cas:cas-server-support-bom:${project.'cas.version'}"
}
}
dependencies {
implementation "org.apereo.cas:cas-server-support-pac4j-webflow"
}
1
2
3
4
5
6
dependencies {
implementation enforcedPlatform("org.apereo.cas:cas-server-support-bom:${project.'cas.version'}")
implementation platform(org.springframework.boot.gradle.plugin.SpringBootPlugin.BOM_COORDINATES)
implementation "org.apereo.cas:cas-server-support-pac4j-webflow"
}
The following settings and properties are available from the CAS configuration catalog:
cas.authn.pac4j.core.groovy-authentication-request-customizer.location=
The location of the resource. Resources can be URLs, or files found either on the classpath or outside somewhere in the file system. In the event the configured resource is a Groovy script, specially if the script set to reload on changes, you may need to adjust the total number ofinotify instances. On Linux, you may need to add the following line to /etc/sysctl.conf : fs.inotify.max_user_instances = 256 . You can check the current value via cat /proc/sys/fs/inotify/max_user_instances .
|
cas.authn.pac4j.core.groovy-provider-post-processor.location=
The location of the resource. Resources can be URLs, or files found either on the classpath or outside somewhere in the file system. In the event the configured resource is a Groovy script, specially if the script set to reload on changes, you may need to adjust the total number ofinotify instances. On Linux, you may need to add the following line to /etc/sysctl.conf : fs.inotify.max_user_instances = 256 . You can check the current value via cat /proc/sys/fs/inotify/max_user_instances .
|
cas.authn.pac4j.core.groovy-redirection-strategy.location=
The location of the resource. Resources can be URLs, or files found either on the classpath or outside somewhere in the file system. In the event the configured resource is a Groovy script, specially if the script set to reload on changes, you may need to adjust the total number ofinotify instances. On Linux, you may need to add the following line to /etc/sysctl.conf : fs.inotify.max_user_instances = 256 . You can check the current value via cat /proc/sys/fs/inotify/max_user_instances .
|
cas.authn.pac4j.core.session-replication.cookie.crypto.encryption.key=
The encryption key is a JWT whose length is defined by the encryption key size setting. |
cas.authn.pac4j.core.session-replication.cookie.crypto.signing.key=
The signing key is a JWT whose length is defined by the signing key size setting. |
cas.authn.pac4j.core.discovery-selection.json.location=
The location of the resource. Resources can be URLs, or files found either on the classpath or outside somewhere in the file system. In the event the configured resource is a Groovy script, specially if the script set to reload on changes, you may need to adjust the total number ofinotify instances. On Linux, you may need to add the following line to /etc/sysctl.conf : fs.inotify.max_user_instances = 256 . You can check the current value via cat /proc/sys/fs/inotify/max_user_instances .
|
cas.authn.pac4j.core.discovery-selection.selection-type=MENU
Indicate how the selection and presentation of identity providers would be controlled. Available values are as follows:
|
cas.authn.pac4j.core.session-replication.replicate-sessions=true
Indicates whether profiles and other session data, collected as part of authentication flows and protocol requests that are kept by the container session, should be replicated across the cluster using CAS and its own ticket registry. Without this option, profile data and other related pieces of information should be manually replicated via means and libraries outside of CAS. |
cas.authn.pac4j.core.session-replication.cookie.crypto.alg=
The signing/encryption algorithm to use. |
cas.authn.pac4j.core.session-replication.cookie.crypto.enabled=true
Whether crypto operations are enabled. |
cas.authn.pac4j.core.session-replication.cookie.crypto.encryption.key-size=512
The encryption key size. |
cas.authn.pac4j.core.session-replication.cookie.crypto.signing.key-size=512
The signing key size. |
cas.authn.pac4j.core.session-replication.cookie.crypto.strategy-type=ENCRYPT_AND_SIGN
Control the cipher sequence of operations. The accepted values are:
|
cas.authn.pac4j.core.session-replication.cookie.allowed-ip-addresses-pattern=
A regular expression pattern that indicates the set of allowed IP addresses, when This settings supports regular expression patterns. [?]. |
cas.authn.pac4j.core.session-replication.cookie.auto-configure-cookie-path=true
Decide if cookie paths should be automatically configured based on the application context path, when the cookie path is not configured. |
cas.authn.pac4j.core.session-replication.cookie.domain=
Cookie domain. Specifies the domain within which this cookie should be presented. The form of the domain name is specified by RFC 2965. A domain name begins with a dot (.foo.com) and means that the cookie is visible to servers in a specified Domain Name System (DNS) zone (for example, www.foo.com, but not a.b.foo.com). By default, cookies are only returned to the server that sent them. |
cas.authn.pac4j.core.session-replication.cookie.http-only=true
true if this cookie contains the HttpOnly attribute. This means that the cookie should not be accessible to scripting engines, like javascript. |
cas.authn.pac4j.core.session-replication.cookie.max-age=-1
The maximum age of the cookie, specified in seconds. By default, |
cas.authn.pac4j.core.session-replication.cookie.name=
Cookie name. Constructs a cookie with a specified name and value. The name must conform to RFC 2965. That means it can contain only ASCII alphanumeric characters and cannot contain commas, semicolons, or white space or begin with a |
cas.authn.pac4j.core.session-replication.cookie.path=
Cookie path. Specifies a path for the cookie to which the client should return the cookie. The cookie is visible to all the pages in the directory you specify, and all the pages in that directory's subdirectories. A cookie's path must include the servlet that set the cookie, for example, /catalog, which makes the cookie visible to all directories on the server under /catalog. Consult RFC 2965 (available on the Internet) for more information on setting path names for cookies. |
cas.authn.pac4j.core.session-replication.cookie.pin-to-session=true
When generating cookie values, determine whether the value should be compounded and signed with the properties of the current session, such as IP address, user-agent, etc. |
cas.authn.pac4j.core.session-replication.cookie.same-site-policy=
If a cookie is only intended to be accessed in a first party context, the developer has the option to apply one of settings SameSite=None , to designate cookies for cross-site access. When the SameSite=None attribute is present, an additional Secure attribute is used so cross-site cookies can only be accessed over HTTPS connections. Accepted values are:
|
cas.authn.pac4j.core.session-replication.cookie.secure=true
True if sending this cookie should be restricted to a secure protocol, or false if the it can be sent using any protocol. |
cas.authn.pac4j.core.cache-duration=PT8H
Control the expiration policy of the cache that holds onto the results. This settings supports the
|
cas.authn.pac4j.core.cache-size=100
Control the size of the delegated identity provider cache that holds identity providers. This setting specifies the maximum number of entries the cache may contain. Note that the cache may evict an entry before this limit is exceeded or temporarily exceed the threshold while evicting. As the cache size grows close to the maximum, the cache evicts entries that are less likely to be used again. For example, the cache may evict an entry because it hasn't been used recently or very often. |
cas.authn.pac4j.core.discovery-selection.json.principal-attribute=
The name of the principal attribute whose values will be compared against the key pattern defined in the configuration rules. If a match is found, then the provider configuration block will be used as the selected provider. The matching routine will examine all attribute values linked to the principal attribute to find any acceptable match. When this setting left undefined, then the resolved principal id for the given user identifier will be used to locate the provider. |
cas.authn.pac4j.core.lazy-init=true
Whether initialization of delegated identity providers should be done eagerly typically during startup. |
cas.authn.pac4j.core.name=
The name of the authentication handler in CAS used for delegation. |
cas.authn.pac4j.core.order=
Order of the authentication handler in the chain. |
cas.authn.pac4j.core.principal-id-attribute=
The attribute to use as the principal identifier built during and upon a successful authentication attempt. |
cas.authn.pac4j.core.typed-id-used=false
When constructing the final user profile from the delegated provider, determines if the provider id should be combined with the principal id. |