Configure Service Access Strategy

The access strategy of a registered service provides fine-grained control over the service authorization rules. It describes whether the service is allowed to use the CAS server, allowed to participate in single sign-on authentication, etc. Additionally, it may be configured to require a certain set of principal attributes that must exist before access can be granted to the service. This behavior allows one to configure various attributes in terms of access roles for the application and define rules that would be enacted and validated when an authentication request from the application arrives.

Strategy Resource
Basic See this guide.
Unauthorized URLs See this guide.
ABAC See this guide.
Groovy See this guide.
Time-Based See this guide.
(Remote) HTTP Request See this guide.
Grouper See this guide.
AWS Verified Permissions See this guide.
OpenFGA See this guide.
Cerbos See this guide.
Open Policy Agent See this guide.
Chaining See this guide.
Custom See this guide.

Actuator Endpoints

The following endpoints are provided by CAS:

 Verify if service access can be granted to the user.