layout | title | category |
---|---|---|
default |
CAS - Delegate Authentication |
Authentication |
{% include variables.html %}
For an overview of the delegated authentication flow, please see this guide.
Support is enabled by including the following dependency in the WAR overlay:
{% include_cached casmodule.html group="org.apereo.cas" module="cas-server-support-pac4j-oidc" %}
{% include_cached casproperties.html properties="cas.authn.pac4j.oidc[].generic" %}
Th configuration for the external OpenID Connect identity provider is typically done at build time via CAS configuration settings and applies to all applications and relying parties. You may override certain aspects this configuration on a per application basis by assigning dedicated properties to the service definition.
{% include_cached registeredserviceproperties.html groups="DELEGATED_AUTHN,DELEGATED_AUTHN_OIDC" %}
A sample JSON file follows:
{
"@class" : "org.apereo.cas.services.CasRegisteredService",
"serviceId" : "^https://app.example.org",
"name" : "Example",
"id" : 1,
"properties" : {
"@class" : "java.util.HashMap",
"max_age" : {
"@class" : "org.apereo.cas.services.DefaultRegisteredServiceProperty",
"values" : [ "java.util.HashSet", [ "1000" ] ]
},
"scope" : {
"@class" : "org.apereo.cas.services.DefaultRegisteredServiceProperty",
"values" : [ "java.util.HashSet", [ "openid profile" ] ]
}
}
}
See registered service properties for more details.