I got it working by adding my own gauth.json in 
/cas-overlay-template/src/main/resources/services

{
  "@class" : "org.apereo.cas.services.RegexRegisteredService",
  "serviceId" : "^(https|imaps)://.*",
  "name": "oupsi",
  "id" : 100,
  "multifactorPolicy" : {
    "@class" : 
"org.apereo.cas.services.DefaultRegisteredServiceMultifactorPolicy",
    "multifactorAuthenticationProviders" : [ "java.util.LinkedHashSet", [ 
"mfa-gauth"] ]
  }
}

On Wednesday, June 21, 2017 at 9:48:09 AM UTC-4, Sai Mallela wrote:
>
> Hello Dimitri,
>
> Can you please help me with gauth to work globally. Here are my settings 
> in cas.properties and I still don't see the page or option to enter the 
> google authentication code:
>
> cas.server.name: https://drupalvm.dev:8443
> cas.server.prefix: https://drupalvm.dev:8443/cas
>
> cas.adminPagesSecurity.ip=127\.0\.0\.1
>
> logging.config: file:/etc/cas/config/log4j2.xml
>
> *//GAUTH MFA*
> cas.authn.mfa.globalProviderId=mfa-gauth
>
> cas.authn.mfa.gauth.windowSize=3
> cas.authn.mfa.gauth.issuer=companyname
> cas.authn.mfa.gauth.codeDigits=6
> cas.authn.mfa.gauth.label=google authentication
> cas.authn.mfa.gauth.timeStepSize=30
> cas.authn.mfa.gauth.rank=0
> cas.authn.mfa.gauth.trustedDeviceEnabled=true
>
> *//LDAP Authentication*
> cas.authn.ldap[0].type=AUTHENTICATED
> cas.authn.ldap[0].ldapUrl=ldap://1.2.3.4:389
> cas.authn.ldap[0].useSsl=false
> cas.authn.ldap[0].baseDn=ou=HWPeople, dc=companyname, dc=com
> cas.authn.ldap[0].userFilter=uid={user}
> cas.authn.ldap[0].bindDn=cn=Manager,dc=companyname,dc=com
> cas.authn.ldap[0].bindCredential=abcd
>
> cas.authn.attributeRepository.ldap.ldapUrl=ldap://1.2.3.4:389
> cas.authn.attributeRepository.ldap.useSsl=false
> cas.authn.attributeRepository.ldap.useStartTls=false
> cas.authn.attributeRepository.ldap.connectTimeout=5000
> cas.authn.attributeRepository.ldap.baseDn=ou=HWPeople, dc=companyname, 
> dc=com
> cas.authn.attributeRepository.ldap.userFilter=uid={user}
> cas.authn.attributeRepository.ldap.subtreeSearch=true
> cas.authn.attributeRepository.ldap.bindDn=cn=Manager,dc=companyname,dc=com
> cas.authn.attributeRepository.ldap.bindCredential=abcd
>
> logging.level.org.apereo=DEBUG
> logging.level.org.ldaptiv=DEBUG
>
> *#disable test user*
> cas.authn.accept.users=
>
> Thanks,
> Sai
>
>
> On Thursday, April 6, 2017 at 5:05:27 AM UTC-4, Dmytro Havrylov wrote:
>>
>> Hello, 
>>
>> I have a trouble configuring MFA trigger depending on Global Principal 
>> Attribute. According to the documentation it should work like
>>
>> MFA can be triggered for all users/subjects carrying a specific 
>> attribute that matches one of the conditions below.
>>
>>
>> * Trigger MFA based on a principal attribute(s) whose value(s) EXACTLY 
>> matches an MFA provider. This option is more relevant if you have more 
>> than one provider configured or if you have the flexibilty of assigning 
>> provider ids to attributes as values.
>>
>>
>> I have two MFA providers configured in the system: mfa-yubikey and 
>> mfa-gauth. Both of them are working as expected if used as 
>> cas.authn.mfa.globalProviderId (as single MFA provider). In my case I need 
>> to choose the MFA provider according to the attribute value saved in the 
>> LDAP. So I have following lines in the properties (the MFA provider should 
>> be stored into the businessCategory LDAP attribute):
>>
>> "cas.authn.ldap[0].principalAttributeId": "uid",
>> "cas.authn.ldap[0].principalAttributePassword": "userPassword",
>> "cas.authn.ldap[0].principalAttributeList": 
>> "sn,cn:commonName,givenName,yubiKeyId,businessCategory",
>> "cas.authn.attributeRepository.ldap.attributes.uid": "uid",
>> "cas.authn.attributeRepository.ldap.attributes.yubiKeyId": "yubiKeyId",
>> "cas.authn.attributeRepository.ldap.attributes.businessCategory": 
>> "businessCategory",
>> "cas.authn.attributeRepository.ldap.defaultAttributesToRelease": 
>> "uid,yubiKeyId,businessCategory",
>> "cas.authn.mfa.globalPrincipalAttributeNameTriggers": "businessCategory",
>> "cas.authn.mfa.globalPrincipalAttributeValueRegex": 
>> "mfa-yubikey|mfa-gauth",
>>
>> Property cas.authn.mfa.globalProviderId is not set.
>> The project get's compiled and deployed without exceptions. Then I set 
>> businessCategory attribute to the random value the MFA is not triggered at 
>> all. This is expected, because it does not match the regexp. If I set it to 
>> the "mfa-yubikey" then gauth gets triggered (but yubikey is expected). I 
>> can find the following in the logs (with debug enabled):
>>
>> ...
>> 2017-04-03 13:18:05,808 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <LDAP response 
>> returned as result. Creating the final LDAP principal>
>> 2017-04-03 13:18:05,809 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Creating LDAP 
>> principal for dimitri based on uid=dimitri,ou=People,dc=example,dc=com>
>> 2017-04-03 13:18:05,810 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Retrieved 
>> principal id attribute dimitri>
>> 2017-04-03 13:18:05,810 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Found 
>> principal attribute: [yubiKeyId[cccscedtfar]]>
>> 2017-04-03 13:18:05,811 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Found 
>> principal attribute: [givenName[Dimitri]]>
>> 2017-04-03 13:18:05,812 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Found 
>> principal attribute: [businessCategory[mfa-yubikey]]>
>> 2017-04-03 13:18:05,813 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Found 
>> principal attribute: [sn[Gavrilov]]>
>> 2017-04-03 13:18:05,813 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Found 
>> principal attribute: [cn[dimitri]]>
>> 2017-04-03 13:18:05,814 DEBUG 
>> [org.apereo.cas.authentication.LdapAuthenticationHandler] - <Created LDAP 
>> principal for id dimitri and 6 attributes>
>> 2017-04-03 13:18:05,816 INFO 
>> [org.apereo.cas.authentication.PolicyBasedAuthenticationManager] - 
>> <LdapAuthenticationHandler successfully authenticated dimitri>
>> 2017-04-03 13:18:05,817 DEBUG 
>> [org.apereo.cas.authentication.PolicyBasedAuthenticationManager] - <No 
>> resolver configured for LdapAuthenticationHandler. Falling back to handler 
>> principal dimitri>
>> 2017-04-03 13:18:05,817 DEBUG 
>> [org.apereo.cas.authentication.PolicyBasedAuthenticationManager] - <Final 
>> principal resolved for this authentication event is dimitri>
>> 2017-04-03 13:18:05,818 DEBUG 
>> [org.apereo.cas.authentication.AllAuthenticationPolicy] - <Authentication 
>> policy is satisfied.>
>> 2017-04-03 13:18:05,819 INFO [org.apereo.cas.authentication.
>> PolicyBasedAuthenticationManager] - <Authenticated principal [dimitri] 
>> and attributes {businessCategory=mfa-yubikey, commonName=Dimitri, 
>> givenName=Dimitri, LdapAuthenticationHandler.dn=uid=dimitri,ou=People,dc=
>> example,dc=com, sn=Gavrilov, yubiKeyId=cccscedtfar} with credentials [
>> dimitri].>
>> 2017-04-03 13:18:05,820 DEBUG [org.apereo.cas.audit.spi.
>> ThreadLocalPrincipalResolver] - <Resolving principal at audit point [
>> execution(Authentication org.apereo.cas.authentication.
>> AbstractAuthenticationManager.authenticate(AuthenticationTransaction))]>
>> 2017-04-03 13:18:05,821 INFO [org.apereo.inspektr.audit.support.
>> Slf4jLoggingAuditTrailManager] - <Audit trail record BEGIN
>> =============================================================
>> WHO: dimitri
>> WHAT: Supplied credentials: [dimitri]
>> ACTION: AUTHENTICATION_SUCCESS
>> APPLICATION: CAS
>> WHEN: Mon Apr 03 13:18:05 CEST 2017
>> CLIENT IP ADDRESS: 192.168.168.12
>> SERVER IP ADDRESS: 192.168.168.16
>> =============================================================
>>
>>
>> >
>> 2017-04-03 13:18:05,822 DEBUG [org.apereo.cas.authentication.
>> DefaultAuthenticationTransactionManager] - <Successful authentication; 
>> Collecting authentication result [org.apereo.cas.authentication.
>> DefaultAuthentication@9f0afc06]>
>> 2017-04-03 13:18:05,824 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,825 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,825 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,826 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,827 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,827 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,828 DEBUG [org.apereo.cas.adaptors.gauth.
>> GoogleAuthenticatorMultifactorAuthenticationProvider] - <Multifactor 
>> failure mode for ^(https|imaps)://.* is defined as CLOSED>
>> 2017-04-03 13:18:05,829 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,829 DEBUG [org.apereo.cas.web.support.WebUtils] - <
>> Evaluating request to determine if warning cookie should be generated>
>> 2017-04-03 13:18:05,830 DEBUG [org.apereo.cas.adaptors.yubikey.
>> YubiKeyMultifactorAuthenticationProvider] - <Provided event id mfa-yubikey 
>> is not applicable to this provider identified by {}>
>> 2017-04-03 13:18:05,832 DEBUG [org.apereo.cas.web.support.
>> DefaultArgumentExtractor] - <Created https://
>> sso.example.com/cas/status/dashboard based on 
>> org.apereo.cas.authentication.principal.WebApplicationServiceFactory@489c4525>
>> 2017-04-03 13:18:05,832 DEBUG [org.apereo.cas.web.support.
>> DefaultArgumentExtractor] - <Extractor generated service type org.apereo.
>> cas.authentication.principal.SimpleWebApplicationServiceImpl for: https:
>> //sso.example.com/cas/status/dashboard>
>> Hibernate: select googleauth0_.id as id1_0_, googleauth0_.secretKey as 
>> secretKe2_0_, googleauth0_.username as username3_0_, 
>> googleauth0_.validationCode 
>> as validati4_0_ from GoogleAuthenticatorRegistrationRecord googleauth0_ 
>> where googleauth0_.username=?
>>
>>
>> Does anyone knows how to get the Global Principal Attribute working?
>>
>> Thanks
>> Dimitri
>>
>

-- 
- CAS gitter chatroom: https://gitter.im/apereo/cas
- CAS mailing list guidelines: https://apereo.github.io/cas/Mailing-Lists.html
- CAS documentation website: https://apereo.github.io/cas
- CAS project website: https://github.com/apereo/cas
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/6eb8ea5c-73c4-4b76-a4bd-03a915c40bf8%40apereo.org.

Reply via email to