Hello Ganesh,
     I'm trying to integrate CAS with SAML using 
pac4j(CAS-server-support-pac4j-web flow) support project from CAS by 
following below document :
https://apereo.github.io/cas/5.1.x/integration/Delegate-Authentication.html
 I am using SSO(ACS) URL as https://witty.wavity.net/saml/login to consume 
SAML assertion. Now, when the user gets logged in at IDP i,e at okta it was 
redirecting to ACS URL with the forbidden error. So how can I configure CAS 
to consume SAML assertion from IDP and assert CAS to grant TGT to the SAML 
asserted user?

Can you please help me out with the steps I need to follow at CAS once it 
receives SAML assertion from any of the IDP.

On Tuesday, August 28, 2018 at 9:16:02 PM UTC+5:30, Ganesh Prasad wrote:
>
> I should add that this IdP configuration was being added for the first 
> time on this server.
>
> We have Dev, Test and Prod environments. The Dev version of the client's 
> IdP was working a couple of weeks ago, so I added the corresponding IdP 
> config in the Test environment today, after adding the certificate file to 
> the Test CAS server's /etc/ssl/certs directory and configuring the 
> cas.properties file to point to the Test IdP's metadata URL. Exactly the 
> same thing I had done a couple of weeks ago in Dev.
>
> Today in Test, it appears the login URL being sent back in the IdP 
> metadata XML (the Location attribute of the md:SingleSignOnService tag) was 
> unreachable, so CAS was unable to create the local SP metadata XML file, 
> and all other problems then resulted from that. The list of services was 
> not being loaded from the JSON file, and the error message shown to users 
> was 'Application not authorised to use CAS'.
>
> The problems went away as soon as I commented out all of the offending 
> IdP's parameters in cas.properties. That was the only way I could isolate 
> it.
>
> Ganesh
>
> On Wednesday, 29 August 2018 01:25:50 UTC+10, Ganesh Prasad wrote:
>>
>> My application has a number of client organisations that want their users 
>> to use their Active Directory through a SAML2 Identity Provider (IdP).
>>
>> No problem, CAS supports this by being able to define multiple sets of 
>> properties using cas.authn.pac4j.saml[0], cas.authn.pac4j.saml[1], 
>> cas.authn.pac4j.saml[2], etc.
>>
>> Yesterday, I got a nasty surprise when one of those external IdPs went 
>> down. This affected my application, because other users started getting 
>> errors when trying to log in.
>>
>> 2018-08-29 01:13:26,917 ERROR 
>> [net.shibboleth.utilities.java.support.xml.BasicParserPool] - <XML Parsing 
>> Error>
>> org.xml.sax.SAXParseException: The element type "br" must be terminated 
>> by the matching end-tag "</br>".
>>         at 
>> com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.createSAXParseException(ErrorHandlerWrapper.java:203)
>>  
>> ~[?:1.8.0_171]
>>
>> I had to edit cas.properties, comment out all the config options for the 
>> misbehaving IdP and restart CAS. That was the only way to isolate the 
>> problem and let the functioning parts of the system continue working.
>>
>> But this shouldn't have been necessary. Shouldn't CAS be able to isolate 
>> a misbehaving IdP and merely suppress the display of its link on the login 
>> page?
>>
>> Ganesh
>>
>>

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/c4861e59-e652-4fc5-bb86-8c0031923e8d%40apereo.org.

Reply via email to