Hi all, I am reading on the importance of preventing replay attack https://www.idm-360.com/idm360/the-dangers-of-saml-replay-attacks/, which is a requirement from our client.
I was wondering if CAS natively already prevent such attack for SAML 2.0 protocol acting both as *sp *or as *idp*. Using the CAS 6.2.x. Would like to see if any one have any insights, if not we would go ahead and do some testing on this. Thanks! Cheers! - Andy -- - Website: https://apereo.github.io/cas - Gitter Chatroom: https://gitter.im/apereo/cas - List Guidelines: https://goo.gl/1VRrw7 - Contributions: https://goo.gl/mh7qDG --- You received this message because you are subscribed to the Google Groups "CAS Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-user/96f0f3c3-aebb-4c6c-a142-ece68b6886fdn%40apereo.org.
