I am attempting to integrate a SAML federation into our CAS instance.  I seem 
to be stuck on service entry defeind access.

It seems that to allow SAML federation I have to configure a wildcard for 
entityId/serviceId.  I was assuming that saml service entries would require 
both a positive metadata match and entityId match.  Seems that by entering the 
SAML service entry the wildcard match also applies to CAS services.

example SAML service entry
{
  "@class" : "org.apereo.cas.support.saml.services.SamlRegisteredService",
  "serviceId" : "^https://.*$";,
  "name" : "Federation Test",
  "id" : 10000003,
  "evaluationOrder" : 10,
  "metadataLocation" : "https://url/to/metadata.xml";
}

After entering the above service entry, any request to 
"/cas/login?service=anything" will match.  Makes sense if only serviceId is 
used for the match.  But I figured, incorrectly, that metadata was also 
involved.

Am I missing something, or do I have to iteratively add every possible entity 
id into the regex for serviceId.  That seems unmaintainable at scale.

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/02c947e0c88f4d02b50f4998b4b96fd0%40mun.ca.

Reply via email to