Hi,
my current version of CAS is 6.6.0.
I'm using JWT with CAS and I set these configs:
cas.authn.token.crypto.enabled=true
cas.authn.token.crypto.encryptionEnabled=true
cas.authn.token.crypto.signingEnabled=true
cas.authn.token.crypto.alg=A256CBC-HS512
cas.authn.token.crypto.signing.key=***
cas.
Hi all,
We are running into an issue with a new SP, and despite turning on DEBUG
for both org.apereo.cas.services.AbstractServicesManager and
org.apereo.cas.support.saml.web.idp we can't find any hints for why this is
showing up in the logs:
2022-10-06 09:57:15,798 WARN
[org.apereo.cas.support.sa
Mike,
That smells like a bug to me. SAML allows for any valid URI, which that
clearly is, and I've seen much worse registered and used successfully with
SAMLtest.
docs.oasis-open.org/security/saml/v2.0/saml-schema-metadata-2.0.xsd
So, I think your theory is correct.
Take care,
Nate
On Thu, Oc
Hi,
With 6.6.0, we've been using the memcached Ticket Registry support
previously, but now we want to take advantage of the Account Profile pages
we can't get Session information (as getTickets() is not supported), so I
thought I would switch to JPA (since we have a suitable DB). Logins
witho
OK - update!
A co-worker much smarter than me did the research into the code, and found
that the SAML service ID was being processed through a regex.
{
"@class": "org.apereo.cas.support.saml.services.SamlRegisteredService",
"serviceId": "*REDACTED*/metadata*\\*?Z3JvdXBJZD0yNTMxNQ==",
We've g
Hi all,
I am working on CAS server upgrade from 6.3.7.4 to 6.5.8 version.
My clustered environment is working with 3 nodes without any issue.
But, for lower environment with single node, its not working. I am getting
error on server startup.
Can someone please help?
Do we have a way to disable