SAML2 Authentication
CAS can act as a SAML2 identity provider accepting authentication requests and producing SAML assertions.
SAML Endpoints
The following CAS endpoints respond to supported SAML2 profiles:
/cas/idp/profile/SAML2/Redirect/SSO
/cas/idp/profile/SAML2/POST/SSO
/cas/idp/profile/SAML2/POST/SLO
/cas/idp/profile/SAML2/Unsolicited/SSO
SAML2 IdP Unsolicited/Initiated
SSO profile supports the following parameters:
Parameter | Description |
---|---|
providerId |
Required. Entity ID of the service provider. |
shire |
Optional. Response location (ACS URL) of the service provider. |
target |
Optional. Relay state. |
time |
Optional. Skew the authentication request. |
IdP Metadata
The following CAS endpoints handle the generation of SAML2 metadata:
/cas/idp/metadata
This endpoint will display the CAS IdP SAML2 metadata upon receiving a GET request. If metadata is already available and generated, it will be displayed. If metadata is absent, one will be generated automatically. CAS configuration below dictates where metadata files/keys will be generated and stored.
Due to the way CAS handles the generation of metadata via external libraries, the generated metadata MUST be reviewed and massaged slightly to match the CAS configuration. All other elements MUST be removed.
Here is a generated metadata file as an example:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
<?xml version="1.0" encoding="UTF-8"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
xmlns:shibmd="urn:mace:shibboleth:metadata:1.0" xmlns:xml="http://www.w3.org/XML/1998/namespace"
xmlns:mdui="urn:oasis:names:tc:SAML:metadata:ui" entityID="ENTITY_ID">
<IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
<Extensions>
<shibmd:Scope regexp="false">SCOPE</shibmd:Scope>
</Extensions>
<KeyDescriptor use="signing">
<ds:KeyInfo>
<ds:X509Data>
<ds:X509Certificate>...</ds:X509Certificate>
</ds:X509Data>
</ds:KeyInfo>
</KeyDescriptor>
<KeyDescriptor use="encryption">
<ds:KeyInfo>
<ds:X509Data>
<ds:X509Certificate>...</ds:X509Certificate>
</ds:X509Data>
</ds:KeyInfo>
</KeyDescriptor>
<NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</NameIDFormat>
<NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>
<SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://HOST_NAME/cas/idp/profile/SAML2/POST/SLO"/>
<SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://HOST_NAME/cas/idp/profile/SAML2/POST/SSO"/>
<SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
Location="https://HOST_NAME/cas/idp/profile/SAML2/Redirect/SSO"/>
</IDPSSODescriptor>
</EntityDescriptor>
Server Configuration
If you have deployed CAS in an external application server/servlet container
(i.e. Apache Tomcat) you will need to make sure
that the server is adjusted to handle large-enough HttpHeaderSize
and HttpPostSize
values (i.e. 2097152).
The embedded container that ships with CAS handles this automatically.
Note that CAS metadata endpoints for various bindings are typically available under /cas/idp/...
. If you
mean you use an existing metadata file whose binding endpoints begin with /idp/...
, you may need to deploy
CAS at the root context path so it’s able to respond to those requests. (i.e. https://sso.example.org/cas/login
becomes
https://sso.example.org/login
).
SP Metadata
/cas/idp/servicemetadatagen
This endpoint will attempt to generate metadata for relying party upon receiving a POST request. This is useful when integrating with service providers that do not publish a defined metadata. The following parameters are expected by this point:
Parameter | Description |
---|---|
entityId |
Required. |
authnRequestSigned |
Optional. Defaults to false . |
wantAssertionsSigned |
Optional. Defaults to false . |
x509Certificate |
Required. |
acsUrl |
Required. |
Configuration
Support is enabled by including the following dependency in the WAR overlay:
1
2
3
4
5
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-server-support-saml-idp</artifactId>
<version>${cas.version}</version>
</dependency>
You may also need to declare the following Maven repository in your CAS Overlay to be able to resolve dependencies:
1
2
3
4
5
6
7
8
<repositories>
...
<repository>
<id>shibboleth-releases</id>
<url>https://build.shibboleth.net/nexus/content/repositories/releases</url>
</repository>
...
</repositories>
To see the relevant list of CAS properties, please review this guide.
SAML Services
SAML relying parties and services must be registered within the CAS service registry similar to the following example:
1
2
3
4
5
6
7
8
{
"@class" : "org.apereo.cas.support.saml.services.SamlRegisteredService",
"serviceId" : "the-entity-id-of-the-sp",
"name" : "SAMLService",
"id" : 10000003,
"evaluationOrder" : 10,
"metadataLocation" : "http://www.testshib.org/metadata/testshib-providers.xml"
}
If metadata
contains data for more than one relying party, (i.e. InCommon) those relying parties need to be defined by their entity id, explicitly via
the serviceId
field.
The following fields are available for SAML services:
Field | Description |
---|---|
metadataLocation |
Location of service metadata defined from system files, classpath or URL resources. |
metadataSignatureLocation |
Location of the metadata public key to validate the metadata which must be defined from system files or classpath. If defined, will enforce the SignatureValidationFilter validation filter on metadata. |
metadataMaxValidity |
If defined, will enforce the RequiredValidUntilFilter validation filter on metadata. |
signAssertions |
Whether assertions should be signed. Default is false . |
signResponses |
Whether responses should be signed. Default is true . |
encryptAssertions |
Whether assertions should be encrypted. Default is false . |
requiredAuthenticationContextClass |
If defined, will specify the SAML authentication context class in the final response. If undefined, the authentication class will either be urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified or urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport depending on the SAML authentication request. |
requiredNameIdFormat |
If defined, will force the indicated Name ID format in the final SAML response. |
metadataCriteriaPattern |
If defined, will force an entity id filter on the metadata aggregate based on the PredicateFilter to include/exclude specific entity ids based on a valid regex pattern. |
metadataCriteriaDirection |
If defined, will force an entity id filter on the metadata aggregate based on PredicateFilter . Allowed values are INCLUDE ,EXCLUDE . |
metadataCriteriaRoles |
If defined, will whitelist the defined metadata roles (i.e. SPSSODescriptor , IDPSSODescriptor ). Default is SPSSODescriptor . |
metadataCriteriaRemoveEmptyEntitiesDescriptors |
Controls whether to keep entities descriptors that contain no entity descriptors. Default is true . |
metadataCriteriaRemoveRolelessEntityDescriptors |
Controls whether to keep entity descriptors that contain no roles. Default is true . |
Name ID Selection
Each service may specify a required Name ID format. If left undefined, the metadata will be consulted to find the right format. The Name ID value is always simply the authenticated user that is designed to be returned to this service. In other words, if you decide to configure CAS to return a particular attribute as the authenticated user name for this service, that value will then be used to construct the Name ID along with the right format.
Dynamic Metadata
CAS also supports the Dynamic Metadata Query Protocol which is a REST-like API for requesting and receiving arbitrary metadata. In order to configure a CAS SAML service to retrieve its metadata from a Metadata query server, the metadata location must be configured to point to the query server instance. Here is an example:
1
2
3
4
5
6
7
8
{
"@class" : "org.apereo.cas.support.saml.services.SamlRegisteredService",
"serviceId" : "the-entity-id-of-the-sp",
"name" : "SAMLService",
"id" : 10000003,
"evaluationOrder" : 10,
"metadataLocation" : "http://mdq.server.org/entities/{0}"
}
…where {0}
serves as an entityID placeholder for which metadata is to be queried.
SP Integrations
A number of SAML2 service provider integrations are provided natively by CAS. To learn more, please review this guide.