Overview
The integration between the CAS Server and ADFS delegates user authentication from CAS Server to ADFS, making CAS Server a WS-Federation client. Claims released from ADFS are made available as attributes to CAS Server, and by extension CAS Clients.
Support is enabled by including the following dependency in the WAR overlay:
1
2
3
4
5
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-server-support-wsfederation-webflow</artifactId>
<version>${cas.version}</version>
</dependency>
You may also need to declare the following Maven repository in your CAS Overlay to be able to resolve dependencies:
1
2
3
4
5
6
7
8
<repositories>
...
<repository>
<id>shibboleth-releases</id>
<url>https://build.shibboleth.net/nexus/content/repositories/releases</url>
</repository>
...
</repositories>
It's safe to make sure you have the proper JCE bundle installed in your Java environment that is used by CAS, specially if you need to consume encrypted payloads issued by ADFS. Be sure to pick the right version of the JCE for your Java version. Java versions can be detected via the java -version
command.
WsFed Configuration
Adjust and provide settings for the ADFS instance, and make sure you have obtained the ADFS signing certificate and made it available to CAS at a location that can be resolved at runtime.
To see the relevant list of CAS properties, please review this guide.
Encrypted Assertions
CAS is able to automatically decrypt SAML assertions that are issued by ADFS. To do this, you will first need to generate a private/public keypair:
1
2
3
4
5
6
7
openssl genrsa -out private.key 1024
openssl rsa -pubout -in private.key -out public.key -inform PEM -outform DER
openssl pkcs8 -topk8 -inform PER -outform DER -nocrypt -in private.key -out private.p8
openssl req -new -x509 -key private.key -out x509.pem -days 365
# convert the X509 certificate to DER format
openssl x509 -outform der -in x509.pem -out certificate.crt
Configure CAS to reference the keypair, and configure the relying party trust settings
in ADFS to use the certificate.crt
file for encryption.
Modifying ADFS Claims
The WsFed configuration optionally may allow you to manipulate claims coming from ADFS but
before they are inserted into the CAS user principal. For this to happen, you need
to put together an implementation of WsFederationAttributeMutator
that changes and manipulates ADFS claims:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
package org.apereo.cas.support.wsfederation;
@Configuration("myWsFedConfiguration")
@EnableConfigurationProperties(CasConfigurationProperties.class)
public class MyWsFedConfiguration {
@Bean
public WsFederationAttributeMutator wsfedAttributeMutator() {
return new WsFederationAttributeMutatorImpl(...);
}
}
public class WsFederationAttributeMutatorImpl implements WsFederationAttributeMutator {
public void modifyAttributes(...) {
...
}
}
Finally, ensure that the attributes sent from ADFS are available and mapped in
your attributeRepository
configuration.
Handling CAS Logout
An optional step, the casLogoutView.html
can be modified to place a link to ADFS’s logout page.
1
<a href="https://adfs.example.org/adfs/ls/?wa=wsignout1.0">Logout</a>
Per-Service Relying Party Id
In order to specify a relying party identifier per service definition, adjust your service registry to match the following:
1
2
3
4
5
6
7
8
9
10
11
12
13
{
"@class" : "org.apereo.cas.services.RegexRegisteredService",
"serviceId" : "^https://.+",
"name" : "sample service",
"id" : 100,
"properties" : {
"@class" : "java.util.HashMap",
"wsfed.relyingPartyIdentifier" : {
"@class" : "org.apereo.cas.services.DefaultRegisteredServiceProperty",
"values" : [ "java.util.HashSet", [ "custom-identifier" ] ]
}
}
}
Troubleshooting
Be aware of clock drift issues between CAS and the ADFS server. Validation failures of the response do show up in the logs, and the request is routed back to ADFS again, causing redirect loops.