Hi,
In our organization, we have a CAS 6.5.9.3 with mfa-gauth and trusted
devices implementation with REDIS. Nowadays we have around 15.000 users
with MFA activated.
>From some time until now users are experiencing a 10 seconds delay between
login page submit and MFA code request page, if needed, or redirection to
service. This delay looks like a issue with number of users with active MFA.
After some investigation, we found the lines of code that causes the delay.
In CAS log we have the lines:
2024-07-12 12:37:03,358 TRACE
[org.apereo.cas.trusted.web.flow.MultifactorAuthenticationVerifyTrustAction]
- <Retrieving trusted authentication records for [XXXXX]>
. . .
2024-07-12 12:37:13,875 TRACE
[org.apereo.cas.trusted.web.flow.MultifactorAuthenticationVerifyTrustAction]
- <Retrieving authentication records for [XXXXX] that matches
[****************************]>
The portion of code that prints this log is located at the method doExecute
in class
*org.apereo.cas.trusted.web.flow.MultifactorAuthenticationVerifyTrustAction*
and
we think the problem is in the invocation to *this.storage.get(principal);.*
The
“storage” attribute is an
*org.apereo.cas.trusted.authentication.storage.RedisMultifactorAuthenticationTrustStorage
*instance
and we found that this class performs a *remove()* call *in each query
operation to the storage*:
@Override
public Set<? extends MultifactorAuthenticationTrustRecord> get(final
String principal) {
remove();
val keys = RedisUtils.keys(this.redisTemplate,
buildRedisKeyForRecord(principal), this.scanCount);
return getFromRedisKeys(keys);
}
The remove method performs a SCAN command over all entries with
*RedisMultifactorAuthenticationTrustStorage:** key, and for each result
invoke a GET to bring the object, deserialize it and check de expiration
date:
public void remove(final ZonedDateTime expirationDate) {
RedisUtils.keys(this.redisTemplate, getPatternRedisKey(),
this.scanCount).map((redisKey) -> {
return (List)this.redisTemplate.boundValueOps(redisKey).get();
}).filter(Objects::nonNull).flatMap(Collection::stream).filter((record)
-> {
return
DateTimeUtils.zonedDateTimeOf(record.getExpirationDate()).isBefore(expirationDate)
;
}).forEach((record) -> {
Set<String> recordKeys = (Set)RedisUtils.keys(this.redisTemplate,
buildRedisKeyForRecord(record), this.scanCount).collect(Collectors.toSet());
this.redisTemplate.delete((Collection)Objects.requireNonNull(recordKeys));
});
}
In newer versions of the code, the remove invocation still exists. Why is
the query method of this RedisMultifactorAuthenticationTrustStorage
implemented in this way? After all, there exist a cleaning mechanism.
We thinks this delay is unacceptable and we are thinking in overwrite the
class to eliminate the remove invocation and filter the results to avoid
expirated results.
Is there a better solution to our problem? Have we overlooked something?
Regards,
Jose Luis
--
You received this message because you are subscribed to the Google Groups "CAS
Developer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/apereo.org/d/msgid/cas-dev/453a0c91-6e15-422f-a3cb-07ea2273ce51n%40apereo.org.