Usual apologies if this is documented somewhere, I have exhausted the usual 
channels trying to find a solution. We have CAS as part of a web-app running 
inside of an AWS subnet along with all the services that need to speak to the 
CAS server (all using the shiro-cas realm), none of which have public facing IP 
addresses, instead there is a NAT box on the subnet which provides external 
access and load balancers which provide incoming access. 

The issue was first that the shiro-cas services try to validate the ticket 
(after the user has logged in and been redirected to the original service) 
using the public facing address, e.g. 
user logs in to 
domain.com/shiro-cas
redirects and logs in to
domain.com/cas
which redirects to
domain.com/shiro-cas
which then tries to contact 
domain.com/cas to validate the ticket.

Most of this is fine, however the last step has what is only an internal 
connection, going through a NAT box and coming back in through a loadbalancer. 
I was able to alter this so that the final validation step happens on
10.0.0.1/cas (an internal IP)
by modifying a value in the CasRealm as part of the shiro code. However this 
leaves me with the issue where, whenever the CAS server tries to speak to the 
original service e.g. to notify a removed ticket on logout, it has the service 
registered as domain.com/shiro-cas. 

So I guess my question is their some configuration (or alternative setup) 
inside CAS that I can use to have two different addresses, one public facing 
for redirecting users and one internal network for service communications? This 
is obviously not a typical case but I would rather not open up the various 
firewalls, and AWS security groups if I can avoid it.

Cheers
Mike
-- 
You are currently subscribed to cas-dev@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to