It means that wherever you are configuring the serviceValidate url, you are missing part of the URL. 

It seems you have specified /cas/serviceValidate when you should be specifying something like https://localhost:8443/cas/serviceValidate (that's just an example).

-Scott

On 9/4/06, m_chalandar < [EMAIL PROTECTED]> wrote:


Hi

I have implementing CAS for My project ( theses ), therefore when i insert
URL of my web_application  in web_browser, CAS login page is presented and
user_acount is requested, I insert this information, but this error inform
me. bellow :

*******************************************************************************

type Exception report

message

description The server encountered an internal error () that prevented it
from fulfilling this request.

exception

javax.servlet.ServletException: no protocol:
/cas/serviceValidate?service=https%3A%2F%2Flocalhost%3A8443%2Fsample%2F&ticket=ST-3-WI3TtE2qbRdcDWbKxEML5w0MqcAVJdS3pOE-20

edu.yale.its.tp.cas.client.filter.CASFilter.getAuthenticatedUser(CASFilter.java:254)
        edu.yale.its.tp.cas.client.filter.CASFilter.doFilter(CASFilter.java:184)


root cause

java.net.MalformedURLException: no protocol:
/cas/serviceValidate?service=https%3A%2F%2Flocalhost%3A8443%2Fsample%2F&ticket=ST-3-WI3TtE2qbRdcDWbKxEML5w0MqcAVJdS3pOE-20
        java.net.URL.<init>(URL.java:567)
        java.net.URL.<init>(URL.java:464)
        java.net.URL.<init>(URL.java:413)
        edu.yale.its.tp.cas.util.SecureURL.retrieve(SecureURL.java :65)

edu.yale.its.tp.cas.client.ServiceTicketValidator.validate(ServiceTicketValidator.java:212)

edu.yale.its.tp.cas.client.filter.CASFilter.getAuthenticatedUser(CASFilter.java:219)
        edu.yale.its.tp.cas.client.filter.CASFilter.doFilter (CASFilter.java:184)


note The full stack trace of the root cause is available in the Apache
Tomcat/5.5.17 logs.

****************************************************************************


I am working with Tomcat 5.5.17 & Jdk1.5.0_04 for this case.
because CAS work with ssl then I have trying to configure tomcat for ssl.
I done tihs work and excecute this instruction as bellow:

1)%java_home%\bin\keytool -genkey -alias tomcat -keyalg RSA
2)%java_home%\bin\keytool -export -alias tomcat -file server.crt
3)%java_home%\bin\keytool -import -file server.crt -keystore
%java_home%/jre/lib/security/cacerts

instruction 1and 2 execute succefully but ins. 3 not correct and bellow
message is presented :


*******************************************************************************************

C:\Program Files\Java\jdk1.5.0_04\bin>keytool -import -file server.crt
-keystore  c:\Program Files\Java\jdk1.5.0_04\j
re\lib\security\cacerts
keytool usage:

-certreq     [-v] [-protected]
             [-alias <alias>] [-sigalg <sigalg>]
             [-file <csr_file>] [-keypass <keypass>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-delete      [-v] [-protected] -alias <alias>
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-export      [-v] [-rfc] [-protected]
             [-alias <alias>] [-file <cert_file>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-genkey      [-v] [-protected]
             [-alias <alias>]
             [-keyalg <keyalg>] [-keysize <keysize>]
             [-sigalg <sigalg>] [-dname <dname>]
             [-validity <valDays>] [-keypass <keypass>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-help

-identitydb  [-v] [-protected]
             [-file <idb_file>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-import      [-v] [-noprompt] [-trustcacerts] [-protected]
             [-alias <alias>]
             [-file <cert_file>] [-keypass <keypass>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-keyclone    [-v] [-protected]
             [-alias <alias>] -dest <dest_alias>
             [-keypass <keypass>] [-new <new_keypass>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-keypasswd   [-v] [-alias <alias>]
             [-keypass <old_keypass>] [-new <new_keypass>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-list        [-v | -rfc] [-protected]
             [-alias <alias>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-printcert   [-v] [-file <cert_file>]

-selfcert    [-v] [-protected]
             [-alias <alias>]
             [-dname <dname>] [-validity <valDays>]
             [-keypass <keypass>] [-sigalg <sigalg>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...

-storepasswd [-v] [-new <new_storepass>]
             [-keystore <keystore>] [-storepass <storepass>]
             [-storetype <storetype>] [-providerName <name>]
             [-providerClass <provider_class_name> [-providerArg <arg>]] ...


*****************************************************************

I execute ins. 3 with other format :

keytool -import -trustcacerts -alias tomcat -file server.crt -keystore
$JAVA_HOME\jre\lib\security\cacerts


and error message is shown by executing :

*****************************************************************

Enter keystore password:  changeit
Owner: CN=localhost, OU=mfa, O=mfa, L=tehran, ST=tehran, C=98
Issuer: CN=localhost, OU=mfa, O=mfa, L=tehran, ST=tehran, C=98
Serial number: 44fa6dfd
Valid from: Sun Sep 03 10:24:05 IRDT 2006 until: Mon Sep 03 10:24:05 IRDT
2007
Certificate fingerprints:
         MD5:  20:17:E8:18:2D:01:4A:89:18:5D:73:3C:48:A3:0F:4A
         SHA1: B8:B0:AF:58:95:90:42:BB:F5:69:79:B6:DE:B1:A3:9B:44:45:87:68
Trust this certificate? [no]:  y
Certificate was added to keystore
keytool error: java.io.FileNotFoundException:
$JAVA_HOME\jre\lib\security\cacert
s (The system cannot find the path specified)

**************************************************************

while path for java is configured  :
  C:\Program Files\Java\jdk1.5.0_04\bin>set JAVA_HOME
JAVA_HOME=C:\Program Files\Java\jdk1.5.0_04

*************************************************************

I send you all works in my project.

please help me, because my these valid date is "October".

thanks alot.

--
View this message in context: http://www.nabble.com/CASifyinf-my-application-tf2213890.html#a6131818
Sent from the CAS Dev forum at Nabble.com.

_______________________________________________
cas-dev mailing list
[email protected]
http://tp.its.yale.edu/mailman/listinfo/cas-dev

_______________________________________________
cas-dev mailing list
[email protected]
http://tp.its.yale.edu/mailman/listinfo/cas-dev

Reply via email to