No, I don't want to prompt the user at each auth attempt.  Once they have 
authenticated with CAS I only want the IDP to get a new ST at each auth, which 
is what is not happening.  I want the IDP to depend on CAS to determine if 
there is an active SSO session.  So, I want a new ST at each auth even though 
most often the TGT cookie will result in just a new ST generated.

The essence of what we want is one point of controlling SSO session time.  I 
don't want to manage session timeout in CAS and the IDP and various SPs, etc.  
Since CAS should be the controlling element I want everything as much as 
possible to refer to CAS as often as possible.

I think the key here - pointed out by Tom - is that the CAS client is 
maintaining a session similar to an SP.  

I've tried tuning the Tomcat session timeout for my IDP in order to reduce that 
and I'll see what the effect is.

Thanks.

Ted F. Fisher
Information Technology Services


-----Original Message-----
From: Marvin Addison [mailto:marvin.addi...@gmail.com] 
Sent: Thursday, August 07, 2014 2:37 PM
To: cas-user@lists.jasig.org
Subject: Re: [cas-user] CAS integration with Shibboleth IDP

> We have our Shibboleth IDP using CAS as the only login handler resulting in 
> CAS being the manager of the SSO session and Shibboleth being simply a 
> pasthrough for SAML.  Since the Shibboleth IDP does not maintain an SSO 
> session it should redirect to CAS for each auth request  to get a new Service 
> Ticket.

While your expectation is correct, I have the feeling you want to prompt the 
user for credentials on every federated service access request. Unfortunately 
that is not possible.

If you disable the Shib "Previous Session" authn handler [1], which is the 
meaning I take from "Shibboleth IDP does not maintain an SSO session", you will 
still incur exactly one CAS authentication. The reason is that for any 
browser-mediated SAML profile, browser cookies come into play. Here's the flow:

1. User browses to spA.example.org
2. User selects home institution and is redirected to idp.bar.edu 3. IdP 
engages CAS authentication provider, which triggers redirect to CAS, 
cas.bar.edu 4. No CASTGC cookie is present, so user is prompted to login to CAS 
5. User authenticates to CAS and is redirected to idp.bar.edu with ticket 6. 
IdP validates ticket and authn engine completes successfully 7. IdP redirects 
to spA.example.org with SAML response 8. ... time passes ...
9. User browses to spB.example.org
10. IdP engages CAS authentication provider, which triggers redirect to CAS, 
cas.bar.edu 10. CASTGC cookie is present so CAS issues ticket to IdP via 
redirect 11. Steps 6-7 as before

So while a new ST is granted for every federated service access request, only 
one login occurs, the one that initiated the CAS SSO session. Thus you will see 
exactly one CAS login for a number of federated service access requests that 
happens during the lifetime of the CAS SSO session. While the renew CAS 
protocol parameter could theoretically help you here, the SP would have to set 
that flag, which is outside of your control.

I hope that explains the behavior you are seeing.

[1] https://wiki.shibboleth.net/confluence/display/SHIB2/IdPAuthPreviousSession

M

--
You are currently subscribed to cas-user@lists.jasig.org as: tffi...@bgsu.edu 
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user


-- 
You are currently subscribed to cas-user@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to