Good afternoon all:

We are having difficulty getting CAS to proxy successfully.

Details for the CAS server and the client application:

CAS server:
Red Hat Enterprise Linux Server 6.8 (Santiago)
JRE 1.8.0_25
Tomcat 7.0.56
CAS 3.5.2.1

CAS client application server:
Red Hat Enterprise Linux Server 7.2 (Maipo)
Apache HTTPD 2.4
Application coded in PHP

User clicks to login to the application, is redirected to the CAS login page, 
submits user ID + password.
Authentication succeeds.

The CAS audit log shows:
AUTHENTICATION_SUCCESS
TICKET_GRANTING_TICKET_CREATED
SERVICE_TICKET_CREATED

We then get AUTHENTICATION_FAILED on the proxy callbackUrl:
error.authentication.credentials.bad
PROXY_GRANTING_TICKET_NOT_CREATED

The cas.log shows a couple Java exception traces at the point of failure.

Not certain if the first one is associated with the problem because there is no 
information in the exception trace that ties it to this particular client, 
other than the timestamp:
2016-09-26 13:39:36,518 ERROR [org.jasig.cas.util.HttpClient] - connection 
refused
Java.net.ConnectException: Connection refused
              At java.net.PlainSocketImpl.socketConnect(Native method)

However: an openssl s_client connection from the CAS server to the application 
server on port 443 succeeds and displays the contents of the certificate.

The second exception trace is associated with the client application:
2016-09-26 13:39:36,519 ERROR [org.jasig.cas.web.ServiceValidateController] - 
TicketException generating ticket for: [callbackUrl: https:/XXXXX]
Org.jasig.cas.ticket.TicketCreationException: 
error.authentication.credentials.bad
              At 
org.jasig.cas.CentralAuthenticationServiceImpl.delegateTicketGrantingTicket_aroundBody6(CentralAuthenticationServiceImpl.java:325)

>From what we can see CAS wants to validate the application and server 
>requesting the proxy ticket before it will proceed.  It is not getting the 
>expected response, but we don't know what is causing the failure.

The SSL certificate on the application server is valid and contains the 
hostname of that server.

Because both servers are hosted locally the intermediate and CA certificate 
bundle on both the CAS server and application server are identical, and the CA 
bundle is available to CAS.

As noted above, we can connect on port 443 from the CAS server to the 
application server and view its SSL certificate.

What are we missing?

Other than validating the SSL certificate on the application server, exactly 
what other criteria must be satisfied when CAS validates the proxy callbackUrl?

Thanks in advance for any help.

David






-- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/a/apereo.org/group/cas-user/.
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/BN6PR05MB302791EED56653220DE3CDA1C7CD0%40BN6PR05MB3027.namprd05.prod.outlook.com.
For more options, visit https://groups.google.com/a/apereo.org/d/optout.

Reply via email to