Hi Lynn
Am trying a similar configuration using CAS-5.2.6 against Azure AD (SAML 
mode). Is there a sample file that I can use for => 
cas.authn.pac4j.saml[0].identityProviderMetadataPath
How to generate this file to make it work against Azure AD ?


On Wednesday, August 8, 2018 at 1:29:00 AM UTC+5:30, lynndickison wrote:
>
> That’s a good idea, but *cas.authn.pac4j.saml[0].useNameQualifier=false* 
> isn’t a valid configuration option in CAS 5.3.2.  When I put that into the 
> cas.properties file, CAS doesn’t start.
>
>  
>
> Lynn Dickison
>
>  
>
> *From:* [email protected] <javascript:> <[email protected] <javascript:>> 
> *On Behalf Of *Dmitriy Kopylenko
> *Sent:* Tuesday, August 7, 2018 10:53 AM
> *To:* [email protected] <javascript:>
> *Subject:* Re: [cas-user] RE: CAS 5 SAML2 Azure AD delegated 
> authentication
>
>  
>
> You could try *cas.authn.pac4j.saml[0].useNameQualifier=false*
>
>  
>
> Best,
>
> D.
>
>  
>
>
> From: Dickison, Lynn E <[email protected]> <javascript:>
> Reply: [email protected] <javascript:> <[email protected]> <javascript:>
> Date: August 7, 2018 at 9:53:30 AM
> To: [email protected] <javascript:> <[email protected]> <javascript:>
> Subject:  [cas-user] RE: CAS 5 SAML2 Azure AD delegated authentication 
>
>
>
> I saw on another posting that someone else was trying to do delegated 
> authentication using ADFS.  They were able to get it to work using CAS 5.2, 
> but it didn’t work with CAS 5.3.  Since ADFS and Azure AD are both 
> Microsoft products, I decided to try out delegated authentication to Azure 
> AD using CAS 5.2.  Lo and behold, IT WORKED!  CAS 5.2 produces a SAML 
> authentication request that Azure AD considers valid.  Here is the 
> comparison of the two:
>
>  
>
> This one is from CAS 5.3.2, which DOES NOT work Azure AD SAML 
> authentication:
>
>  
>
> <?xml version="1.0" encoding="UTF-8"?>
>
> <saml2p:AuthnRequest 
>
>         AssertionConsumerServiceURL="
> https://xxxxxxxx.yyyyyyyyyyyyy.edu:8443/cas/login?client_name=SAML2Client0"; 
>
>
>         AttributeConsumingServiceIndex="0" 
>
>         Destination="
> https://login.microsoftonline.com/cad830e4-554f-4361-bae5-c865233fb77f/saml2"; 
>
>
>         ForceAuthn="false" 
>
>  ID="_2nqagio59j7csvzqzu0mynfr4tsbfqzhnlleupl" 
>
>         IsPassive="false" 
>
>         IssueInstant="2018-08-02T21:50:33.174Z" 
>
>         ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" 
>
>         ProviderName="pac4j-saml" 
>
>         Version="2.0" 
>
>         xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
>
>     <saml2:Issuer 
>
>             Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" 
>
>             NameQualifier="https://xxxxxxxx.yyyyyyyyyyyyy.edu"; 
>
>             xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
>
>         https://xxxxxxxx.yyyyyyyyyyyyy.edu
>
>     </saml2:Issuer>
>
> </saml2p:AuthnRequest
>
>  
>
> This one is from CAS 5.2.6, and DOES work with Azure AD SAML 
> authentication:
>
>  
>
> <?xml version="1.0" encoding="UTF-8"?>
>
> <saml2p:AuthnRequest 
>
>         AssertionConsumerServiceURL="
> https://xxxxxxxx.yyyyyyyyyyyyy.edu:8443/cas/login?client_name=SAML2Client"; 
>
>
>         AttributeConsumingServiceIndex="0" 
>
>         Destination="
> https://login.microsoftonline.com/cad830e4-554f-4361-bae5-c865233fb77f/saml2"; 
>
>
>         ForceAuthn="false" 
>
>         ID="_3r88plxbege1ozzotobvkeqihy3x2jrk4sok94r" 
>
>         IsPassive="false" 
>
>         IssueInstant="2018-08-06T21:19:34.731Z" 
>
>         ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" 
>
>         ProviderName="pac4j-saml" 
>
>         Version="2.0" 
>
>         xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
>
>     <saml2:Issuer 
>
>             xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
>
>         https:// xxxxxxxx.yyyyyyyyyyyyy.edu
>
>     </saml2:Issuer>
>
> </saml2p:AuthnRequest>
>
>  
>
> The highlighted lines are the only ones I noticed that were different in 
> the format of the CAS 5.3.2 vs. CAS 5.2.6 SAML authentication requests.
>
>  
>
> Can anyone tell me if there is a configuration setting that I can change 
> in CAS 5.2.3 that will make this work successfully?
>
>  
>
> Lynn Dickison
>
> Missouri State University
>
>  
>
>  
>
>  
>
> *From:* [email protected] <javascript:> <[email protected] <javascript:>> 
> *On Behalf Of *Dickison, Lynn E
> *Sent:* Thursday, August 2, 2018 5:07 PM
> *To:* [email protected] <javascript:>
> *Subject:* [cas-user] CAS 5 SAML2 delegated authentication
>
>  
>
> I’m trying to set up CAS 5.3.2 so that it delegates authentication to 
> Azure AD via SAML2.  I’ve seen documentation on how to delegate 
> authentication to an external SAML2 IdP, and I’ve read the tutorial (
> https://apereo.github.io/2017/03/22/cas51-delauthn-tutorial/).  The 
> tutorial showed how to set it up with Okta as the IdP, and I’m assuming 
> that works.  However, Azure AD gives me an error message that the 
> authentication request is not a valid SAML2 protocol message.
>
>  
>
> Here is the configuration I have in the cas.properties file:
>
>  
>
> cas.authn.pac4j.saml[0].keystorePassword=******
>
> cas.authn.pac4j.saml[0].privateKeyPassword=******
>
> cas.authn.pac4j.saml[0].keystorePath=file:/etc/cas/saml/samlKeystore.jks
>
> cas.authn.pac4j.saml[0].keystoreAlias=********
>
>  
>
> cas.authn.pac4j.saml[0].serviceProviderEntityId=
> https://xxxxxxxx.yyyyyyyyyyyyy.edu
>
>
> cas.authn.pac4j.saml[0].serviceProviderMetadataPath=file:/etc/cas/saml/xxxxxxxx.xml
>
>  
>
> # Path/URL to delegated IdP metadata
>
>
> cas.authn.pac4j.saml[0].identityProviderMetadataPath=file:/etc/cas/saml/AzureADCAS.xml
>
>  
>
>  
>
> Here is an example authentication request that Microsoft says is valid in 
> their documentation:
>
>  
>
> <samlp:AuthnRequest
>
>         xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
>
>         ID="id6c1c178c166d486687be4aaf5e482730"
>
>         Version="2.0" IssueInstant="2013-03-18T03:28:54.1839884Z"
>
>         xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
>
>     <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">
> https://www.contoso.com</Issuer>
>
> </samlp:AuthnRequest>
>
>  
>
>  
>
> Here is an authentication request generated by CAS via pac4j:
>
>  
>
> <?xml version="1.0" encoding="UTF-8"?>
>
> <saml2p:AuthnRequest 
>
>         AssertionConsumerServiceURL="
> https://xxxxxxxx.yyyyyyyyyyyyy.edu:8443/cas/login?client_name=SAML2Client0"; 
>
>
>         AttributeConsumingServiceIndex="0" 
>
>         Destination="
> https://login.microsoftonline.com/cad830e4-554f-4361-bae5-c865233fb77f/saml2"; 
>
>
>         ForceAuthn="false" ID="_2nqagio59j7csvzqzu0mynfr4tsbfqzhnlleupl" 
>
>         IsPassive="false" 
>
>         IssueInstant="2018-08-02T21:50:33.174Z" 
>
>         ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" 
>
>         ProviderName="pac4j-saml" 
>
>         Version="2.0" 
>
>         xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
>
>     <saml2:Issuer 
>
>             Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" 
>
>             NameQualifier="https://xxxxxxxx.yyyyyyyyyyyyy.edu"; 
>
>             xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
>
>         https://xxxxxxxx.yyyyyyyyyyyyy.edu
>
>     </saml2:Issuer>
>
> </saml2p:AuthnRequest>
>
>  
>
> Here is the error message I’m getting from Azure:
>
>  
>
> Request Id: 75ca32eb-47cb-426a-992d-ee70fc6a1b00
>
> Correlation Id: 996cb2e6-b6b3-4077-abaa-a76e2578255a
>
> Timestamp: 2018-08-02T21:50:33Z
>
> Message: AADSTS75005: The request is not a valid Saml2 protocol message.
>
> Advanced diagnostics: Enable
>
> If you plan on getting support for an issue, turn this on and try to 
> reproduce the error. This will collect additional information that will 
> help troubleshoot the issue.
>
>  
>
> *Root cause:* Azure AD doesn’t support the SAML request sent by the 
> application for Single sign-on. Some common issues are:​​
>
> ·         Missing required fields in the SAML request​​
>
> ·         SAML request encoded method​
>
>  
>
>  
>
> If anyone has been able to get SAML2 delegated authentication working with 
> Azure AD as the IdP, or if you know why it won’t work, I would appreciate 
> any information you can supply.
>
>  
>
>  
>
> *Lynn Dickison* 
> Senior Enterprise Systems Administrator
> Computer Services
>
> Missouri State University 
> 901 S. National Ave. 
> Springfield, MO 65897 
> Phone: 417-836-4515 | Fax: 417-836-3192 
> [email protected] <javascript:> | www.missouristate.edu
>
> [image: Missouri State University: Make Your Missouri Statement] 
> <http://www.missouristate.edu/>
>
>  
>
> -- 
> - Website: https://apereo.github.io/cas
> - Gitter Chatroom: https://gitter.im/apereo/cas
> - List Guidelines: https://goo.gl/1VRrw7
> - Contributions: https://goo.gl/mh7qDG
> --- 
> You received this message because you are subscribed to the Google Groups 
> "CAS Community" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected] <javascript:>.
> To view this discussion on the web visit 
> https://groups.google.com/a/apereo.org/d/msgid/cas-user/SN6PR01MB4191ED2D9B0F83BCA08E9682D92C0%40SN6PR01MB4191.prod.exchangelabs.com
>  
> <https://groups.google.com/a/apereo.org/d/msgid/cas-user/SN6PR01MB4191ED2D9B0F83BCA08E9682D92C0%40SN6PR01MB4191.prod.exchangelabs.com?utm_medium=email&utm_source=footer>
> .
>
> -- 
> - Website: https://apereo.github.io/cas
> - Gitter Chatroom: https://gitter.im/apereo/cas
> - List Guidelines: https://goo.gl/1VRrw7
> - Contributions: https://goo.gl/mh7qDG
> --- 
> You received this message because you are subscribed to the Google Groups 
> "CAS Community" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected] <javascript:>.
> To view this discussion on the web visit 
> https://groups.google.com/a/apereo.org/d/msgid/cas-user/SN6PR01MB4191601A86A7BDD4F2011D75D9200%40SN6PR01MB4191.prod.exchangelabs.com
>  
> <https://groups.google.com/a/apereo.org/d/msgid/cas-user/SN6PR01MB4191601A86A7BDD4F2011D75D9200%40SN6PR01MB4191.prod.exchangelabs.com?utm_medium=email&utm_source=footer>
> .
>
> -- 
> - Website: https://apereo.github.io/cas
> - Gitter Chatroom: https://gitter.im/apereo/cas
> - List Guidelines: https://goo.gl/1VRrw7
> - Contributions: https://goo.gl/mh7qDG
> --- 
> You received this message because you are subscribed to the Google Groups 
> "CAS Community" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected] <javascript:>.
> To view this discussion on the web visit 
> https://groups.google.com/a/apereo.org/d/msgid/cas-user/etPan.5b69c06e.293d8d21.162d%40unicon.net
>  
> <https://groups.google.com/a/apereo.org/d/msgid/cas-user/etPan.5b69c06e.293d8d21.162d%40unicon.net?utm_medium=email&utm_source=footer>
> .
>

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/ba5b8171-eca1-4b57-be00-03e6002b0877%40apereo.org.

Reply via email to