Hi all,

I am reading on the importance of preventing replay attack 
https://www.idm-360.com/idm360/the-dangers-of-saml-replay-attacks/, which 
is a requirement from our client.

I was wondering if CAS natively already prevent such attack for SAML 2.0 
protocol acting both as *sp *or as *idp*. Using the CAS 6.2.x.

Would like to see if any one have any insights, if not we would go ahead 
and do some testing on this.

Thanks!

Cheers!
- Andy

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/96f0f3c3-aebb-4c6c-a142-ece68b6886fdn%40apereo.org.

Reply via email to