Seems like this to increase the security and avoid CSRF attacks. It forces
to any application to submit the credentials by POST method in CAS server
app.

See my comment in CAS wiki

If you need avoid that behaviour, for example to submit via ajax...., you
should create a non-interactive authentication action
(org.jasig.cas.web.flow.AbstractNonInteractiveCredentialsAction) like
SPNEGO, X509 Certificates or remote trusted client are doing, and modify
the login-webflow to handle you behaviour.

I hope that this helps you!!


2013/11/8 Michael Wechner <[email protected]>

> Hi
>
> I am still working on generating the login screen by the content
> management system instead CAS,
> whereas I have read
>
> https://wiki.jasig.org/display/CAS/Using+CAS+without+the+Login+Screen
>
> I understand that one wants to prevent that credentials are being sent to
> the content management system,
> but having the action pointing to the CAS Server directly
>
> <form action="https://127.0.0.1:7070/cas-server-webapp-3.5.2/login";
> method="POST">
>
> does not seem to me like violating in security issues.
>
> But of course this does not work because of the required Login Ticket.
>
> I have been reading
>
> http://www.jasig.org/cas/protocol
>
> but I still don't really understand what's the purpose of the Login Ticket.
> Does somebody have some more hints on this?
>
> I am currently considering to disable the login ticket validation inside
>
> cas-server-3.5.2/cas-server-core/src/main/java/org/jasig/cas/web/flow/
> AuthenticationViaFormAction.java
>
> but I guess this is not really considered best practice :-)
>
> Thanks
>
> Michael
>
> --
> You are currently subscribed to [email protected] as:
> [email protected]
> To unsubscribe, change settings or access archives, see
> http://www.ja-sig.org/wiki/display/JSG/cas-user
>

-- 
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to