Thanks,
Yes I expected to have to write some code – I’m looking into
method injection & cas extensions
Perhaps one of those will have what I need
Al;
Allen Joslin
ePath Learning, Inc.
300 State Street, Suite 400
New London, CT 06320
(860) 444-7900 x-43
[email protected]<mailto:[email protected]>
* ePath Learning has been recognized on the Inc. 500/5000 list of the
fastest-growing private companies in America for the past five years, and is a
recipient of the 2013 Marcum Tech Top 40 award, in addition to receiving
multiple product of the year and technology excellence awards.
This message contains information which may be confidential and/or privileged.
Unless you are the intended recipient (or authorized to receive for the
intended recipient), you may not read, use, copy or disclose to anyone the
message or any information contained in the message. If you have received the
message in error, please advise the sender by reply e-mail and delete the
message and any attachment(s) thereto without retaining any copies.
From: Misagh Moayyed [mailto:[email protected]]
Sent: Monday, December 30, 2013 1:32 PM
To: [email protected]
Subject: Re: [cas-user] multiple login schemes, what is best practice ?
Authentication handlers in CAS by default are tried in a sequence. If you
configure handlers for schema A, B, C, CAS would attempt to authenticate the
user by first trying A, then B and then C, whichever produces a successful
match, etc. If you want to only force one via a url parameter, this would
require extra development and coding. I do believe that CAS 4 also does have
the option to configure required authentication handlers per registered
application in the registry.
Misagh
________________________________
From: "Al Joslin" <[email protected]<mailto:[email protected]>>
To: [email protected]<mailto:[email protected]>
Sent: Monday, December 30, 2013 10:32:50 AM
Subject: [cas-user] multiple login schemes, what is best practice ?
I have to support multiple login schemes: Local LDAP. Remote LDAP, Local AD,
multiple Remote AD’s
I just stumbled upon a phrase in a comment on the JAAS page in an example
codeblock --> Login Configuration for JAAS. First try Kerberos, then LDAP, then
AD
I have the mandate to support multiple Remote authenticators, not all of which
will use the same scheme (some LDAP, some AD, some Federated, etc…
I want to trigger these different configs off of something in the URL line –
can this be done ?
What is best practice in this case ?
Thanks!
Allen Joslin
ePath Learning, Inc.
300 State Street, Suite 400
New London, CT 06320
(860) 444-7900 x-43
[email protected]<mailto:[email protected]>
* ePath Learning has been recognized on the Inc. 500/5000 list of the
fastest-growing private companies in America for the past five years, and is a
recipient of the 2013 Marcum Tech Top 40 award, in addition to receiving
multiple product of the year and technology excellence awards.
This message contains information which may be confidential and/or privileged.
Unless you are the intended recipient (or authorized to receive for the
intended recipient), you may not read, use, copy or disclose to anyone the
message or any information contained in the message. If you have received the
message in error, please advise the sender by reply e-mail and delete the
message and any attachment(s) thereto without retaining any copies.
--
You are currently subscribed to
[email protected]<mailto:[email protected]> as:
[email protected]<mailto:[email protected]>
To unsubscribe, change settings or access archives, see
http://www.ja-sig.org/wiki/display/JSG/cas-user
--
You are currently subscribed to
[email protected]<mailto:[email protected]> as:
[email protected]<mailto:[email protected]>
To unsubscribe, change settings or access archives, see
http://www.ja-sig.org/wiki/display/JSG/cas-user
--
You are currently subscribed to [email protected] as:
[email protected]
To unsubscribe, change settings or access archives, see
http://www.ja-sig.org/wiki/display/JSG/cas-user