Hello Everyone,
Are we to create a certificate XX.der configured in cas.properties separate
from the tomcat or jetty kestore?
===
Thank You;
Chris Cheltenham
Technology Services
The School District of Philadelphia
Work # 215-400-5025
Cell # 215-301-6571
You can maven override it. Find loginform.html in the CAS source.
Copy it (and as much of the associated parts as needed) into your maven
override project.
loginform.html will end up
under src/main/resources/templates/fragments/loginform.html
On 22 March 2018 at 07:43, ChangWon Son
One PAC4J client works great, however, when multiple clients are defined,
Login flow throws an error:
/cas/login?client_name=abc, throws error:Unauthorized Access
/cas/login?client_name=def, throws error :Unauthorized Access
/cas/login throws default login page
properties:
Put service with ssoenabled=false in first order of evaluation
El jueves, 22 de marzo de 2018, Ted Fisher escribió:
> I’d like to try to rephrase my question since I only got one response:
>
>
>
> Is anyone using ssoEnabled set false in service definitions to effect the
> same
I’d like to try to rephrase my question since I only got one response:
Is anyone using ssoEnabled set false in service definitions to effect the same
as renew=true from the client side?
I haven’t been able to get it to work and even insane levels of logging don’t
reveal much, which puts me at
Hi,
The behavior is to create the CAS principal and attributes from the pac4j
principal and attributes. So you should get the pac4j attributes at the end.
Ignore the log about the ClientCredential, the toString method just outputs
the id (not the attributes).
Is the service configured properly