Hi all,

I am reading on the importance of preventing replay attack 
https://www.idm-360.com/idm360/the-dangers-of-saml-replay-attacks/, which 
is a requirement from our client.

I was wondering if CAS natively already prevent such attack for SAML 2.0 
protocol acting both as *sp *or as *idp*. Using the CAS 6.2.x.

Would like to see if any one have any insights, if not we would go ahead 
and do some testing on this.

Thanks!

Cheers!
- Andy

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cas-user+unsubscr...@apereo.org.
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/96f0f3c3-aebb-4c6c-a142-ece68b6886fdn%40apereo.org.

Reply via email to