I am attempting to integrate a SAML federation into our CAS instance. I seem to be stuck on service entry defeind access.
It seems that to allow SAML federation I have to configure a wildcard for entityId/serviceId. I was assuming that saml service entries would require both a positive metadata match and entityId match. Seems that by entering the SAML service entry the wildcard match also applies to CAS services.
example SAML service entry
{
"@class" : "org.apereo.cas.support.saml.services.SamlRegisteredService",
"serviceId" : "^https://.*$",
"name" : "Federation Test",
"id" : 10000003,
"evaluationOrder" : 10,
"metadataLocation" : "https://url/to/metadata.xml"
}
After entering the above service entry, any request to “/cas/login?service=anything” will match. Makes sense if only serviceId is used for the match. But I figured, incorrectly, that metadata was also involved.
Am I missing something, or do I have to iteratively add every possible entity id into the regex for serviceId. That seems unmaintainable at scale.
Notice: This message was sent from outside the University of Victoria email system. Please be cautious with links and sensitive information.
That is likely the issue. We are on the latest 6.3.x branch. Will mark it as a known bug to be resolved when we get our version to 6.5. Thank you.