Hi,
In our organization, we have a CAS 6.5.9.3 with mfa-gauth and trusted devices implementation with REDIS. Nowadays we have around 15.000 users with MFA activated.
From some time until now users are experiencing a 10 seconds delay between login page submit and MFA code request page, if needed, or redirection to service. This delay looks like a issue with number of users with active MFA.
After some investigation, we found the lines of code that causes the delay. In CAS log we have the lines:
2024-07-12 12:37:03,358 TRACE [org.apereo.cas.trusted.web.flow.MultifactorAuthenticationVerifyTrustAction] - <Retrieving trusted authentication records for [XXXXX]>
. . .
2024-07-12 12:37:13,875 TRACE [org.apereo.cas.trusted.web.flow.MultifactorAuthenticationVerifyTrustAction] - <Retrieving authentication records for [XXXXX] that matches [****************************]>
The portion of code that
prints this log is located at the method doExecute in class org.apereo.cas.trusted.web.flow.MultifactorAuthenticationVerifyTrustAction and we think the problem is in the invocation to this.storage.get(principal);. The
“storage” attribute is an org.apereo.cas.trusted.authentication.storage.RedisMultifactorAuthenticationTrustStorage instance and we found that this class performs a remove() call
in each query operation to the storage:
@Override
public Set<? extends MultifactorAuthenticationTrustRecord> get(final String principal) {
remove();
val keys = RedisUtils.keys(this.redisTemplate, buildRedisKeyForRecord(principal), this.scanCount);
return getFromRedisKeys(keys);
}
The
remove method performs a SCAN command over all entries with RedisMultifactorAuthenticationTrustStorage:* key, and for each result
invoke a GET to bring the object, deserialize it and check de
expiration date:
public void remove(final ZonedDateTime expirationDate) {
RedisUtils.keys(this.redisTemplate, getPatternRedisKey(), this.scanCount).map((redisKey) -> {
return (List)this.redisTemplate.boundValueOps(redisKey).get();
}).filter(Objects::nonNull).flatMap(Collection::stream).filter((record) -> {
return DateTimeUtils.zonedDateTimeOf(record.getExpirationDate()).isBefore(expirationDate);
}).forEach((record) -> {
Set<String> recordKeys = (Set)RedisUtils.keys(this.redisTemplate, buildRedisKeyForRecord(record), this.scanCount).collect(Collectors.toSet());
this.redisTemplate.delete((Collection)Objects.requireNonNull(recordKeys));
});
}
In newer versions of the code, the remove invocation still exists. Why is the query method of this RedisMultifactorAuthenticationTrustStorage implemented in this way? After all, there exist a cleaning mechanism.
We thinks this delay is unacceptable
and we are thinking in overwrite the class to eliminate the remove invocation and
filter the results to avoid expirated results.
Is there a better solution to our problem? Have we overlooked something?
Regards,
Jose Luis
--
You received this message because you are subscribed to the Google Groups "CAS Developer" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cas-dev+u...@apereo.org.
To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-dev/453a0c91-6e15-422f-a3cb-07ea2273ce51n%40apereo.org.