--
You received this message because you are subscribed to the Google Groups "pac4j-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-users...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
failed; nested exception is org.springframework.beans.BeanInstantiationException: Failed to instantiate [org.pac4j.cas.credentials.authenticator.CasRestAuthenticator]: No default constructor found; nested exception is java.lang.NoSuchMethodException: org.pac4j.cas.credentials.authenticator.CasRestAuthenticator.<init>() at org.springframework.beans.factory.support.BeanDefinitionValueResolver.resolveReference(BeanDefinitionValueResolver.java:359) ~[spring-beans-4.2.2.RELEASE.jar:4.2.2.RELEASE]
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
I’ll answer what I can:
Generally, the management of JWTs are your own responsibility. There is no storage requirement for pac4j AFAIK.
How can the result of a CAS REST client call be a JWT? You get a TGT, and then you request an ST based on that TGT, you validate that ST and you get the principal. Where does JWT come in?
--
You received this message because you are subscribed to the Google Groups "pac4j-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-users...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
|
This email has been sent from a virus-free computer protected by Avast. www.avast.com |
CAS itself has no knowledge of JWTs, yet. So if you have extended your CAS server to keep track of JWTs for SSO, you need to further that extension to destroy those JWTs when SSO ends (i.e. /cas/logout)
But, if you authenticate with CAS via a Rest and then in YOUR APP create a JWT that represents that profile, then it all depends on how you manage that JWT and your app session. That has nothing to do with pac4j and/or CAS. If your JWT in your app is bound to your application session, you can kill your app session, and you will have logged out. CAS Rest does not establish an SSO session, so cas/logout won’t do anything for you. The best you can do is kill the TGT that the rest client used to get you the profile.
From: pac4j...@googlegroups.com [mailto:pac4j...@googlegroups.com] On Behalf Of Binu Raj
Sent: Tuesday, December 15, 2015 11:46 PM
To: pac4j-users <pac4j...@googlegroups.com>
Subject: Re: Rest authentication on spring pac4j and cas oauth
Hi,
--
You received this message because you are subscribed to the Google Groups "pac4j-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-users...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Well if you have the TGT, the rest client allows you to destroy it:
Again, note that killing the TGT does not equal logging out. CAS rest does not establish SSO for you. It’s rest. It’s stateless.
From: pac4j...@googlegroups.com [mailto:pac4j...@googlegroups.com] On Behalf Of Binu Raj
Sent: Wednesday, December 16, 2015 12:35 AM
To: pac4j-users <pac4j...@googlegroups.com>
Subject: Re: Rest authentication on spring pac4j and cas oauth
Yes, I am talking about the process for killing the token/TGT. it is only possible in web application not in cas server. Let me know how can I do that? Is there any example code or reference link?
--
You received this message because you are subscribed to the Google Groups "pac4j-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-users...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
authorizerName (optional): the list of authorizer names (separated by commas) used to check authorizations. If the user is not authorized, a 403 HTTP error is returned. By default (if blank), the user only requires to be authenticated to access the resource. The following authorizers are available by default:hsts to use the StrictTransportSecurityHeader authorizer, nosniff for XContentTypeOptionsHeader, noframe forXFrameOptionsHeader, xssprotection for XSSProtectionHeader, nocache for CacheControlHeader orsecurityHeaders for the five previous authorizerscsrfToken to use the CsrfTokenGeneratorAuthorizer with the DefaultCsrfTokenGenerator (it generates a CSRF token and adds it to the request and save it in the pac4jCsrfToken cookie), csrfCheck to check that this previous token has been sent as the pac4jCsrfToken header or parameter in a POST request and csrf to use both previous authorizers.--