Hi all, I am reading on the importance of preventing replay attack https://www.idm-360.com/idm360/the-dangers-of-saml-replay-attacks/, which is a requirement from our client.
I was wondering if CAS natively already prevent such attack for SAML 2.0 protocol acting both as *sp *or as *idp*. Using the CAS 6.2.x. Would like to see if any one have any insights, if not we would go ahead and do some testing on this. Thanks! Cheers! - Andy -- - Website: https://apereo.github.io/cas - Gitter Chatroom: https://gitter.im/apereo/cas - List Guidelines: https://goo.gl/1VRrw7 - Contributions: https://goo.gl/mh7qDG --- You received this message because you are subscribed to the Google Groups "CAS Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to cas-user+unsubscr...@apereo.org. To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-user/96f0f3c3-aebb-4c6c-a142-ece68b6886fdn%40apereo.org.