When using Attribute Based Access Control (ABAC) in a service access
strategy, is there a way to conditionally specify the unauthorized URL to
redirect to depending on the failure to satisfy a particular attribute
requirement?
The Unauthorized URL documentation suggests perhaps this could be done
Thanks for posting your fix. I ran into the same issue moving from 6.5.x
-> 6.6.x. Using the CIDR notation and the property name changes also
solved my errors.
On Fri, Mar 10, 2023 at 6:46 AM Arkady Keppert wrote:
> I did find erros in my configuration now its working fine :
>
>
Jerome,
Your test service is not being loaded.
05:22:45 INFO [o.a.c.s.AbstractServicesManager] -
See https://apereo.github.io/cas/6.6.x/services/JSON-Service-Management.html
and https://apereo.github.io/cas/6.6.x/services/Service-Management.html
Ray
On Mon, 2023-07-03 at 06:17 -0700, Jerome
Hello
trying to deploy cas server for delegate azure ad auth
I'm working with docker image apereo/cas:latest
I added cas.properties file as below
cas.authn.pac4j.oidc[0].azure.display-name= cas
cas.authn.pac4j.oidc[0].azure.auto-redirect-type= SERVER
cas.authn.pac4j.oidc[0].azure.client-name= cas
Any help on this matter ?
Can't see what's wront here
Le mardi 27 juin 2023 à 16:09:59 UTC+2, Jérémie a écrit :
> Hi,
>
> I'm pretty new to cas (6.6.8) and I'm trying to connect an test
> application to my CAS server using OIDC. I'm used to Okta, Auth0, etc so
> OIDC is not new to me, just