[cas-user] Re: ERROR [org.apereo.cas.util.concurrent.CasReentrantLock] -

2024-06-11 Thread Josh
As an additional debugging point, I tested this on 7.1.0-SNAPSHOT and it loads all services as expected, so it looks like this is 7.0.x specific. On Tuesday, June 11, 2024 at 12:49:33 PM UTC-4 Josh wrote: > Hi Meysam - > > Here is the JDK version we are running in our DEV env > &

[cas-user] Re: ERROR [org.apereo.cas.util.concurrent.CasReentrantLock] -

2024-06-11 Thread Josh
:08:20 AM UTC-4 Meysam Shirazi wrote: > Hi Josh > Check the JDK version. > > On Friday, April 12, 2024 at 12:41:49 AM UTC+3:30 Josh wrote: > >> Hi all - >> >> We're in the process of migrating from CAS 6.6.x to CAS 7.0.x. We have >> several hundred service

[cas-user] Was 6.6.15.1 Removed from Docker Hub as a Tag?

2024-06-10 Thread Josh
Hi all - Running into an odd issue here. After https://apereo.github.io/2024/05/18/oauth-vuln/ was released, we upgrade our nodes to 6.6.15.1. We're pushing this same logic to a new set of nodes and are receiving the following error: Unable to find image 'apereo/cas:6.6.15.1' locally docker:

[cas-user] ERROR [org.apereo.cas.util.concurrent.CasReentrantLock] -

2024-04-11 Thread Josh
Hi all - We're in the process of migrating from CAS 6.6.x to CAS 7.0.x. We have several hundred services in our production environment working fine, however when starting CAS 7.0.3 in our test environment it seems to bail out hard loading some specific services and the application shuts down.

[cas-user] Re: CAS Interrupt

2023-02-17 Thread Josh
t_to = [link1: url2]; > } > } > } > } > } > } > return new InterruptResponse(message: message, links: redirect_to, > block: block, ssoEnabled: sso_enabled, interrupt: interru

[cas-user] Re: CAS Interrupt

2023-02-16 Thread Josh
We're seeing the same thing on our end moving from 6.4.x to 6.6.x 2023-02-16 18:52:47,362 DEBUG [org.apereo.cas.interrupt.webflow.actions.InquireInterruptAction] - 2023-02-16 18:52:47,362 DEBUG [org.apereo.cas.interrupt.BaseInterruptInquirer] - 2023-02-16 18:52:47,362 DEBUG

[cas-user] Re: CAS 6.3 - Support for Azure AD WS-Trust / WIAORMULTIAUTHN claims?

2021-09-23 Thread Josh G
Bumping this. Has anyone had any luck configuring this or a suitable work around that keeps CAS within the auth flow? On Monday, June 28, 2021 at 12:22:07 PM UTC-4 Josh G wrote: > We are currently running CAS 6.3 as a CAS and SAML IdP, both of which use > LDAP for authentication. We have

[cas-user] CAS 6.3 - Support for Azure AD WS-Trust / WIAORMULTIAUTHN claims?

2021-06-28 Thread Josh G
We are currently running CAS 6.3 as a CAS and SAML IdP, both of which use LDAP for authentication. We have Azure AD (as a service) configured to authenticate through CAS using SAML which has been working perfectly fine for years. Our Desktop Management team is looking to expand our usage of

[cas-user] RegisteredServiceResponseHeadersEnforcementFilter is blocking this request

2021-01-11 Thread Josh G
We recently attempted to upgrade our CAS environment from v6.1.X to v6.2.X. While things looked stable in our TEST environment, we are experiencing an unexpected, but replicable, issue in our PROD environment. Two services that we are aware of (PingOne and WebEx) are triggering CAS to return a

[cas-user] Re: CAS 6.1.2 inotify issues

2020-02-25 Thread Josh
Were you able to find a solution to this? We're running into this on our sub-production instance of CAS but have not experienced it on any production instances yet. On Saturday, December 21, 2019 at 12:34:13 AM UTC-5, windhamg wrote: > > Hi all, > > I'm testing CAS 6.1.2 in an external Jetty

[cas-user] Re: CAS 6.1.3 SAML and JSON

2020-01-23 Thread Josh
Apologies, I see you have that already, I mis-read the original post :) On Thursday, January 23, 2020 at 10:32:36 AM UTC-5, Josh wrote: > > You dont need an allowedAttributes sections for this, just an > attributeReleasePolicy like so: > >attributeReleasePolicy : { &

[cas-user] Re: CAS 6.1.3 SAML and JSON

2020-01-23 Thread Josh
You dont need an allowedAttributes sections for this, just an attributeReleasePolicy like so: attributeReleasePolicy : { @class : org.apereo.cas.services.ReturnMappedAttributeReleasePolicy allowedAttributes : { @class : java.util.TreeMap mail :

[cas-user] Re: [CAS 6.1] Base64 decoding failed / incorrect header check

2020-01-22 Thread Josh
, January 22, 2020 at 9:45:40 AM UTC-5, Christine Pasek wrote: > > Hello Josh, > > I have just upgraded from 5.2.X to 5.3.X and am experiencing the same > error and like you, everything seems to be working fine. > > Were you able to find a solution to fixing this error

[cas-user] [CAS 6.1] Base64 decoding failed / incorrect header check

2020-01-03 Thread Josh
Hi all - We have recently upgraded from CAS 5.2.x to CAS 6.1.x - everything appears to be working as expected, however we are seeing the below very frequently in our error logs (dozens of times per minute). We saw these errors while testing/validating but it was not nearly as frequent. >

[cas-user] Re: SAML Response Destination

2019-09-09 Thread Josh G
our 6.1.0 upgrade? On Monday, September 9, 2019 at 6:45:11 AM UTC, Misagh Moayyed wrote: > > Can you try this with 5.3.12? > > On Thursday, September 5, 2019 at 6:46:44 PM UTC+4:30, Josh G wrote: >> >> Apologies for the bump - just wanted to see if anyone else has

[cas-user] SAML Response Destination

2019-08-21 Thread Josh G
Hi all - We are working on integrating a service (dmp.cdlib.org) in our CAS 5.2.x environment, but are having trouble accommodating a specific requirement, specifically setting the Destination in the SAML response. In order to validate our configuration, the vendor offers a test Shibboleth SP

[cas-user] Re: Using CAS 5.2.x with Concur Solutions

2019-08-20 Thread Josh G
s:tc:SAML:1.1:nameid-format:emailAddress https://---BASE-URL---/SAMLRedirector/ClientSAMLLogin.aspx"/> On Monday, August 19, 2019 at 11:07:01 PM UTC, Josh wrote: > > Were you able to find a solution to this? We're running into the same > issue with Concur Solutions

[cas-user] Re: Using CAS 5.2.x with Concur Solutions

2019-08-19 Thread Josh
Were you able to find a solution to this? We're running into the same issue with Concur Solutions on CAS v5.2.4. On Thursday, April 18, 2019 at 3:40:02 PM UTC, JC wrote: > > We are trying to setup CAS 5.2.6 for use with Concur Solutions as the SP. > Per their tech support, they only support IdP

[cas-user] Re: [CAS 6.0] Attribute Mappings to SAML Identifiers Broken in CAS 6.0

2019-07-31 Thread Josh G
Apache Tomcat Version: Apache Tomcat/9.0.20 On Friday, July 26, 2019 at 2:25:33 PM UTC, Josh G wrote: > > Attribute Mappings to SAML Identifiers (e.g. urn:oid:2.5.4.42) is broken > in CAS 6.0. > > In CAS 5.2 (and earlier rel

[cas-user] [CAS 6.0] Attribute Mappings to SAML Identifiers Broken in CAS 6.0

2019-07-26 Thread Josh G
Attribute Mappings to SAML Identifiers (e.g. urn:oid:2.5.4.42) is broken in CAS 6.0. In CAS 5.2 (and earlier releases of CAS 5.x) it was possible to map an attribute to a SAML compatible URI by leveraging the attributeReleasePolicy within a service definition. *A working (CAS 5.2) example is

[cas-user] Google Apps Support Broken in 5.2.9

2019-01-03 Thread Josh G
Support for Google Apps is broken in 5.2.9. I assume the change that broke Google Apps on 5.3.x [1] [2] was back-fed sometime after 5.2.4 (our current production release, which is working as expected) and 5.2.9 (which no longer works as expected): Related: *

[cas-user] Re: CAS 5.3.x Introduces Breaking Change for RequestID in cas-server-support-saml

2018-09-07 Thread Josh G
oolean that can be flipped to disable this. > > On Sunday, September 2, 2018 at 9:29:23 PM UTC-4, Josh G wrote: >> >> Its worth mentioning this issue is related to the following from July: >> >> >> https://groups.google.com/a/apereo.org/forum/#!searchin/cas-use

[cas-user] Re: CAS 5.3.x Introduces Breaking Change for RequestID in cas-server-support-saml

2018-09-02 Thread Josh G
/zrQf5Ex-CAAJ I'd like to reiterate that patching the client is not a fix here, the core of 5.3 needs to be patched to gracefully accept a null RequestID as all previous versions of CAS have. On Monday, August 27, 2018 at 3:25:32 PM UTC-4, Josh G wrote: > > > CAS 5.3.x introduces a breaki

[cas-user] CAS 5.3.x Introduces Breaking Change for RequestID in cas-server-support-saml

2018-08-27 Thread Josh G
CAS 5.3.x introduces a breaking change to how RequestIDs are handled when validating SAML Services. *In 5.2.x (and all previous version of CAS), if the RequestID is not present, it will gracefully fail by returning a null value:*