A typical CAS use case would be the portal. In this n-tiers architecture, the identity is to be shared between the components.
The following diagram depicts the interactions between a client, a portal, a CAS server and Nuxeo for establishing the authentication context.
(a) Portal Service Ticket
The first phase is the portal authentication (a1).
GET /home
The client is redirected to the CAS server for entering its credentials (a2).
GET /cas/login?service=http://127.0.0.1:9090/ticket/validate
Once the credentials are entered, if they are valid, the CAS server generates a service ticket ST
.
The client is redirected by the CAS server back onto the portal using the service
URL (a3).
In the same time, the CAS server generates a ticket granting and registers it client side using the cookie CASTGC
. If the cookie is already present in the request headers, then the client is automatically redirected to the portal.
http://127.0.0.1:9090/ticket/validate?ticket=ST-81-rCbbm5oj9geCKjvhNCvJ-cas
(b) Proxy Granting Ticket
In the second phase, the portal validates the service ticket and requests for a proxy granting ticket PGT
(b1).
GET /cas/serviceValidate?ticket=ST-81-rCbbm5oj9geCKjvhNCvJ-cas& service=http://127.0.0.1:9090/ticket/validate&pgtUrl=http://127.0.0.1:9090/ticket/accept
If the ticket is valid, the CAS server invokes the pgtUrl
callback with two parameters pgtIou
and pgtId
(b2).
GET /ticket/accept?pgtIou=PGTIOU-34-jJZH23r2wbKUqbc3dLFt-cas& pgtId=TGT-45-sSnfcQ7A0TXGsQR2gJONm74rObZ0qRQzhENJWTdZJG5rcGN2T5-cas
In case of success, the server responds to the portal with the following content
<cas:serviceResponse xmlns:cas='http://www.yale.edu/tp/cas'>
.<cas:authenticationSuccess>
..<cas:user>slacoin</cas:user>
..<cas:proxyGrantingTicket>PGTIOU-34-jJZH23r2wbKUqbc3dLFt-cas</cas:proxyGrantingTicket>
.</cas:authenticationSuccess>
</cas:serviceResponse>
The pgtIou
is used portal side for retrieving the accepted PGT
.
(c) Nuxeo Proxy Ticket
In the third phase, the portal asks the CAS server for a new service ticket that will give him access to the Nuxeo server using the client identity (c1).
GET /cas/proxy?pgt=TGT-45-sSnfcQ7A0TXGsQR2gJONm74rObZ0qRQzhENJWTdZJG5rcGN2T5-cas& targetService=http://127.0.0.1:8080/nuxeo/atom/cmis
The CAS server generates a new ST and responds to the portal with the following content:
<cas:serviceResponse xmlns:cas='http://www.yale.edu/tp/cas'>
.<cas:proxySuccess>
..<cas:proxyTicket>ST-82-20eCHgCqvMCvnP6AmZmz-cas</cas:proxyTicket>
.</cas:proxySuccess>
</cas:serviceResponse>
Then the proxy ticket is used by the portal for login into Nuxeo (c2).
GET /nuxeo/atom/cmis?ticket=ST-82-20eCHgCqvMCvnP6AmZmz-cas &proxy=http://127.0.0.1:9090/ticket/accept &service=http:127.0.0.1:8080/nuxeo/atom/cmis
The Nuxeo server validates the ticket by invoking the portal server (c3).
GET /cas/proxyValidate?ticket=ST-82-20eCHgCqvMCvnP6AmZmz-cas&service=http:127.0.0.1:8080/nuxeo/atom/cmis
If the ticket is valid, the CAS server sends the following response:
<cas:serviceResponse xmlns:cas='http://www.yale.edu/tp/cas'>
.<cas:authenticationSuccess>
..<cas:user>slacoin</cas>
..<cas:proxyGrantingTicket>PGTIOU-34-jJZH23r2wbKUqbc3dLFt-cas</cas:proxyGrantingTicket>
..<cas:proxies>
...<cas:proxy>http://127.0.0.1:9090/ticket/accept</cas:proxy>
..</cas:proxies>
.</cas:authenticationSuccess>
</cas>
The Nuxeo server creates an HTTP session and sends the AtomPub response message.
<?xml version='1.0' encoding='UTF-8'?>
<app:service xmlns:app="http://www.w3.org/2007/app"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:cmis="http://docs.oasis-open.org/ns/cmis/core/200908/"
xmlns:cmisra="http://docs.oasis-open.org/ns/cmis/restatom/200908/">
<app:workspace>...</app:workspace>
</app:service>
The portal saves the client context for being able to invoke Nuxeo using the same HTTP session.
(d) Invoking Nuxeo
The Nuxeo HTTP session id is retrieved from the portal session context and invoked.
GET /nuxeo/atom/cmis?repositoryId=default
CAS2 and Anonymous Authentication
CAS2 and anonymous authenticators have flows that can interfere with each others, creating some side effects like bad redirections.
To avoid that, the CAS2 plugin provides a replacement for the default Anonymous authenticator : basically this is a "CAS aware Anonymous authenticator". You can see a sample configuration available in: https://github.com/nuxeo/nuxeo-platform-login/blob/release-6.0/nuxeo-platform-login-cas2/Sample/CAS2-Anonymous-bundle.xml.
But, basically, wanting to put together both CAS2 and Anonymous authentication means you have two types of users that will access Nuxeo. So, an alternate approach is to define two separated authentication chains, one for each type of user:
- One chain for authenticated users: using CAS2 and some other authentication method you may need;
- One chain for anonymous access.
In most of the case, each type of user will have access via a separated virtual host at reverse proxy level. You can use this so that:
- At reverse proxy level you add a header for tagging the type of request;
ex: Anonymous requests will have the header
X-anonymous-access
set to "on"; - At nuxeo level you configure the chains depending on the header;
- Default / main chain is the one using CAS2;
- You define specific chain for requests having the
X-anonymous-access`.
<specificAuthenticationChain name="anonymous-access">
<headers>
<header name="X-anonymous-access">on</header>
</headers>
<allowedPlugins>
<plugin>ANONYMOUS_AUTH</plugin>
</allowedPlugins>
</specificAuthenticationChain>
You can see specificChains extension point for more info.