Are the set of CAS authentication attributes documented somewhere? If you
test logins using /cas/login, we can see, for example, the following set of
authentication attributes:

credentialType, clientIpAddress, samlAuthenticationStatementAuthMethod,
authenticationDate, bypassMultifactorAuthentication, authenticationMethod,
authnContextClass, successfulAuthenticationHandlers, serverIpAddress,
userAgent

Some of them are straightforward, such
as clientIpAddress, authenticationDate, serverIpAddress, userAgent; but it
would be helpful to have some formal documentation on exactly what the
others are.

For example, suppose a client wanted to verify that MFA was actually used.
If we only supported Duo for MFA, is it sufficient to simply check,
say, successfulAuthenticationHandlers for the value
"DuoSecurityAuthenticationHandler", or do you also have to
verify bypassMultifactorAuthentication = "false"? Or is there another
"correct'' way to do this?

Bonus: we also use the shib-cas plugin to front our Shibboleth IdP
deployment with CAS. Any pointers to how we can make use of these
authentication attributes to define comparable attributes on the Shib side
would be appreciated.

-- 
Baron Fujimoto <ba...@hawaii.edu> ::: UH Information Technology Services
minutas cantorum, minutas balorum, minutas carboratum descendus pantorum

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cas-user+unsubscr...@apereo.org.
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/CAAjLUL1jW4sy3sTbC%3D9C6oQZ1sn6C7R8K5kijXtqpbG%3Dwnhj%3Dg%40mail.gmail.com.

Reply via email to