Hello guys!
  I'd like to enable CAS SSO as an additional authentication method on my 
Keycloak platform.  
build.gradle
    implementation "org.apereo.cas:cas-server-core-api-configuration-model"
    implementation "org.apereo.cas:cas-server-webapp-init"
    implementation "org.apereo.cas:cas-server-support-ldap"
    implementation "org.apereo.cas:cas-server-support-json-service-registry"
    implementation "org.apereo.cas:cas-server-support-oidc"
    implementation "org.apereo.cas:cas-server-support-ldap-core" 
cas.properties
cas.server.name=https://cas.exemple.sn:8443
cas.server.prefix=${cas.server.name}/cas

logging.config=file:/etc/cas/config/log4j2.xml
#############  ----- LDAP ----  ##################

cas.authn.ldap[0].type=AUTHENTICATED
cas.authn.ldap[0].ldapUrl=ldap://x.x.x.x
cas.authn.ldap[0].baseDn=dc=exemple,dc=com
cas.authn.ldap[0].searchFilter=uid={user}
cas.authn.ldap[0].subtreeSearch=true
cas.authn.ldap[0].bindDn=cn=myadmintest,dc=exemple,dc=com
cas.authn.ldap[0].bindCredential=xxxxxx
cas.authn.ldap[0].principalAttributeId=mail
cas.service-registry.json.location=file:/etc/cas/services
cas.authn.accept.users=
#mappage  attribut,uid, cn et mail sont les attributs LDAP qui seront 
extraits pour l'user
cas.authn.ldap[0].principalAttributeList=sn,givenName,mail
# ------OIDC------
cas.authn.oidc.jwks.file-system.jwks-file=file:/etc/cas/config/keystore.jwks
cas.authn.oidc.enabled=true
# URL de base pour OpenID Connect
cas.authn.oidc.core.issuer=https://cas.exemple.com/cas/oidc
# Activer la découverte automatique (/.well-known/openid-configuration)
cas.authn.oidc.discovery.discoverySettingsEnabled=true
cas.authn.oidc.jwks.jwks-file=file:/etc/cas/config/keystore.jwks
cas.authn.oidc.skew=5
# Add/remove scopes as necessary here...
cas.authn.oidc.discovery.scopes=openid,profile,email
# Configurer les clients OIDC
cas.authn.pac4j.oidc[0].generic.id=myclientid (from keycloak)
cas.authn.pac4j.oidc[0].generic.secret=xxxxxxx
cas.authn.pac4j.oidc[0].generic.client-nam=myclientid
# Note the realm name in the discovery URL...
cas.authn.pac4j.oidc[0].generic.discovery-uri=https://keycloak.exemple.com/realms/test/.well-known/openid-configuration
cas.authn.pac4j.oidc[0].generic.principal-id-attribute=email
cas.authn.pac4j.oidc[0].generic.preferred-jws-algorithm=RS256
cas.authn.pac4j.oidc[0].generic.client-authentication-method=client_secret_basic
cas.authn.pac4j.oidc[0].generic.supported-client-authentication-methods=client_secret_basic,client_secret_post

######## my oidc-10001.json file #######
{
    "@class": "org.apereo.cas.services.OidcRegisteredService",
    "clientId": "casclientid",
    "clientSecret": "xxxxxxxxxxxxxxxxx",
    "serviceId": 
"https://keycloak.exemple.com/realms/test/broker/keycloak-oidc/endpoint";,
    "name": "oidc",
    "id": 10001,
    "bypassApprovalPrompt": true,
    "description": "Service OIDC pour Moodle",
    "evaluationOrder": 3,
    "scopes": ["java.util.HashSet", [ "openid", "profile", "email" ]]
}
i have this error keycloak oidc works perfect CAS OIDC auth also works 
perfects but delegate auth doesnt work[image: Capture d'écran 2024-10-09 
130306.png]

-- 
- Website: https://apereo.github.io/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cas-user+unsubscr...@apereo.org.
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/775b75b3-8ff9-40af-8d95-cccb3988b703n%40apereo.org.

Reply via email to