Hello,
I'm configuring SAML to integrate Rocket.Chat with my CAS, but I'm 
constantly getting syntax errors and can't seem to find the right one. I've 
attached my cas.properties and error logs.

cas_server_ssd | 2025-05-16 18:31:51,301 ERROR 
[org.apereo.cas.configuration.CasConfigurationPropertiesValidator] - <

cas_server_ssd | Failed to bind properties under 'cas' to 
org.apereo.cas.configuration.CasConfigurationProperties

cas_server_ssd | 

cas_server_ssd | cas.authn.saml-idp.idp.entity-id = 
https://cas-server.local:8443/cas/idp (Origin: URL 
[file:/etc/cas/config/cas.properties] - 42:34)

cas_server_ssd | 

cas_server_ssd | cas.authn.saml-idp.idp.metadata.encryption-certificate = 
file:/etc/cas/saml/idp-encryption.crt (Origin: URL 
[file:/etc/cas/config/cas.properties] - 48:56)

cas_server_ssd | 

cas_server_ssd | cas.authn.saml-idp.idp.metadata.encryption-key = 
file:/etc/cas/saml/idp-encryption.key (Origin: URL 
[file:/etc/cas/config/cas.properties] - 49:48)

cas_server_ssd | 

cas_server_ssd | cas.authn.saml-idp.idp.metadata.signing-certificate = 
file:/etc/cas/saml/idp-signing.crt (Origin: URL 
[file:/etc/cas/config/cas.properties] - 45:53)

cas_server_ssd | 

cas_server_ssd | cas.authn.saml-idp.idp.metadata.signing-key = 
file:/etc/cas/saml/idp-signing.key (Origin: URL 
[file:/etc/cas/config/cas.properties] - 46:45)

cas_server_ssd | 

cas_server_ssd | cas.authn.saml-idp.idp.scope = cas-server.local (Origin: 
URL [file:/etc/cas/config/cas.properties] - 43:30)

cas_server_ssd | 

cas_server_ssd | cas.authn.saml-idp.metadata.location = file:/etc/cas/saml 
(Origin: URL [file:/etc/cas/config/cas.properties] - 40:38)

cas_server_ssd | 

cas_server_ssd | Listed settings above are no longer recognized by CAS 
7.2.0. They may have been renamed, removed, or relocated to a new namespace 
in the CAS configuration schema. CAS will ignore such settings to proceed 
with its normal initialization sequence. Please consult the CAS 
documentation to review and adjust each setting to find an alternative or 
remove the definition from the property source. Failure to do so puts the 
server stability in danger and complicates future upgrades.

cas_server_ssd | >

-- 
- Website: https://apereo.github.io/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cas-user+unsubscr...@apereo.org.
To view this discussion visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/57ca06b3-19db-4e55-8bf8-82df1485d9a6n%40apereo.org.
# === Informations Serveur CAS ===
cas.server.name=https://cas-server.local:8443
cas.server.prefix=${cas.server.name}/cas

server.port=8443
server.ssl.enabled=true
server.ssl.key-store=file:/etc/cas/thekeystore.p12
server.ssl.key-store-password=Admin2024!
server.ssl.key-password=Admin2024!
server.ssl.key-store-type=PKCS12
server.ssl.key-alias=tomcat
# === Logging ===
logging.level.org.apereo.cas=DEBUG
#logging.config=file:/cas_docker_env_ssd/config_cas/log4j2.xml
logging.level.org.springframework.boot.web.embedded.tomcat=DEBUG
# === Configuration LDAP pour CAS 7.2.x ===
logging.level.org.apereo.cas.authentication=DEBUG
logging.level.org.ldaptive=DEBUG
logging.level.org.apereo.cas.authentication.support=DEBUG
logging.level.org.apereo.cas.authentication.principal=DEBUG
logging.level.org.apereo.cas.support.saml=TRACE
logging.level.org.apereo.cas.support.saml.idp=TRACE

cas.authn.ldap[0].name=ActiveDirectoryDomaineLocal
cas.authn.ldap[0].type=AUTHENTICATED
cas.authn.ldap[0].ldap-url=ldap://192.168.3.64
#cas.authn.ldap[0].use-ssl=false
cas.authn.ldap[0].base-dn=CN=Users,DC=domaine,DC=local
cas.authn.ldap[0].search-filter=sAMAccountName={user}
cas.authn.ldap[0].bind-dn=CN=Administrateur,CN=Users,DC=domaine,DC=local
cas.authn.ldap[0].bind-credential=2+en+fort
cas.authn.ldap[0].principal-attribute-id=sAMAccountName
cas.authn.ldap[0].principal-attribute-list=sAMAccountName,cn,mail
cas.authn.ldap[0].password-policy.enabled=false
cas.authn.ldap[0].subtree-search=true

# === Configuration SAML IdP (Noms pour CAS 7.2.x - À VÉRIFIER DANS LA DOC CAS 
7.2.x SAML IdP) ===
# La configuration SAML IdP pour 7.2.x est souvent plus intégrée.
# Le keystore pour la signature des assertions SAML est souvent le keystore 
principal de CAS (celui défini par cas.host.https.keystore...)
cas.authn.saml-idp.metadata.location=file:/etc/cas/saml

cas.authn.saml-idp.idp.entity-id=https://cas-server.local:8443/cas/idp
cas.authn.saml-idp.idp.scope=cas-server.local

cas.authn.saml-idp.idp.metadata.signing-certificate=file:/etc/cas/saml/idp-signing.crt
cas.authn.saml-idp.idp.metadata.signing-key=file:/etc/cas/saml/idp-signing.key

cas.authn.saml-idp.idp.metadata.encryption-certificate=file:/etc/cas/saml/idp-encryption.crt
cas.authn.saml-idp.idp.metadata.encryption-key=file:/etc/cas/saml/idp-encryption.key



#cas.authn.saml-idp.metadata.file-system.location=file:/etc/cas/saml
#cas.authn.saml-idp.idp.entity-id=https://cas-server.local:8443/cas/idp
#cas.authn.saml-idp.metadata.signing-certificate=file:/etc/cas/saml/idp-signing.crt
#cas.authn.saml-idp.metadata.signing-key=file:/etc/cas/saml/idp-signing.key
#cas.authn.saml-idp.metadata.encryption-certificate=file:/etc/cas/saml/idp-encryption.crt
#cas.authn.saml-idp.metadata.encryption-key=file:/etc/cas/saml/idp-encryption.key
 
# cas.authn.saml-idp.metadata.private-key=file:/etc/cas/thekeystore.jks # Ou 
référence à la clé dans le keystore global
# cas.authn.saml-idp.metadata.certificate=file:/etc/cas/thekeystore.jks # Ou 
référence au certificat dans le keystore global
# 
cas.authn.saml-idp.security.signature-signing-credentials[0].private-key=file:/etc/cas/thekeystore.jks
 # Exemple de syntaxe possible pour 7.2.x
# 
cas.authn.saml-idp.security.signature-signing-credentials[0].certificate=file:/etc/cas/thekeystore.jks
# cas.authn.saml-idp.security.keystore.location=file:/etc/cas/thekeystore.jks
# cas.authn.saml-idp.security.keystore.password=Admin2024!
# cas.authn.saml-idp.security.private-key-password=Admin2024!
# cas.authn.saml-idp.security.key-alias=tomcat

# === Clés Crypto (Les 4 clés que vous avez eues des logs précédents) ===
cas.webflow.crypto.encryption.key=752bkYJgWDXvkZFrwWSc7A
cas.webflow.crypto.signing.key=RLkO-pylYGqpfk8_L2-uSlDo68l1z0H0xEGrflqTdl3qDbKLBYM-EtPox3oc6l4EwDfoWcudg63LgVUjKOVOvA
cas.tgc.crypto.encryption.key=vXvelyReY5v94g9HoZiNYnQUgdc-Wualx55mZ4RVUTOQLypZSE6Zq9IxfZNoSK8Hffzr4eOL4I6essf8hcX1DA
cas.tgc.crypto.signing.key=lKav9X9FM1DoPeeWzIkgDmt1E4wAAwxic-GTLzp6gJQh2pAEYG8UTcVZXqzIYvvn3CMuHVBPIJCGFcPw-40k2w

# === Registre des Services (JSON) ===
cas.service-registry.json.location=file:/etc/cas/services
cas.service-registry.core.initFromJson=true

# === Authentification statique (désactivée) ===
cas.authn.accept.enabled=false
spring.main.allow-bean-definition-overriding=true
spring.jmx.enabled=false

Attachment: logs cas.odt
Description: Zip archive

Reply via email to