Generated by GPT-5-mini| CAS (Central Authentication Service) | |
|---|---|
| Name | CAS (Central Authentication Service) |
| Developer | Apereo Foundation |
| Released | 2001 |
| Programming language | Java |
| Operating system | Cross-platform |
| License | Apache License |
CAS (Central Authentication Service) is an open-source single sign-on protocol and server used for web authentication across multiple applications and services. It enables centralized user credential verification for distributed systems, providing ticket-based access delegation and session management. CAS is maintained within an ecosystem of projects, libraries, and institutions that support interoperability, scalability, and security.
CAS provides a centralized authentication gateway allowing users to authenticate once and gain access to multiple Apache Software Foundation-based web applications, Atlassian tools, Google Workspace-integrated services, Microsoft Exchange-linked portals, and enterprise platforms such as Salesforce and ServiceNow. It uses a ticket-granting mechanism influenced by designs from MIT Kerberos, OAuth 2.0, SAML 2.0, and OpenID Connect, while integrating with identity stores including Active Directory, OpenLDAP, Oracle Database, and MySQL. The project is governed and contributed to by vendors, universities like Stanford University and University of Michigan, and foundations including the Apereo Foundation and Eclipse Foundation.
CAS originated in the early 2000s as a project at Yale University and later saw stewardship by Jason Noble-led teams and adoption by institutions including University of Chicago, University of Illinois Urbana-Champaign, Princeton University, Cornell University, and MIT. The protocol evolved alongside federated identity efforts from Liberty Alliance Project, OASIS, and standards bodies like the IETF. Major milestones include rewrites to support integrations with Shibboleth, adoption by commercial vendors such as IBM and Oracle Corporation, and incorporation into cloud identity strategies promoted by AWS, Google Cloud, and Microsoft Azure.
The CAS architecture centers on a CAS server issuing service tickets and ticket-granting tickets to client services such as Jenkins (software), Confluence, Jira (software), and Tomcat-hosted applications. It supports protocols and profiles interoperable with SAML 2.0, OpenID Connect, and legacy flows inspired by Kerberos ticketing; connectors enable backends like PostgreSQL, MariaDB, and directory services including FreeIPA. Components include authentication handlers, ticket registries often backed by Redis, Hazelcast, or Apache Cassandra, and protocol endpoints compatible with NGINX and Apache HTTP Server proxies. The protocol defines exchanges for /login, /serviceValidate, and /logout endpoints and supports multi-factor techniques involving integrations with Duo Security, Okta, YubiKey, and Google Authenticator.
CAS is deployed in containerized environments orchestrated by Kubernetes, Docker Swarm, or Apache Mesos and can be integrated with CI/CD pipelines using Jenkins (software), GitLab, and Travis CI. Organizations integrate CAS with cloud identity platforms like Azure Active Directory, Okta, Ping Identity, and OneLogin or federate via Shibboleth and Keycloak. Deployment scenarios include high-availability clusters using load balancers such as HAProxy and F5 Networks, persistence in Amazon RDS and Google Cloud SQL, and monitoring with Prometheus, Grafana, and ELK Stack components.
Security and privacy for CAS deployments draw on practices from NIST, ISO/IEC 27001, and guidance from the OWASP Foundation. Operators must consider threats cataloged by MITRE ATT&CK and mitigate session hijacking, replay attacks, and cross-site request forgery observed in web SSO contexts. Encryption of tickets relies on TLS configurations vetted against CIS Controls and cipher guidelines from IETF RFCs; vulnerability management ties to advisories from US-CERT and coordinated disclosure procedures used by CERT Coordination Center. Privacy impacts implicate data protection regimes such as GDPR and California Consumer Privacy Act when personal identifiers are stored or transmitted.
Multiple implementations and distributions exist, including the official Java-based server supported by the Apereo Foundation and community-driven adaptations that interface with Node.js, Python (programming language), and Ruby on Rails. Commercial identity providers such as Ping Identity and ForgeRock have offered connectors or companion products. Variant deployments include CAS overlays in cloud marketplaces by Amazon Web Services and Google Cloud Platform, packaged distributions for platforms like Red Hat Enterprise Linux and Ubuntu (operating system), and integrations with middleware from Spring Framework and Hibernate.
CAS has been adopted widely across higher education at institutions like Harvard University, Columbia University, University of California, Berkeley, University of Toronto, and University of Oxford, as well as by corporations including Netflix, Twitter, Facebook, LinkedIn, and Airbnb for unified portal access or legacy system consolidation. Use cases span campus portals, library services integrating with Ex Libris, research computing clusters using Slurm Workload Manager, corporate intranets backed by SharePoint, and SaaS product ecosystems requiring centralized authentication and single logout. The protocol continues to serve organizations seeking a customizable, extensible SSO solution compatible with established identity standards.
Category:Authentication protocols Category:Single sign-on