Course Outline

Introduction

  • The case for Single-Sign-On (SSO) Authentication for government operations
  • CAS vs LDAP vs OpenID: Evaluating Options for Government Use

An overview of the CAS Architecture for government systems

  • System components for government applications
  • CAS Server for secure authentication services
  • CAS clients for integration with various applications
  • Supported protocols for interoperability and security
  • Software components
    • Spring MVC/Spring Webflow for robust web application management
    • Ticketing mechanisms for session management
    • Authentication processes to ensure user identity verification

Building CAS as an Overlay Project for Government Use

  • Building and deploying with Gradle, Maven, and Docker for government environments
  • Using custom and third-party source code to meet specific government requirements
  • Managing dependencies to ensure system reliability and security

Configuring Authentication in CAS for Government Applications

  • Orchestrating authentication handlers with the authentication manager for seamless user experience
  • Choosing appropriate authentication handlers and schemes for government systems
  • Testing the default authentication scheme to ensure compliance and security
  • Principal Resolution: Managing authenticated user identities effectively
  • Transforming the user ID to meet specific application needs
  • Setting up "Remember Me" long-term authentication for enhanced user convenience
  • Setting up proxy authentication to support delegated access in government applications
  • Multi-factor authentication (MFA) for enhanced security measures
  • Limiting failed login attempts with login throttling to prevent unauthorized access
  • Configuring an SSO session cookie to maintain user sessions securely

Attribute Resolution and Release for Government Applications

  • Principal-Id attribute: Receiving authenticated user IDs for secure identification
  • Attribute release policy: Controlling the release of attributes to applications for data governance
  • Caching attributes: Storing resolved attributes efficiently to reduce processing time
  • Encrypting attributes: Conditionally encrypting attributes to protect sensitive information

Troubleshooting Common Issues in Government CAS Implementations

Summary and Next Steps for Government Deployment

Requirements

  • An understanding of security concepts, including authentication and authorization
  • Familiarity with Linux and the command-line interface

Audience for Government

  • System administrators
 7 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories