Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- The case for Single-Sign-On (SSO) Authentication for government operations
- CAS vs LDAP vs OpenID: Evaluating Options for Government Use
An overview of the CAS Architecture for government systems
- System components for government applications
- CAS Server for secure authentication services
- CAS clients for integration with various applications
- Supported protocols for interoperability and security
- Software components
- Spring MVC/Spring Webflow for robust web application management
- Ticketing mechanisms for session management
- Authentication processes to ensure user identity verification
Building CAS as an Overlay Project for Government Use
- Building and deploying with Gradle, Maven, and Docker for government environments
- Using custom and third-party source code to meet specific government requirements
- Managing dependencies to ensure system reliability and security
Configuring Authentication in CAS for Government Applications
- Orchestrating authentication handlers with the authentication manager for seamless user experience
- Choosing appropriate authentication handlers and schemes for government systems
- Testing the default authentication scheme to ensure compliance and security
- Principal Resolution: Managing authenticated user identities effectively
- Transforming the user ID to meet specific application needs
- Setting up "Remember Me" long-term authentication for enhanced user convenience
- Setting up proxy authentication to support delegated access in government applications
- Multi-factor authentication (MFA) for enhanced security measures
- Limiting failed login attempts with login throttling to prevent unauthorized access
- Configuring an SSO session cookie to maintain user sessions securely
Attribute Resolution and Release for Government Applications
- Principal-Id attribute: Receiving authenticated user IDs for secure identification
- Attribute release policy: Controlling the release of attributes to applications for data governance
- Caching attributes: Storing resolved attributes efficiently to reduce processing time
- Encrypting attributes: Conditionally encrypting attributes to protect sensitive information
Troubleshooting Common Issues in Government CAS Implementations
Summary and Next Steps for Government Deployment
Requirements
- An understanding of security concepts, including authentication and authorization
- Familiarity with Linux and the command-line interface
Audience for Government
- System administrators
7 Hours