GenAuth DocsDocuments
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version
User Guide
  • Quick Start

  • Authentication

  • Access Control

  • Authorization

  • Adaptive MFA

  • User Account Management

  • User Directory Management

  • Applications

    • Self-built Applications

      • Create Self-built Application
      • Quick Start
      • Application Configuration
      • Protocol Configuration

        • Configure OIDC Protocol
        • Custom OIDC Scope
        • Configure OAuth Protocol
        • Configure SAML Protocol
        • Configure CAS Protocol
      • Login Control
      • Access Authorization
      • Branding
      • Security Management
    • Single Sign-On SSO

  • Become a Federation Authentication Identity Provider

  • Connect External Identity Providers (IdP)

  • WeChat Ecosystem Full Scenario Capabilities

  • Migrate Users to GenAuth

  • Security Settings

  • Branding

  • Automation

  • Audit Logs

  • Setting

  • FAQ

  1. User Guide
  2. /
  3. Applications
  4. /
  5. Self-built Applications
  6. /
  7. Protocol Configuration
  8. /
  9. Configure CAS Protocol

¶ Become a CAS identity source

Update time: 2025-04-11 11:21:15
Edit

This article describes how to make GenAuth a CAS identity source. Other systems can access GenAuth as an identity provider through the CAS protocol.

Currently, GenAuth implements the /login, /validate, and /logout endpoints of CAS 1.0.

You can learn more about the CAS protocol here.

¶ Create an application

In order to enable your application to have identity authentication capabilities, you need to create an application in GenAuth. It is recommended to fill in the name of your actual application project. Go to Console > Application > Application List and click Create Application:

Fill in your Application Name, for example: Network Notes Project, and specify an Authentication Address for your project. Your users will complete authentication at this address in the future. Callback link Fill in your project backend route, GenAuth will send the ticket to this address. Finally, click Create.

Find your application and go to the "Enable Identity Provider" tab.

In the "CAS Identity Provider" card below, turn on the Enable CAS IdP switch and click Save.

¶ Web flow

In the Web flow, the overall process is as follows:

  1. The user visits App1 for the first time.
  2. The user does not establish a session with App1 and is redirected to the authentication page.
  3. The user is not authenticated, and the user completes the identity authentication on the CAS Server.
  4. The user is redirected to the callback address of App1 with the Ticket.
  5. App1 checks the validity of the Ticket at the CAS Server.
  6. App1 establishes a session with the user and returns the protected resource.
  7. The user accesses the application App2.
  8. The user does not establish a session with App2 and is redirected to the authentication page.
  9. The CAS Server finds that the user has been authenticated, and the user is redirected to the callback address of App2 with the Ticket.
  10. App2 checks the validity of the Ticket at the CAS Server.
  11. App2 establishes a session with the user and returns the protected resource.

The flow chart is as follows:

View the Access CAS 1.0 Document.

View the Access CAS 2.0 Document.

Previous article: Configure SAML Protocol Next article: Login Control
  • Create an application
  • Web flow

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.