An overview of how to configure your Spring application on Google Cloud, and test it locally using dockerized emulators for Google Cloud Firestore as well as PubSub.
Discussion of SameSite cookie sporadic failures with the Shibboleth Identity Provider and its support for SAML login flow allowing one to use a separate SAML 2.0 Identity Provider to authenticate a subject.
Learn how to generate the Same-Site attribute for the CAS single sign-on cookie dynamically via Groovy or Java to accommodate older browsers and other conditions, etc.
Learn how to override and overwrite configuration files and even source code artifacts provided by the CAS distribution in your deployment for maximum flexibility and customizability.
Learn how to translate and map requested authentication contexts from one protocol to another, and route the final flow to multifactor authentication if necessary.
Learn how to run the Shibboleth Identity Provider on macOS ARM-based machines and connect it to an external Apereo CAS identity provider for authentication and single sign-on.
Learn about available integrations strategies that allow Apereo CAS to use Redis behind the scenes to manage application registration records, tokens, consent decisions, terms of use policies, etc.
Learn how to link a user profile from an external identity provider in delegated authentication flows, allowing the user to select the final profile from a list of candidates found in LDAP directories of your choice.
Learn how to use Microsoft Azure Active Directory as an external OpenID Connect identity provider and connect it to CAS for a delegated/proxy authentication scenario.
A somewhat non-biased and personal take on why software projects typically end up at risk of failure, with particular attention on those that attempt upgrades in the world of open-source identity and access management.