Skip to main content

Flask-based CAS Server using SAML authentication

Project description

CAS Server for Flask using SAML IDP

Introduction

FlaskCasSaml is Central Authentication Service (CAS) server that uses a SAML2 server perform the IDP authentication. FlaskCasSamle is a Python application utilizing the Flask web framework

This allows legacy CAS applications to utilize contemporary Identity Management platform that support SAML2 authentication. The difference between any other CAS server and the bridge is that the authentication dialog is handled by the SAML IdP.

The protocol flow thus combines both CAS and SAML:

  • Client accesses a legacy CAS app, invoking a login.
  • The app redirects the user to /cas/login on the FlaskCasSaml server
  • If the client has not already authenticated with the bridge (i.e. has no Ticket Granting Ticket cookie), it is redirected to the SAML IdP login URL for authentication.
  • The SAML IdP validates the user via dialog or SSO.
  • The SAML Response is posted back (through the client) to the SAML assertion control service on the FlasCasSaml
  • The signature on the SAML response is verified and the SAML assertions are saved in a session for the client.
  • The client is then redirected back to the FlasCasSaml /cas/login
  • The bridge returns a CAS Ticket Granting Ticket (TGT) as a cookie, and a Session Ticket back to the client with a redirect back to the legacy CAS application.
  • The CAS application service validates the service ticket with the FlasCasSaml version specific cas endpoint.
  • Depending on the CAS version configured and the API used the bridge returns the attributes for the user to the application.
  • The client is then authenticated with the CAS application.

CAS Support

FlasCasSaml supports the CAS Protocol v1, v2, and v3 as defined by V2 of the CAS Specification with a few options not implemented.
These unemplemented features are lesser used items that did not fit within the SSO experience:

  • gateway - section 2.1.1 #3 - the specification is unclear on the implementation, and the value of the feature I felt was suspect.
  • logon credential receptor - section 2.2 - I don't belive this can be implemented with a SAML IdP.
  • /cas/validate (the version 1 endpoint) returns the user login on a successful validation. Though not part of the CAS spec almost all CAS servers do this.

FlasCasSaml has been tested against Microsoft Azure AD and PHP SimpleSaml IdPs. If you use this with other IdPs I'd like to hear your experience.

Installation

It's recommended that you install BottleCasBridge in a venv. Some familiarity with Python apps is desirable.

# pip install FlaskCasSaml

This will install Flask, Flask-Session, FlaskSamlSP, and their dependencies.

There is a sample application sample_flask_cas_server.py and an example config_sample.py (for building your config.py) included with the distribution or available on github.

The basic structure of the CAS bridge is simple:

from flask import Flask
from flask_session import Session
from FlaskSaml import FlaskSP
from FlaskCasSaml import CasBridge

from config import saml_config, session_config, cas_config

app = Flask(__name__)
app.config.from_mapping(session_config)
Session(app)

saml = FlaskSP(saml_config=saml_config,app=app)
cas = CasBridge(app, saml,config=cas_config)

The real work is in configuring the config.py components and the IdP to all work together.

Session and Ticket Configuration

FlaskCasSaml uses Flask-Session (which in turn uses Pallets cachelib) to provide flexible configuration for both user sessions and ticket storage. This can include memory or filebased caching as well as Redis or memcached mechanism.

Details on configuring the cache is Flask-Session documentation with more current details in the Pallets project cachelib documentation.

The simplist deployment suitable for testing is a memory based cache not requiring detailed options, however in a production deployment you will want to consider FileSystem, Memcached, or Redis as the cache backing.

SAML Configuration

You will need to configure the SamlSP module with details on the SAML IdP.

Some notes on SAML with FlaskCasSaml:

  • Uses the Flask Saml service provider implementation
  • Does not sign SAML Requests, though it verifies the SAML signature on the SAML Response.
  • Considers assertions received valid for 3600 Seconds from authentication regardless of CONDITIONS statements. (This is based on limitations of the minisaml implementation used.)
  • Assertions are available in the v2/v3 CAS validation data.

Configue for your SAML IdP according to the documentation for CasSamlSP This will include endpoints, entity id's, etc.

Configuring CAS

CasBridge(app, auth=saml, config=cas_config, backing=None)
  • By default session backing is provided by the caching mechanism used by Flask-Session for maintaining session state. You can however set backing= to a cacheLib instance; this will keep CAS tickets in another backing store (e.g. Redis or Memcached)

Cas config options

parameter type default description
cas_st_life Seconds 300 Service Ticket TTL
cas_tgt_life Seconds 86060 Ticket Granting Ticket life
cas_pgt_life Seconds 46060 Proxy Granting Ticket life
cas_service_filename string None Path to services file
cas_proxys_filename string None Path to proxys file
cas_proxy_support book True Enable CAS proxy endpoint support
cas_config = {
    "cas_st_life" : 500,
    "cas_tgt_life" : 28800, 
    "cas_services_filename" : "/configs/cas_services.json",
    "cas_proxy_support" : True
}

cas_service_file and cas_proxy_file files

These are files with a JSON list of service/targetService) URL's from CAS applications that are permitted to use the CAS bridage. In the case of the cas_proxy_file these are acceptable pgtUrl for proxy validations.

URLs are checked with forced lower case matching. The URL from the request service parameter must start with one of the URLs in the list.

['https://example.com/app1', 'https://other.example.com/']

If cas_service_file or cas_proxy_files are not specified, CasBridge works as an open CAS server (unadvised) meaning any CAS app can use the bridge to authenticate (or proxy.)

Considerations for Production

  • The default Bottle WSGI server is designed for development and maybe test, and is not suitable for production.
  • The default memory-base Flask-Session (null) cache will not work in a multi-process environment. You can use FileSystem for a single-node solution, but will require memcached or Redis for multi-node solutions.
  • Use TLS.
  • If you do not have apps that require it, disable the proxy endpoints (cas_proxy_support=False).
  • Restrict what services can use the bridge with the cas_service_file and cas_proxy_file settings.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

FlaskCasSaml-22.3.3.tar.gz (20.0 kB view details)

Uploaded Source

Built Distribution

FlaskCasSaml-22.3.3-py3-none-any.whl (22.1 kB view details)

Uploaded Python 3

File details

Details for the file FlaskCasSaml-22.3.3.tar.gz.

File metadata

  • Download URL: FlaskCasSaml-22.3.3.tar.gz
  • Upload date:
  • Size: 20.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.6.3 pkginfo/1.8.2 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6

File hashes

Hashes for FlaskCasSaml-22.3.3.tar.gz
Algorithm Hash digest
SHA256 82d20b0d5d8938afaf9fdc2e15bb3cd8dc7422a3520ab3d763248f80267294a8
MD5 abed18840c02f5d9fd2a65dbafb55d09
BLAKE2b-256 a99f92189244c2e47f47d0a079198d555fe4755932df86fe18fe5b249992f832

See more details on using hashes here.

File details

Details for the file FlaskCasSaml-22.3.3-py3-none-any.whl.

File metadata

  • Download URL: FlaskCasSaml-22.3.3-py3-none-any.whl
  • Upload date:
  • Size: 22.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.6.3 pkginfo/1.8.2 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6

File hashes

Hashes for FlaskCasSaml-22.3.3-py3-none-any.whl
Algorithm Hash digest
SHA256 7e073e671abe5edc41b047326df02e520ddeffa548dbf0b6871ab394f63191a7
MD5 9abe8939c804e98cb9024788dae93e99
BLAKE2b-256 49e72180220bb9be89bffc694c697331d50509130cfedff81736302076b05d4d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page