diff --git a/docs/manual/src/docbook/cas-auth-provider.xml b/docs/manual/src/docbook/cas-auth-provider.xml index e4e197dabd..f59dcfacae 100644 --- a/docs/manual/src/docbook/cas-auth-provider.xml +++ b/docs/manual/src/docbook/cas-auth-provider.xml @@ -17,13 +17,13 @@ How CAS Works Whilst the CAS web site contains documents that detail the architecture of CAS, we present - the general overview again here within the context of Spring Security. Spring Security 2.0 - supports CAS 3. At the time of writing, the CAS server was at version 3.2. + the general overview again here within the context of Spring Security. Spring Security 3.0 + supports CAS 3. At the time of writing, the CAS server was at version 3.3. Somewhere in your enterprise you will need to setup a CAS server. The CAS server is simply a standard WAR file, so there isn't anything difficult about setting up your server. Inside the WAR file you will customise the login and other single sign on pages displayed to users. - When deploying a CAS 3.2 server, you will also need to specify an + When deploying a CAS 3.3 server, you will also need to specify an AuthenticationHandler in the deployerConfigContext.xml included with CAS. The AuthenticationHandler has a simple method that returns a boolean as to @@ -251,8 +251,8 @@ The web application side of CAS is made easy due to Spring Security. It is assumed you already know the basics of using Spring Security, so these are not covered again below. We'll assume a namespace based configuration is being used and add in the CAS beans as required. - You will need to add a ServiceProperties bean to your application - context. This represents your service: + You will need to add a ServiceProperties bean to your application + context. This represents your CAS service: - ... - - - + ... @@ -285,8 +281,6 @@ - - ]]> - The CasAuthenticationEntryPoint should be selected to drive authentication using entry-point-ref. - The CasAuthenticationFilter has very similar properties to the - UsernamePasswordAuthenticationFilter (used for form-based logins). Each - property is self-explanatory. Note that we've also used the namespace syntax for setting up an - alias to the authentication manager, since the CasAuthenticationFilter - needs a reference to it. + The CasAuthenticationFilter has very similar properties to the + UsernamePasswordAuthenticationFilter (used for form-based logins). + For CAS to operate, the ExceptionTranslationFilter must have its authenticationEntryPoint property set to the - CasAuthenticationEntryPoint bean. - The CasAuthenticationEntryPoint must refer to the - ServiceProperties bean (discussed above), which provides the URL to the + CasAuthenticationEntryPoint bean. + The CasAuthenticationEntryPoint must refer to the + ServiceProperties bean (discussed above), which provides the URL to the enterprise's CAS login server. This is where the user's browser will be redirected. Next you need to add a CasAuthenticationProvider and its collaborators: + + + -