We'll create fresh WordPress site with Cassava CAS Server installed. You have 20 minutes to test the plugin after that site we'll be deleted.
Cassava allows WordPress to act as a single sign-on authenticator using the Central Authentication Service (CAS) protocol.
That way, users on your WordPress install may be able to access different applications that support the CAS protocol by providing a single set of credentials and without exposing the user’s password.
By default, CAS method URIs are provided under the wp-cas
endpoint:
/wp-cas/login
: Allows a remote service to request that a user authenticate on the CAS server. Will redirect back to the remote service along with a service ticket./wp-cas/logout
: Terminates the single sign-on session. May optionally redirect the user back to the remote service./wp-cas/validate
[CAS 1.0]: Allows a remote service to validate a service ticket forwarded by the user on redirect. Returns a plaintext response./wp-cas/proxy
[CAS 2.0]: Provides access to remote services with proxy tickets in exchange for proxy-granting tickets. Returns an XML response./wp-cas/proxyValidate
[CAS 2.0]: Allows a remote service to validate a service or proxy ticket forwarded by the user on redirect. Returns an XML response./wp-cas/serviceValidate
[CAS 2.0]: Allows a remote service to validate a service ticket forwarded by the user on redirect. Returns an XML response./wp-cas/p3/proxyValidate
[CAS 3.0]: Allows a remote service to validate a service or proxy ticket forwarded by the user on redirect. Returns an XML response./wp-cas/p3/serviceValidate
[CAS 3.0]: Allows a remote service to validate a service ticket forwarded by the user on redirect. Returns an XML response.There are a few client integration libraries available for CAS, as well as a handy guide for CASifying several existing applications. Independent WordPress installations may integrate with Cassava using a client plugin such as CAS Maestro.
Please follow and contribute to Cassava’s development on Github.
Fires before a CAS request is processed.
Parameters:
$path
: Requested URI path.Fires after a CAS request is processed.
Parameters:
$path
: Requested URI path.Fires if the CAS server has to return an XML error.
Parameters:
$error
: WordPress error to return as XML.Fires on successful ticket validation.
Parameters:
$user
: WordPress user validated by ticket.$ticket
: Valid ticket string.Allows developers to disable CAS.
Parameters:
$cas_enabled
: Whether the server should respond to single sign-on requests.Allows developers to override the default controller mapping, define additional endpoints and provide alternative implementations to the provided controllers.
Controllers provided in this fashion should extend the \Cassava\CAS\Controller\BaseController
class.
Parameters:
$cas_routes
: CAS endpoint to controller mapping.Lets developers change the CAS server response string.
Parameters:
$output
: Response output string.$path
: Requested URI path.Filters the callback arguments to be dispatched for the request. Plugin developers may return a WP_Error
object here to abort the request.
Parameters:
$args
: Arguments to pass the callback.$callback
: Callback function or method.$path
: Requested URI path.Allows developers to change the request parameters passed to a /login
request.
Parameters:
$args
: HTTP request (GET, POST) parameters.Filters the redirect URI for the service requesting user authentication.
Parameters:
$service
: Service URI requesting user authentication.$user
: Logged in WordPress user.Allows developers to redirect the user to a custom login form.
Parameters:
$custom_login_url
: URI for the custom login page.$args
: Login request parameters.This filter allows developers to override the default ticket expiration period.
Parameters:
$expiration
: Ticket expiration period (in seconds).$type
: Type of ticket to set.$user
: Authenticated user associated with the ticket.Allows developers to change the list of (key, value) pairs before they’re included in a /serviceValidate
response.
Parameters:
$attributes
: List of attributes to output.$user
: Authenticated user.Allows developers to change the list of user attributes that appear in the dashboard for an administrator to set to return on successful validation requests.
Options are stored in an associative array, with user attribute slugs as array keys and option labels as array values.
These settings are valid only for CAS 2.0 validation requests.
Parameters:
$attributeOptions
Attribute options an administrator can set on the dashboard.