Amazon Cloud Directory Authentication
Amazon Cloud Directory is a highly available multi-tenant directory-based store in AWS. These directories scale automatically to hundreds of millions of objects as needed for applications. This lets operation’s staff focus on developing and deploying applications that drive the business, not managing directory infrastructure.
To learn more, please see this guide.
Configuration
Support is enabled by including the following dependency in the WAR overlay:
1
2
3
4
5
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-server-support-cloud-directory-authentication</artifactId>
<version>${cas.version}</version>
</dependency>
To see the relevant list of CAS properties, please review this guide.
AWS credentials are fetched from the following sources automatically, where relevant and made possible via CAS configuration:
- EC2 instance metadata linked to the IAM role.
- External properties file that contains
accessKey
andsecretKey
as property keys. - AWS profile path and profile name.
- System properties that include
aws.accessKeyId
,aws.secretKey
andaws.sessionToken
- Environment variables that include
AWS_ACCESS_KEY_ID
,AWS_SECRET_KEY
andAWS_SESSION_TOKEN
. - Properties file on the classpath as
awscredentials.properties
that containsaccessKey
andsecretKey
as property keys. - Static credentials for access key and secret provided directly by the configuration at hand (logging, etc).
Troubleshooting
To enable additional logging, configure the log4j configuration file to add the following levels:
```xml …
…