@@ -4,16 +4,24 @@ title: CAS - Remote Address Authentication
---
# Remote Address Authentication
This handler uses the request's remote address to transparently authenticate a user, having verified the address against a range of configured IP addresses. The mechanics of this approach are very similar to X.509 certificate authentication, but trust is instead placed on the client internal network address.
This handler uses the request's remote address to transparently authenticate a user, having verified
the address against a range of configured IP addresses. The mechanics of this approach are very similar
to X.509 certificate authentication, but trust is instead placed on the client internal network address.
The benefit of this approach is that transparent authentication is achieved within a large corporate network without the need to manage certificates.
The benefit of this approach is that transparent authentication is achieved within a large corporate
network without the need to manage certificates.
<divclass="alert alert-danger"><strong>Be Careful</strong><p>Keep in mind that this authentication mechanism should only be enabled for internal network clients with relatively static IP addresses.</p></div>
<divclass="alert alert-danger"><strong>Be Careful</strong><p>Keep in mind that this authentication
mechanism should only be enabled for internal network clients with relatively static IP addresses.</p></div>
## Caveats
This method of authentication assumes internal clients will be hitting the CAS server directly and not coming via a web proxy. In the event of the client using the web proxy the likelihood of the remote address lookup succeeding is reduced because to CAS the client address is that of the proxy server and not the client. Given that this form of CAS authentication would typically be deployed within an internal network this is generally not a problem.
This method of authentication assumes internal clients will be hitting the CAS server directly
and not coming via a web proxy. In the event of the client using the web proxy the likelihood
of the remote address lookup succeeding is reduced because to CAS the client address is that
of the proxy server and not the client. Given that this form of CAS authentication would typically
be deployed within an internal network this is generally not a problem.
## Authentication Components
...
...
@@ -34,17 +42,12 @@ Support is enabled by including the following dependency in the Maven WAR overla
</bean>
{% endhighlight %}
This authentication handler checks the inbound client IP address to see if it falls within the internal network. The `RemoteAddressAuthenticationHandler` bean has one property:
This authentication handler checks the inbound client IP address to see if it falls within the
internal network. The `RemoteAddressAuthenticationHandler` bean has one property:
-`ipNetworkRange` - This defines the internal network parameters in the form of a subnet and netmask. e.g. `192.168.1.0/255.255.255.0` or `10.0.0.0/255.255.0.0`.
-`ipNetworkRange` - This defines the internal network parameters in the form of a subnet and
netmask. e.g. `192.168.1.0/255.255.255.0` or `10.0.0.0/255.255.0.0`.
Also declare the following bean, which extracts the client's IP address from the request.