templates.fragments.palantir.protocolstab.html Maven / Gradle / Ivy
You can simulate CAS protocol validation responses for CAS-enabled client applications.
Registered Service
This is the registered service definition that matches the request. You can
navigate to it.
SAML2 Entity ID
Your entity ID is a globally-unique identifier for CAS acting as a SAML2 identity provider. This id is
usually a URL or a URI, although it doesn't have to point to an actual web resource.
Your SAML2 entity id must also match and be specified in your
SAML2 Identity Provider Metadata.
SAML2 Requests/Responses
You can simulate SAML2 responses for SAML2 service providers.
SAML2 Metadata Cache
You may also fetch, refresh or invalidate SAML2 metadata entries that are cached by CAS.
The service could be the registered service numeric identifier, its name or actual service id.
In case the SAML2 service definition points to an aggregate, you may also specify an entity id to locate the
SAML2 service provider within that aggregate. If you do not specify a service, all entries in
the SAML2 metadata cache will be invalidated.
You can simulate SAML1 responses for SAML1 service providers.
OpenID Connect Issuer
The Issuer in OpenID Connect is a unique identifier for CAS, typically in the form of a URL,
which provides id tokens, access tokens and more to OpenID Connect relying parties.
You can simulate OpenID connect responses to relying party applications and clients.
Key Rotation
You can instruct CAS to rotate or revoke keys in the OpenID Connect JSON web keystore (JWKS).
Discovery Profile
You can examine the discovery profile of CAS as an OpenID Connect Provider (OP).