5. Customization
5. Customization
The process of deploying CAS into an enterprise environment is best considered customization since it involves configuration of various system components, branding and UI design, and integration work with existing software and systems.
5.1. Configuration Management
The Maven WAR Overlay process is strongly recommended for maintaining all CAS server customizations.
5.2. Authentication
The CAS server authentication configuration is the most obvious and important aspect of deployment.
5.3. Security Policy
CAS provides a number of configuration points to enforce various aspects of security policy including ticket/token expiration policy, authentication throttling, and cryptographic strength of identifiers.
5.4. General Features
CAS exposes configuration points for a variety of features including SSO session behavior.
5.5. High Availability Configuration
System configuration, CAS server configuration, and client configuration should be considered together when considering high availability deployments.
5.6. UI Design and Branding
The CAS user interface is easily customized using standard Web technologies such as CSS and HTML templates.
5.7. Service Management
The service management feature supports configuration of service authorization, attribute release, and SSO behavior for services that access the CAS server.