5. Customization

5. Customization

The process of deploying CAS into an enterprise environment is best considered customization since it involves configuration of various system components, branding and UI design, and integration work with existing software and systems.

5.1. Configuration Management

The Maven WAR Overlay process is strongly recommended for maintaining all CAS server customizations.

5.2. Authentication

The CAS server authentication configuration is the most obvious and important aspect of deployment.

5.3. Security Policy

CAS provides a number of configuration points to enforce various aspects of security policy including ticket/token expiration policy, authentication throttling, and cryptographic strength of identifiers.

5.4. General Features

CAS exposes configuration points for a variety of features including SSO session behavior.

5.5. High Availability Configuration

System configuration, CAS server configuration, and client configuration should be considered together when considering high availability deployments.

5.6. UI Design and Branding

The CAS user interface is easily customized using standard Web technologies such as CSS and HTML templates.

5.7. Service Management

The service management feature supports configuration of service authorization, attribute release, and SSO behavior for services that access the CAS server.