Download the PHP package jacekkow/uphpcas without Composer
On this page you can find all versions of the php package jacekkow/uphpcas. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download jacekkow/uphpcas
More information about jacekkow/uphpcas
Files in jacekkow/uphpcas
Package uphpcas
Short Description Simple PHP library for CAS authentication
License BSD-3-Clause
Homepage https://github.com/jacekkow/uphpcas
Informations about the package uphpcas
uphpCAS
Simple PHP library for CAS authentication
Introduction
This library intends to be a replacement for overly complex phpCAS library.
It only supports basic CAS protocol, without proxying capabilities, which is enough for website authentication.
Usage
Composer
-
Add jacekkow/uphpcas dependency:
-
Include autoloader in your application:
- See the usage examples below
Raw usage
- Download uphpCAS.php
-
Include it in your application:
- See the usage examples below
Examples
Require authentication
To require authentication to access the page:
Login and logout pages
index.php:
login.php:
logout.php:
Common issues
Invalid redirection from CAS server
By default uphpCAS tries to guess correct URL to pass to CAS server as a "service" parameter using values from $_SERVER superglobal (see getCurrentUrl() method). This URL is used by CAS server to redirect user back to the application after successful CAS login.
If this guess is incorrect, eg. when the server is behind proxy, you can override it using setServiceUrl() method:
or second argument of the constructor:
HTTP POST issues
The standard method of passing "ticket" from CAS server to application is by HTTP GET method. To avoid having additional "ticket" parameter in the URL on single-page apps, which can expire and cause uphpCAS to throw exception, this library uses POST method by default.
You can change the method back to HTTP GET with setMethod():
CAS over HTTPS
This library enforces CAS certificate validation. The hostname of the CAS server must match the one in provided SSL certificate. Also the certificate must be signed by CA included in CA store (or self-signed - then the certificate itself must be included). By default it looks for CA store at:
- /etc/ssl/certs/ca-certificates.crt
- /etc/ssl/certs/ca-bundle.crt
- /etc/pki/tls/certs/ca-bundle.crt
You can change path to CA store file using setCaFile() method: