The CAS project transfers the โticketโ from the sign on the server to the consuming application as the url request parameter, the consumer application then returns the request back to the sign on the server for ticket validation. This negates the need for cookies and therefore works across domains, however it's a bit โchattyโ
Another, perhaps more reliable, solution is to use a SAML-based product, which is the industry standard for single sign-on to a single domain. There are a couple of open source products that use SAML, and CAS itself has the SAML extension, but they are usually quite complicated to configure. Cloudseal is also SAML-based and much easier to use. The Cloudsal platform itself is delivered as a managed service, but all client libraries are open source
Of course, with all these solutions, you simply transfer the security context from one server to another, the consumer application will no doubt create its own local session, so you will need to use URL rewriting instead of cookies
Disclaimer: I work for Cloudsal :)
source share