cas-mock.services.cap-collectif.com Open in urlscan Pro
2606:4700::6811:45b  Public Scan

Submitted URL: https://cas-mock.services.cap-collectif.com/
Effective URL: https://cas-mock.services.cap-collectif.com/login/index.xhtml
Submission: On January 31 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

Name: composePOST /login/index.xhtml;jsessionid=F2C640B9BC3E45E613577F49A891F505

<form id="compose" name="compose" method="post" action="/login/index.xhtml;jsessionid=F2C640B9BC3E45E613577F49A891F505" class="form-horizontal" enctype="application/x-www-form-urlencoded">
  <input type="hidden" name="compose" value="compose">
  <div class="form-group"><label for="compose:username" class="col-md-4 control-label"> Username: </label>
    <div class="col-md-8"><input id="compose:username" type="text" name="compose:username" class="form-control">
    </div>
  </div>
  <div class="form-group"><label for="compose:password" class="col-md-4 control-label"> Password: </label>
    <div class="col-md-8"><input id="compose:password" type="password" name="compose:password" value="" class="form-control">
    </div>
  </div>
  <div class="form-group">
    <div class="col-md-8 col-md-push-4"><input type="submit" name="compose:j_idt30" value="Login" class="btn btn-primary">
      <input type="reset" class="btn btn-default" value="Clear">
    </div>
  </div><input type="hidden" name="compose:j_idt32"><input type="hidden" name="javax.faces.ViewState" id="j_id1:javax.faces.ViewState:0" value="1117350940568149607:2210564171831441895" autocomplete="off">
</form>

Text Content

Toggle navigation CAS Mock Server



LOG IN

This is a mock implementation of a CAS server. To authenticate successfully,
enter any username and a password identical to the username.

Username:

Password: