Implementations that decide whether proxy lists of CAS authentications are trusted.