当前位置:网站首页>CAS single sign on
CAS single sign on
2022-07-26 14:45:00 【Xiang wants to】
Today, the leader assigned a task , Let me make a set of multiple systems CAS Single point , I frown , good heavens , Yes, but I haven't done it . I can't help clapping in my heart .
Fortunately ! I'm famous Ali sweeper Duolong My little fan .
After a general understanding of business needs , Asked the leader for a day to analyze and realize . Return to the station , Start scratching your head .

initial CAS
First let's talk about it CAS,CAS Its full name is Central Authentication Service Central certification service , Is an enterprise multilingual single sign on solution , And strive to become a comprehensive platform for authentication and authorization requirements .
CAS By Yale The University launched an enterprise class 、 Open source projects , For the purpose of Web Application system provides a reliable single sign on solution ( Belong to Web SSO ).
CAS The agreement involves at least three parties : client Web browser , Requesting authentication Web Applications and CAS The server . It could also involve back-end services , Such as database server , It doesn't have its own HTTP Interface , But with Web The application communicates .
This involves a name
Single sign onWhat is that
Single sign onWell ?In plain words , Is an account after login , You can access the resources corresponding to its account in other systems directly without login , To put it bluntly , Lazy people log in with one click .

stay SSO In the system , It mainly includes three parts :
User ( Multiple ) Web application ( Multiple ) SSO authentication center ( 1 individual )
and SSO The basic core principles are as follows :
All logins are in SSO Certification Center SSO The certification center tells Web Whether the current access user of the application is an authenticated user or not SSO Certification Center and all Web Applications build a trust relationship , SSO The authentication center's judgment on the correctness of the user's identity will be informed by some means Web application , And the judgment must be Web App trust .
advantage
Lower access number 3 The risk of our site (“ Federation ”), Because the user password is not stored or managed externally Reduce password fatigue caused by different user names and password combinations Reduce the time it takes to re-enter the password for the same identity Simpler Management . As part of normal maintenance ,SSO Related tasks are performed transparently using the same tools as other management tasks . Better administrative control . All network management information is stored in one repository . This means that each user's rights and privileges have a single 、 Authoritative list . This allows the administrator to change the user's permissions and know that the results will spread across the network . Improve the efficiency of users . Users are no longer bothered by multiple logins , You don't need to remember multiple passwords to access network resources . This is also good for help desk staff , They need to handle fewer forgotten password requests . Better network security . Eliminating multiple passwords can also reduce common sources of security vulnerabilities —— Users write down their passwords . Last , Due to the integration of network management information , The administrator can definitely know when he disables the user's account , This account is completely disabled . Integration of Heterogeneous Networks . By joining different networks , Can integrate management work , Ensure that management best practices and corporate security policies are always implemented .
SSO Share a centralized authenticator for authentication with all other applications and systems , And combine it with technology , To ensure that users do not have to actively enter their credentials many times .
CAS principle
Compared to single system login ,sso Need an independent certification center , Only the authentication center can accept the user's user name, password and other security information , Other systems do not provide login access , Only indirectly authorized by Certification Center . Indirect authorization through token ,sso The authentication center can verify the user name and password , Create authorization token , In the next jump , The authorization token is sent to each subsystem as a parameter , Subsystem gets token , I'm authorized , You can use this to create a local session , Local session login mode is the same as single system login mode . This process , That is, the principle of single sign on , Use the figure below to explain

Here is a brief description of the above figure
User access system 1 Protected resources for , System 1 Found user not logged in , Jump to sso authentication center , And take your own address as a parameter sso The authentication center found that the user was not logged in , Guide the user to the login page User enters user name and password to submit login application sso Authentication center verifies user information , Create users and sso Sessions between certification centers , Called a global session , Create authorization token at the same time sso The authentication center takes the token to jump to the original request address ( System 1) System 1 Get token , Go to sso The authentication center verifies whether the token is valid sso Authentication center verification token , Return valid , Registration system 1 System 1 Use this token to create a session with the user , Called local session , Return to protected resources User access system 2 Protected resources for System 2 Found user not logged in , Jump to sso authentication center , And take your own address as a parameter sso The authentication center found that the user has logged in , Jump back to system 2 The address of , And attach the token System 2 Get token , Go to sso The authentication center verifies whether the token is valid sso Authentication center verification token , Return valid , Registration system 2 System 2 Use this token to create a local session with the user , Return to protected resources
After the user logs in successfully , Will be with sso Authentication center and subsystem establish session , Users and sso The session established by the authentication center is called global session , The session established by the user and each subsystem is called local session , After local session establishment , User access to subsystem protected resources will no longer pass sso authentication center , Global session and local session have the following constraints
Local session exists , Global session must exist Global session exists , Local session does not necessarily exist Global session destroy , Local session must be destroyed
sso The authentication center has been monitoring the status of global sessions , Once the global session is destroyed , The listener will notify all registered systems to log off

Here is a brief description of the above figure
User to system 1 Initiate logout request System 1 According to users and system 1 Established session id Get token , towards sso Certification center initiates cancellation request sso The authentication center verifies that the token is valid , Destroy global session , At the same time, all system addresses registered with this token are taken out sso The certification center initiates the cancellation request to all registration systems Received by each registration system sso Cancellation request of Certification Center , Destroy local session sso Authentication center guides users to login page
Reference resources :
Principle and implementation of single sign on https://en.wikipedia.org/wiki/Single_sign-on#Common_configurations
Subsequently, we launched a series of environment construction and service terminals 、 The implementation of client
Finally, let's pay attention 
Focus on 『Xiang Want to 』 official account
边栏推荐
- [ostep] 04 virtualized CPU - process scheduling strategy
- How to do app upgrade test?
- 中部“第一城”,长沙“人才引力”从争先到领先
- Pdf translation, which translation company in Beijing is good
- Tips for unity transparent channel
- 【无标题】
- Devops system of "cloud native" kubesphere pluggable components
- .net6 encounter with the League of heroes - create a game assistant according to the official LCU API
- 『BaGet』带你一分钟搭建自己的私有NuGet服务器
- CAS based SSO single point client configuration
猜你喜欢

Realize the full link grayscale based on Apache APIs IX through MSE

JS wave animation effect menu style

Win11运行虚拟机死机了?Win11运行VMware虚拟机崩溃的解决方法

【使用工具条绘图】

4 kinds of round head arrangement styles overlay styles
![[solution of ordinary differential equation and drawing solution of small boat walking track]](/img/2d/3fd7e23fdbd0f343e740a5b93bf9d9.png)
[solution of ordinary differential equation and drawing solution of small boat walking track]

当AI邂逅生命健康,华为云为他们搭建三座桥

Unity learning notes – infinite map

CAS单点登录

Tips for unity transparent channel
随机推荐
Leetcode1170- compare the occurrence frequency of the minimum letter of the string (the corresponding occurrence frequency of each string minimum element in the map set storage array)
【文件上传漏洞-06】分布式配置文件攻击实验—以upload-labs-4为例
selenium 代码存放
Summary and analysis of image level weakly supervised image semantic segmentation
14. Bridge based active domain adaptation for aspect term extraction reading notes
RPN:Region Proposal Networks (区域候选网络)
Plato farm is expected to further expand its ecosystem through elephant swap
PyTorch中 nn.Conv2d与nn.ConvTranspose2d函数的用法
Mysql-03 database operation
Brief description of llcc68 broadcast wake-up
CAS单点登录
UE4 smart pointer and weak pointer
C# 常用功能整合
网络图片转本地导致内核退出
JS wave animation effect menu style
【愚公系列】2022年7月 Go教学课程 017-分支结构之IF
Use of URL download resources
VBA 上传图片
C # use shift > > and operation and & to judge whether the two binary numbers have changed
C common function integration