当前位置:网站首页>Implementation of single sign on
Implementation of single sign on
2022-06-28 08:55:00 【Talent】
be based on cookie:
Use Cookie As a medium , Store user credentials , After the user logs in, an encrypted cookie When accessing sub applications , Take this cookie, Authorized application decryption cookie, Log in to this application after the verification is passed . however cookie Single sign on is not secure and cross domain login is not possible .
Distributed session Realization :
When a user registers, the user's information is stored as a set of key value pairs in session Back to one sessionid To the client , When the user logs in again, compare the currently logged in user id Whether or not session Medium id Do the same and then match , If the verification is successful, the information will be stored in cookie in , If the verification fails, return to the login page to log in again .
SSO( Single sign on Technology ):
You only need to log in once to access other mutually trusted reference systems in multiple application systems .
Under the same domain (session Pattern ): The user logs in for the first time , After logging in, the user information will be stored in session in , then session Store yourself in cookie in , Wait until the user logs in for the second time , Background verification session Whether there is user information in .
Cross domain (CAS Pattern ):1、 The first time a user visits the site , from CAS Client Redirect to after processing CAS server, Did you find any cookie Then redirect to CAS server Login page for , meanwhile URL Carry the address of the website in , It is convenient to perform a jump after the authentication is successful ;2、 After the user logs in successfully, a ticket is generated according to the user name and user password TGT(Ticket Granting ticket) Stored on the server , Reuse TGT Generate a one-time verification ticket ST(Service Ticket) as well as TGC(Ticket Granting Cookie) It is used to store user information and is controlled by server Send to Client End , Finally back to ST and Cookie Go to browser ;3、 The browser carries ST Visit the address you want to visit ;4、 Browser received ST Later CAS server To verify , After verification, you will be redirected to the beginning URL And display the page information , This is the end of the first login ;5、 Then log in to another account with CAS Website , Again by CAS Client Redirect to CAS Server Verification in , But at this time there is TGC You don't have to log in again , then CAS server To create a ST Then redirect to the page you need to visit ;7、 Received by the browser ST Go to CAS Server Do verification in , If the verification is successful, the page information will be displayed
notes :CAS in CAS Client Be responsible for handling the client's request for access to protected resources , Redirect to when you need to log in again CAS server;CAS server Independent deployment is required. It is mainly responsible for user authentication .
Single sign on cross domain implementation :
use first Spring-session take session Stored in redis in , Each subsystem can access session; Implement that all systems in the cross domain use one session, It's in every cookie Set the same in cookie```
边栏推荐
- 如何实现基于 RADIUS 协议的双因子认证 MFA?
- Key points of building fire protection design
- Implementation of code scanning login
- Love analysis released the 2022 love analysis · it operation and maintenance manufacturer panorama report, and an Chao cloud was strongly selected!
- Where is CentOS mysql5.5 configuration file
- Discussion on the improvement and application of the prepayment system in the management of electricity charge and price
- 如何抑制SiC MOSFET Crosstalk(串扰)?
- Superimposed ladder diagram and line diagram and merged line diagram and needle diagram
- Implement global double finger long press to return to the desktop
- 我想网上注册股票开户,如何操作?在线开户安全么?
猜你喜欢

JMeter -- interface test 1

What is the bandwidth of the Tiktok server that can be used by hundreds of millions of people at the same time?
![[cloud native | kubernetes] in depth understanding of pod (VI)](/img/ae/f16f5c090251ab603b88ddadff7eb3.png)
[cloud native | kubernetes] in depth understanding of pod (VI)

Chrome devtools

Assertions used in the interface automation platform

TCP

【.NET6】gRPC服务端和客户端开发案例,以及minimal API服务、gRPC服务和传统webapi服务的访问效率大对决

Characteristics and prevention of electrical fire

Infinite penetration test

Apiccloud, together with 360 Tianyu, helps enterprises keep the "first pass" of APP security
随机推荐
High rise building fire prevention
TCP
Matlab tips (20) matrix analysis -- principal component regression
华泰证券网上开户安全吗 办理流程是什么
Cloudcompare & PCL point cloud clipping (based on closed surfaces or polygons)
Lilda low code data large screen, leveling the threshold of data application development
DEJA_ Vu3d - 052 of cesium feature set - Simulation of satellite orbit (high altitude) effect
MATLAB小技巧(20)矩阵分析--主成分回归
Implement global double finger long press to return to the desktop
Loggerfactory uses log4j Parameter introduction of properties
【无标题】
批量修改表和表中字段排序规则
How to suppress SiC MOSFET crosstalk?
CloudCompare&PCL 点云SVD分解
Power data
Rich text - Test Case
How do people over 40 allocate annuity insurance? Which product is more suitable?
[go ~ 0 to 1] on the first day, June 24, variables, conditional judgment cycle statement
Guangzhou: new financial activities and new opportunities for enterprises
Comment supprimer le crosstalk SiC MOSFET?