当前位置:网站首页>The fuse: OAuth 2.0 four authorized login methods must read
The fuse: OAuth 2.0 four authorized login methods must read
2022-08-05 10:17:00 【InfoQ】
- About authorized login includes three terminals, resource owner (user), resource server (website storing user resources), pageThird-party website.
- OAuth is a layer used to separate users and third-party websites. After the user agrees, the resource server can issue tokens to the third-party websites, and the firstThe third-party website can access the information of the resource server corresponding to the user through this token.
Four ways of OAuth2.0 authorization
Premise: No matter which way, the third-party website needs to register with the resource server in advanceIdentity, get the corresponding appid and secret, in order to prevent the token from being used indiscriminately.authorization-code
- First, the third-party website carries the appid, secrect and redirect_url to the resource server to get the QR code for login
- Pass the confirmation notification to the resource server after the user scans the code
- The resource server returns according to the redirect_url in the first stepauthorization-codeand the login success status
- After the third party obtains the authorization-code, it will bring its own previously registered appid, secrect and authorization-code to the resource server to obtain the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then it can wake up the follow-up operation.
Hidden (implicit)
- The third-party website carries the appid, secrect and redirect_url to the resource server to obtain the login QR code
- After the user scans the code, the confirmation notification is sent to the resource server
- The resource server follows the firstThe redirect_url of the step returnstokenand the successful login status
- and then the third-party website according to the tokenGo to the resource server to get the user information and you can do the follow-up operations
password
- ported by the third-party websiteUsername and password go to the resource server to get the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then follow-up operations can be done
client credentials (client credentials)
- Get the token from the resource server by carrying the appid and secrect on the command line
- Then the command line goes to the resource server to obtain user information according to the token, and then the follow-up operations can be done
Summary
边栏推荐
- 用户考试分数大于单科科目平均分的查询
- 【MindSpore Easy-Diantong Robot-01】You may have seen many knowledge quiz robots, but this one is a bit different
- 牛刀小试基本语法,Go lang1.18入门精炼教程,由白丁入鸿儒,go lang基本语法和变量的使用EP02
- three.js调试工具dat.gui使用
- Getting started with Polkadot parachain development, this article is enough
- 第五章:多线程通信—wait和notify
- SMB + SMB2: Accessing shares return an error after prolonged idle period
- Keil升级到AC6后,到底有哪些变化?
- 5. Deploy the web project to the cloud server
- The difference between find, matches, lookingAt matching strings in matcher
猜你喜欢

单片机:温度控制DS18B20

Egg framework usage (2)

three objects are arranged in a spherical shape around the circumference

哪位大佬有20年4月或者1月的11G GI和ojvm补丁呀,帮忙发下?

Open Source Summer | How OpenHarmony Query Device Type (eTS)

egg框架使用(一)

Technical dry goods | Hausdorff distance for image segmentation based on MindSpore

FPGA:开发环境Vivado的使用

阿里全新推出:微服务突击手册,把所有操作都写出来了PDF

2022 Huashu Cup Mathematical Modeling Question A Optimization Design Ideas for Ring Oscillators Code Sharing
随机推荐
Oracle temporary table space role
【MindSpore易点通机器人-01】你也许见过很多知识问答机器人,但这个有点不一样
Development common manual link sharing
创建一个 Dapp,为什么要选择波卡?
js hijacks the array push method
高质量 DeFi 应用构建指南,助力开发者玩转 DeFi Summer
static linking and dynamic linking
three objects are arranged in a spherical shape around the circumference
第八章:activiti多用户任务分配
Huawei's lightweight neural network architecture GhostNet has been upgraded again, and G-GhostNet (IJCV22) has shown its talents on the GPU
C语言的高级用法
Complete image segmentation efficiently based on MindSpore and realize Dice!
第三章 : redis数据结构种类
用户考试分数大于单科科目平均分的查询
Still looking for a network backup resources?Hurry up to collect the following network backup resource search artifact it is worth collecting!
Brief Analysis of WSGI Protocol
Meteorological data processing example - matlab string cutting matching and R language date matching (data splicing)
MySQL advanced (twenty-seven) database index principle
E-sports, convenience, efficiency, security, key words for OriginOS functions
【综合类型第 35 篇】程序员的七夕浪漫时刻