当前位置:网站首页>The fuse: OAuth 2.0 four authorized login methods must read
The fuse: OAuth 2.0 four authorized login methods must read
2022-08-05 10:17:00 【InfoQ】
- About authorized login includes three terminals, resource owner (user), resource server (website storing user resources), pageThird-party website.
- OAuth is a layer used to separate users and third-party websites. After the user agrees, the resource server can issue tokens to the third-party websites, and the firstThe third-party website can access the information of the resource server corresponding to the user through this token.
Four ways of OAuth2.0 authorization
Premise: No matter which way, the third-party website needs to register with the resource server in advanceIdentity, get the corresponding appid and secret, in order to prevent the token from being used indiscriminately.authorization-code
- First, the third-party website carries the appid, secrect and redirect_url to the resource server to get the QR code for login
- Pass the confirmation notification to the resource server after the user scans the code
- The resource server returns according to the redirect_url in the first stepauthorization-codeand the login success status
- After the third party obtains the authorization-code, it will bring its own previously registered appid, secrect and authorization-code to the resource server to obtain the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then it can wake up the follow-up operation.
Hidden (implicit)
- The third-party website carries the appid, secrect and redirect_url to the resource server to obtain the login QR code
- After the user scans the code, the confirmation notification is sent to the resource server
- The resource server follows the firstThe redirect_url of the step returnstokenand the successful login status
- and then the third-party website according to the tokenGo to the resource server to get the user information and you can do the follow-up operations
password
- ported by the third-party websiteUsername and password go to the resource server to get the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then follow-up operations can be done
client credentials (client credentials)
- Get the token from the resource server by carrying the appid and secrect on the command line
- Then the command line goes to the resource server to obtain user information according to the token, and then the follow-up operations can be done
Summary
边栏推荐
猜你喜欢
随机推荐
蚁剑webshell动态加密连接分析与实践
The JVM collection that Alibaba's top architects have summarized for many years, where can't I check it!
Oracle temporary table space role
多线程(进阶) - 2.5w字总结
FPGA:基础入门按键控制LED灯
[Unity] [UGUI] [Display text on the screen]
SD NAND Flash简介!
第八章:activiti多用户任务分配
leetcode: 529. 扫雷游戏
Where is your most secretive personality?
百年北欧奢华家电品牌ASKO智能三温区酒柜臻献七夕,共品珍馐爱意
仿SBUS与串口数据固定转换
第四章:redis 数组结构的set和一些通用命令「建议收藏」
【MindSpore易点通机器人-01】你也许见过很多知识问答机器人,但这个有点不一样
STM32+ULN2003驱动28BYJ4步进电机(根据圈数正转、反转)
The difference between find, matches, lookingAt matching strings in matcher
高质量 DeFi 应用构建指南,助力开发者玩转 DeFi Summer
mysql索引
攻防世界-PWN-new_easypwn
Analysis and practice of antjian webshell dynamic encrypted connection






![[强网杯2022]WP-UM](/img/3d/caeab05ddca278af274dbf6e2f8ba1.png)


