当前位置:网站首页>The fuse: OAuth 2.0 four authorized login methods must read
The fuse: OAuth 2.0 four authorized login methods must read
2022-08-05 10:17:00 【InfoQ】
- About authorized login includes three terminals, resource owner (user), resource server (website storing user resources), pageThird-party website.
- OAuth is a layer used to separate users and third-party websites. After the user agrees, the resource server can issue tokens to the third-party websites, and the firstThe third-party website can access the information of the resource server corresponding to the user through this token.
Four ways of OAuth2.0 authorization
Premise: No matter which way, the third-party website needs to register with the resource server in advanceIdentity, get the corresponding appid and secret, in order to prevent the token from being used indiscriminately.
authorization-code
- First, the third-party website carries the appid, secrect and redirect_url to the resource server to get the QR code for login
- Pass the confirmation notification to the resource server after the user scans the code
- The resource server returns according to the redirect_url in the first stepauthorization-codeand the login success status
- After the third party obtains the authorization-code, it will bring its own previously registered appid, secrect and authorization-code to the resource server to obtain the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then it can wake up the follow-up operation.
Hidden (implicit)
- The third-party website carries the appid, secrect and redirect_url to the resource server to obtain the login QR code
- After the user scans the code, the confirmation notification is sent to the resource server
- The resource server follows the firstThe redirect_url of the step returnstokenand the successful login status
- and then the third-party website according to the tokenGo to the resource server to get the user information and you can do the follow-up operations
password
- ported by the third-party websiteUsername and password go to the resource server to get the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then follow-up operations can be done
client credentials (client credentials)
- Get the token from the resource server by carrying the appid and secrect on the command line
- Then the command line goes to the resource server to obtain user information according to the token, and then the follow-up operations can be done
Summary
边栏推荐
- 告白数字化转型时代:麦聪软件以最简单的方式让企业把数据用起来
- 数分面试(一)----与业务相关
- 你最隐秘的性格在哪?
- 七夕浪漫约会不加班,RPA机器人帮你搞定工作
- egg框架使用(二)
- Confessing in the era of digital transformation: Mai Cong Software allows enterprises to use data in the easiest way
- 5. Deploy the web project to the cloud server
- 【Unity】【UGUI】【在屏幕上显示文本】
- three物体围绕一周呈球形排列
- STM32+ULN2003 drives 28BYJ4 stepper motor (forward and reverse according to the number of turns)
猜你喜欢
随机推荐
Imitation SBUS fixed with serial data conversion
2022 Huashu Cup Mathematical Modeling Ideas Analysis and Exchange
【翻译】混沌网+SkyWalking:为混沌工程提供更好的可观察性
mysql索引
产品太多了,如何实现一次登录多产品互通?
浅析WSGI协议
第五章:redis持久化,包括rdb和aof两种方式[通俗易懂]
2022华数杯数学建模A题环形振荡器的优化设计思路思路代码分享
High-quality DeFi application building guide to help developers enjoy DeFi Summer
NowCoderTOP35-40——持续更新ing
STM32+ULN2003驱动28BYJ4步进电机(根据圈数正转、反转)
第八章:activiti多用户任务分配
Bias lock/light lock/heavy lock lock is healthier. How is locking and unlocking accomplished?
The century-old Nordic luxury home appliance brand ASKO smart wine cabinet in the three-temperature area presents the Chinese Valentine’s Day, and tastes the love of the delicacy
PHP operation mangoDb
Huawei's lightweight neural network architecture GhostNet has been upgraded again, and G-GhostNet (IJCV22) has shown its talents on the GPU
C语言的高级用法
LeetCode 216. Combined Sum III (2022.08.04)
入门 Polkadot 平行链开发,看这一篇就够了
SMB + SMB2: Accessing shares return an error after prolonged idle period