当前位置:网站首页>The fuse: OAuth 2.0 four authorized login methods must read
The fuse: OAuth 2.0 four authorized login methods must read
2022-08-05 10:17:00 【InfoQ】
- About authorized login includes three terminals, resource owner (user), resource server (website storing user resources), pageThird-party website.
- OAuth is a layer used to separate users and third-party websites. After the user agrees, the resource server can issue tokens to the third-party websites, and the firstThe third-party website can access the information of the resource server corresponding to the user through this token.
Four ways of OAuth2.0 authorization
Premise: No matter which way, the third-party website needs to register with the resource server in advanceIdentity, get the corresponding appid and secret, in order to prevent the token from being used indiscriminately.authorization-code
- First, the third-party website carries the appid, secrect and redirect_url to the resource server to get the QR code for login
- Pass the confirmation notification to the resource server after the user scans the code
- The resource server returns according to the redirect_url in the first stepauthorization-codeand the login success status
- After the third party obtains the authorization-code, it will bring its own previously registered appid, secrect and authorization-code to the resource server to obtain the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then it can wake up the follow-up operation.
Hidden (implicit)
- The third-party website carries the appid, secrect and redirect_url to the resource server to obtain the login QR code
- After the user scans the code, the confirmation notification is sent to the resource server
- The resource server follows the firstThe redirect_url of the step returnstokenand the successful login status
- and then the third-party website according to the tokenGo to the resource server to get the user information and you can do the follow-up operations
password
- ported by the third-party websiteUsername and password go to the resource server to get the token
- Then the third-party website can go to the resource server to obtain the user information according to the token, and then follow-up operations can be done
client credentials (client credentials)
- Get the token from the resource server by carrying the appid and secrect on the command line
- Then the command line goes to the resource server to obtain user information according to the token, and then the follow-up operations can be done
Summary
边栏推荐
- MySQL advanced (twenty-seven) database index principle
- Our Web3 Entrepreneurship Project, Yellow
- MySQL data view
- E-sports, convenience, efficiency, security, key words for OriginOS functions
- After Keil upgrades to AC6, what changes?
- Which big guy has the 11G GI and ojvm patches in April or January 2020, please help?
- 第八章:activiti多用户任务分配
- 静态链接和动态链接
- 【MindSpore Easy-Diantong Robot-01】You may have seen many knowledge quiz robots, but this one is a bit different
- js劫持数组push方法
猜你喜欢

three.js debugging tool dat.gui use

这份阿里强推的并发编程知识点笔记,将是你拿大厂offer的突破口

Jenkins manual (2) - software configuration

Ali's new launch: Microservices Assault Manual, all operations are written out in PDF

蚁剑webshell动态加密连接分析与实践

mysql索引
![[强网杯2022]WP-UM](/img/3d/caeab05ddca278af274dbf6e2f8ba1.png)
[强网杯2022]WP-UM

Huawei's lightweight neural network architecture GhostNet has been upgraded again, and G-GhostNet (IJCV22) has shown its talents on the GPU

2022 Huashu Cup Mathematical Modeling Question A Optimization Design Ideas for Ring Oscillators Code Sharing

Oracle temporary table space role
随机推荐
电气工程的标准是什么
2022 Huashu Cup Mathematical Modeling Ideas Analysis and Exchange
多线程(进阶) - 2.5w字总结
MySQL data view
High-quality DeFi application building guide to help developers enjoy DeFi Summer
第四章:redis 数组结构的set和一些通用命令「建议收藏」
[Strong Net Cup 2022] WP-UM
七夕浪漫约会不加班,RPA机器人帮你搞定工作
Bias lock/light lock/heavy lock lock is healthier. How is locking and unlocking accomplished?
E-sports, convenience, efficiency, security, key words for OriginOS functions
告白数字化转型时代:麦聪软件以最简单的方式让企业把数据用起来
STM32+ULN2003驱动28BYJ4步进电机(根据圈数正转、反转)
What is SPL?
数分面试(一)----与业务相关
哪位大佬有20年4月或者1月的11G GI和ojvm补丁呀,帮忙发下?
Huawei's lightweight neural network architecture GhostNet has been upgraded again, and G-GhostNet (IJCV22) has shown its talents on the GPU
气象数据数据处理实例——matlab字符串切割匹配与R语言日期匹配(数据拼接)
【 temperature warning program DE development 】 event driven model instance
MySQL transactions
Why are RELTABLESPACE values 0 for many tables displayed in sys_class?