CN111935260A - Account synchronization method and device, electronic equipment and storage medium - Google Patents

Account synchronization method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111935260A
CN111935260A CN202010753668.9A CN202010753668A CN111935260A CN 111935260 A CN111935260 A CN 111935260A CN 202010753668 A CN202010753668 A CN 202010753668A CN 111935260 A CN111935260 A CN 111935260A
Authority
CN
China
Prior art keywords
application service
target application
user account
account data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010753668.9A
Other languages
Chinese (zh)
Other versions
CN111935260B (en
Inventor
邓练兵
文少杰
李大铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Dahengqin Technology Development Co Ltd
Original Assignee
Zhuhai Dahengqin Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Dahengqin Technology Development Co Ltd filed Critical Zhuhai Dahengqin Technology Development Co Ltd
Priority to CN202010753668.9A priority Critical patent/CN111935260B/en
Publication of CN111935260A publication Critical patent/CN111935260A/en
Application granted granted Critical
Publication of CN111935260B publication Critical patent/CN111935260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a method and a device for account synchronization, electronic equipment and a storage medium, wherein the method comprises the following steps: receiving a synchronous configuration operation for the first target application service; acquiring a data interface of a second target application service associated with the first target application service according to the synchronous configuration operation; receiving user account data for the first target application service; synchronizing the user account data to the second target application service through the data interface; the consistency and the real-time performance of the account data in the application service and the account data in the authentication platform can be ensured; the unified identity authentication management of a plurality of application services can be realized, the operation of accessing different application services by a user is simplified, and the work efficiency and the use experience of the user are improved.

Description

Account synchronization method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for account synchronization, an electronic device, and a storage medium.
Background
With the development of information-based construction, the application services used by units and enterprises are gradually increased. The historical periods of development of all application services are different, the provided business services are different, and development and operation departments are different, so that the problems that the standards of all application services in the same portal system are not uniform, the application services are not communicated with one another, data are not integrated exist, the application service quality is poor due to lack of uniform operation and monitoring, the effect is difficult to guarantee, and the like exist in the same portal system. Therefore, a single sign-on technology appears, and the single sign-on technology can be used for realizing that users can access all mutually trusted application services only by logging on once in a plurality of application services.
Currently, in the single sign-on technology, all user account data having a right to log in a certain application service are uniformly managed by an identity authentication platform, and only the user account data currently logging in the application service exists in the application service, so that the user account data in the application service is inconsistent with the user account data corresponding to the application service in the identity authentication platform; therefore, when the user accesses another application service, for the other application service, the user does not currently log in the other application service, and therefore, the other application service does not store the user account data and cannot directly perform identity verification, at this time, the other application service needs to send an identifier of the certain application service returned by the identity authentication platform to the identity authentication platform for rechecking, and if the verification is passed, the user is allowed to access the other application service; resulting in more data transmission times and low efficiency.
Disclosure of Invention
In view of the above, the present application is proposed to provide a method and apparatus, an electronic device, and a storage medium for account synchronization that overcome or at least partially solve the above problems, including:
an account synchronization method is applied to an authentication platform deployed in a city portal system; the authentication platform is used for performing authentication management on a plurality of application services of the city portal system; the method comprises the following steps:
receiving a synchronous configuration operation for the first target application service;
acquiring a data interface of a second target application service associated with the first target application service according to the synchronous configuration operation;
receiving user account data for the first target application service;
synchronizing the user account data to the second target application service through the data interface.
Optionally, the step of receiving a synchronous configuration operation for the first target application service includes:
receiving an input operation for a SCIM protocol synchronization address of the first target application service; the SCIM protocol synchronization address includes an address of a data interface of at least one second target application service associated with the first target application service.
Optionally, before the step of receiving a synchronous configuration operation for the first target application service, the method further includes:
opening an account synchronization function for the first target application service.
Optionally, the step of receiving user account data of the first target application service includes:
receiving user account data for the first target application service in response to an update operation for the user account data for the first target application service.
Optionally, the step of receiving the user account data of the first target application service further includes:
and receiving user account data sent by the first target application service.
Optionally, the data interface includes a plurality of types of interfaces, and the step of synchronizing the user account data to the second target application service through the data interface further includes:
determining a corresponding account type according to the user account data;
and calling a corresponding target type interface according to the account type, and sending the user account data to the second target application service through the target type interface.
Optionally, the method further comprises:
receiving an error return code returned by the second target application service;
and analyzing the error return code and displaying an analysis result.
An account synchronization device is applied to an authentication platform deployed in a city portal system; the authentication platform is used for performing authentication management on a plurality of application services of the city portal system; the device comprises:
a receive configuration module to receive a synchronous configuration operation for the first target application service;
the acquisition interface module is used for acquiring a data interface of a second target application service related to the first target application service according to the synchronous configuration operation;
a receive data module to receive user account data for the first target application service;
an account synchronization module to synchronize the user account data to the second target application service through the data interface.
Optionally, the receiving configuration module includes:
a configuration input submodule for receiving an input operation for a SCIM protocol synchronization address of the first target application service; the SCIM protocol synchronization address includes an address of a data interface of at least one second target application service associated with the first target application service.
Optionally, the apparatus may further include:
and the synchronization function starting module is used for starting an account synchronization function aiming at the first target application service.
Optionally, the data receiving module includes:
the first data receiving submodule is used for responding to the updating operation of the user account data of the first target application service and receiving the user account data of the first target application service.
Optionally, the data receiving module includes:
and the second data receiving submodule is used for receiving the user account data sent by the first target application service.
Optionally, the data interface includes a plurality of types of interfaces, and the account synchronization module includes:
the type determining submodule is used for determining a corresponding account type according to the user account data;
and the interface calling submodule is used for calling a corresponding target type interface according to the account type and sending the user account data to the second target application service through the target type interface.
Optionally, the apparatus further comprises:
a return code receiving module, configured to receive an error return code returned by the second target application service;
and the return code analysis module is used for analyzing the error return code and displaying an analysis result.
An electronic device comprising a processor, a memory and a computer program stored on the memory and being executable on the processor, the computer program, when executed by the processor, implementing the steps of the method as described above.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as set forth above.
The application has the following advantages:
in an embodiment of the present application, the first target application service is configured to be synchronized with the second target application service; acquiring a data interface of a second target application service associated with the first target application service according to the synchronous configuration operation; receiving user account data for the first target application service; synchronizing the user account data to the second target application service through the data interface; the consistency and the real-time performance of the account data in the application service and the account data in the authentication platform can be ensured; the unified identity authentication management of a plurality of application services can be realized, the operation of accessing different application services by a user is simplified, and the work efficiency and the use experience of the user are improved.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed to be used in the description of the present application will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor.
FIG. 1 is a flowchart illustrating steps of a method for account synchronization according to an embodiment of the present application;
fig. 2 is a schematic diagram of an application list page of an authentication platform according to an embodiment of the present application;
fig. 3 is a block diagram illustrating an account synchronization apparatus according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a flowchart illustrating steps of a method for account synchronization according to an embodiment of the present application is shown, where the method is applied to an authentication platform deployed in a city portal system; the authentication platform is used for performing authentication management on a plurality of application services of the city portal system.
The city portal system refers to an application system which leads to some kind of comprehensive internet information resources and provides related information services. The overall architecture of the urban portal system in the embodiment sequentially comprises a front-end system, a server load balance system, an interface gateway, a service system and an infrastructure system; the front-end system can comprise a Web front-end, an H5 front-end and an APP front-end; the Web front end and the H5 front end use the React framework development technology, and the APP front end uses the native IOS/Android development technology. The core idea of reach development technology is packaging components; each component maintains its own state and UI (User Interface), and when the state changes, the whole component is automatically re-rendered; the method can realize a Virtual Document Object Model (DOM), the structure of a component DOM (DOM) is mapped to the Virtual DOM, and React realizes a diff algorithm on the Virtual DOM, when the component is to be re-rendered, a DOM node to be changed can be found through the diff, and the modification is updated to the actual DOM node of the browser, so that the whole DOM tree is not really rendered; the Virtual DOM is a pure JS data structure, and the performance is faster. And the native IOS/Android development technology can develop APP with strong compatibility and rich functions, so that users can obtain better experience.
The city portal system can integrate or integrate a plurality of mutually independent application services, and realize the unified management and use of the plurality of application services. Each application service can be provided with an independent authentication management module, and in order to improve the high efficiency and the convenience of using a plurality of application services in one city portal system, part or all of the application services of the city portal system can be subjected to unified authentication management by using an authentication platform, so that the single sign-on technology can be realized in the city portal system. In the existing single sign-on technology, all user account data with the authority to log in a certain application service is only stored in an authentication platform, and the application service does not store all user account data with the authority to log in the application service, so that when a user sends a sign-on request aiming at the application service, the application service needs to send the user account data carried in the sign-on request to the authentication platform, the authentication platform verifies the user account data, and after the verification is passed, the user logs in the application service, and simultaneously returns an identifier (session token) to the application service, when the user accesses another application service, the returned identifier needs to be shown, and the other application service sends the identifier to the authentication platform, is verified by the authentication platform, and after the verification is passed, the user logs in another application service; therefore, in the single sign-on technology in the prior art, the user account data stored in the application service is inconsistent with the user account data of the authentication platform, and when the user accesses the application service, the user must be verified through the authentication platform but cannot be directly verified by the application service, so that the problem of low efficiency exists. The embodiment of the application is improved aiming at the problems in the prior art, so that the user account data synchronization among the application services and the authentication platform in the single sign-on technology is realized, and the efficiency of logging in the application services by the user is improved while the security is ensured.
The method specifically comprises the following steps:
step 101, receiving a synchronous configuration operation aiming at the first target application service;
step 102, acquiring a data interface of a second target application service associated with the first target application service according to the synchronous configuration operation;
step 103, receiving user account data for the first target application service;
step 104, synchronizing the user account data to the second target application service through the data interface.
In an embodiment of the present application, a configuration operation is synchronized by receiving a synchronization configuration operation for a first target application service; acquiring a data interface of a second target application service associated with the first target application service according to the synchronous configuration operation; receiving user account data for a first target application service; synchronizing the user account data to a second target application service through a data interface; the consistency and the real-time performance of the account data in the application service and the account data in the authentication platform can be ensured; the unified identity authentication management of a plurality of application services can be realized, the operation of accessing different application services by a user is simplified, and the work efficiency and the use experience of the user are improved.
Next, the method of account synchronization in the present exemplary embodiment will be further described.
In step 101, a synchronization configuration operation for the first target application service is received.
In this embodiment, a user (hereinafter referred to as an administrator) having a right to log in to the authentication platform logs in to the authentication platform through the electronic device, and a related page of the authentication platform is displayed on a display of the electronic device, as shown in fig. 2, fig. 2 is an application list page of the authentication platform of this embodiment, and in the application list page, related information of an application service uniformly managed by the authentication platform may be included, where the related information may include an application icon, an application name, an application ID (Identity document), an application state, and the like. The method comprises the steps that an administrator determines a first target application service needing to be correspondingly processed from a plurality of application services, and then an operation control corresponding to SCIM (System for Cross-domain Identity Management) protocol configuration and relevant to the first target application service is triggered, and then an SCIM configuration interface is displayed on a display. And receiving synchronous configuration operation executed by an administrator aiming at the first target application service at the SCIM configuration interface, wherein the synchronous configuration operation is used for setting a second target application service related to the first target application service so as to realize the unified management of the first target application service and other target application services mutually trusted by the first target application service.
Specifically, in an example, the step 101 may include:
receiving an input operation for a SCIM protocol synchronization address of the first target application service; the SCIM protocol synchronization address includes an address of a data interface of at least one second target application service associated with the first target application service.
In the present example, the SCIM configuration interface includes the SCIM protocol synchronization address to be filled in; the SCIM protocol synchronization address may be an interface address for receiving synchronization account data, i.e. an address of a data interface of a receiving data of a further application service mutually trusted with the first target application service. The administrator configures the SCIM protocol synchronization address for the first target application service through an input operation. In particular, addresses of data interfaces of one or more second application services associated with the first target application service may be entered by corresponding locations of SCIM protocol synchronization addresses to be populated.
Before the step 101 is executed, the method may further include:
an account synchronization function for the first target application service is opened.
In this embodiment, the SCIM configuration interface further includes an SCIM configuration switch control, and in order to implement the single sign-on technology, the SCIM configuration switch control is in an on state by default; when the SCIM configuration switch control is in an open state, the method indicates that the first target application service allows the user account data with the authority of logging in the first target application service to be synchronized into other application services mutually trusted by the first target application service, namely the account synchronization function of the first target application service is in an enabled state. If the SCIM configuration switch control is in the off state, the administrator needs to set the state of the SCIM configuration switch control to the on state through the on operation to start the SCIM protocol. Specifically, the SCIM protocol may be turned on by moving the SCIM configuration switch control to an on position, or otherwise placing the SCIM configuration switch control in a selected state.
It should be noted that the SCIM configuration interface may include a first SCIM configuration interface, a second SCIM configuration interface, and a third SCIM configuration interface; different SCIM configuration interfaces are used for carrying out synchronous configuration aiming at different account types; the authority of the user account data of different account types in the same application service can be different; when the same application service is used, the user account data of different account types and other application services mutually trusting the application service can be different, so that corresponding SCIM configuration interfaces need to be set according to different account types. The administrator can use the method of step 101 as described above when performing the synchronous configuration operation in different SCIM configuration interfaces, and the SCIM protocol synchronous addresses in different SCIM configuration interfaces are generally different.
In an actual application scenario, a user account applying the city portal system can be divided into three account types of a natural person, a legal person (organization institution) and a government worker, and the first SCIM configuration interface can be an account SCIM configuration interface and is used for synchronously configuring user account data of which the account type is the natural person; the second SCIM configuration interface can be an account group SCIM configuration interface and is used for synchronously configuring user account data with an account type of legal; the third SCIM configuration interface can be an organization unit SCIM configuration interface used for synchronously configuring user account data with an account type of government staff; so as to realize the unified management of the user account data of different account types.
In step 102, a data interface of a second target application service associated with the first target application service is obtained according to the synchronous configuration operation.
In this embodiment, the data interface of the second target application service is configured to receive user account data related to the login permission of the first target application service, where the user account data is sent by the authentication platform. The data interface of at least one second target application service associated with the first target application service may be obtained through a SCIM protocol synchronization address in the SCIM configuration interface. When the SCIM configuration interface comprises a plurality of SCIM configuration interfaces of different account types, obtaining a type interface of a second target application service corresponding to each account type from a SCIM protocol synchronous address in the SCIM configuration interface of each account type. It should be noted that the data interface of the second target application service needs to be developed according to the field name and the error return code specified by the authentication platform.
In step 103, user account data for the first target application service is received.
In an exemplary embodiment, the step 103 may include:
receiving user account data for the first target application service in response to an update operation for the user account data for the first target application service.
In this embodiment, a related page (e.g., an account management page) of the authentication platform may display all user account data having a right to log in the first target application service, and may allow an administrator to perform related operations on the user account data to update the user account data having the right to log in the first target application service, for example, the administrator may add the user account data having the right to log in the first target application service to the account management page of the first target application service, may delete the original user account data having the right to log in, and may perform related modifications on the user account data having the right to log in the first target application service, for example, may modify non-unique identifiers of the user account data such as a display name and an associated mobile phone number in the user account data; it should be noted that the non-unique identifier corresponding to the user account data is a unique identifier of the user account data, and generally, the unique identifier of the user account data with an account type of a natural person may be an identity card number, a social security number, or the like; the unique identifier of the user account data with the account type of legal person can be a unified social credit code; the unique identification of the user account data for which the account type is a government worker may be a combination of the work institution and employee number. . After the administrator executes the related updating operation, the authentication platform receives user account data corresponding to the updating operation, namely the authentication platform receives the user account data with the updating; alternatively, the authentication platform receives all user account data for the first target application service. It should be noted that, in this embodiment, when the authentication platform receives the user account data of the first target application service, the received user account data of the first target application service needs to be sent to the first target application service, so as to implement account synchronization between the first target application service and the first target application service in the authentication platform.
In another exemplary embodiment, the step 103 may include:
and receiving user account data sent by the first target application service.
In this embodiment, user account data associated with the first target application service is sent by the first target application service to the authentication platform. Specifically, a development manager of the first target application service platform can manage user account data with the authority of logging in the first target application service; for example, the user account data having the authority to log in the first target application service may be added, the user account data originally having the authority to log in may be deleted, or the user account data having the authority to log in the first target application service may be modified in a related manner, for example, the non-unique identifier of the user account data, such as the display name and the associated mobile phone number, in the user account data may be modified. When the user account data with the authority of logging in the first target application service changes, the first target application service sends the user account data related to the first target application service to the authentication platform, or the first target application service can be set to send the user account data related to the first target application service to the authentication platform periodically; the user account data can be all user account data with the authority of logging in the first target application service, or updated user account data; to enable account synchronization of the first target application service and the first target application service in the authentication platform.
In step 104, the user account data is synchronized to the second target application service through the data interface.
In this embodiment, when the authentication platform receives user account data having a right to log in the first target application service, the user account data may be synchronized to at least one second target application service that is trusted with the first target application platform through the acquired data interface. Therefore, the account synchronization of the first target application service and the second target application service is realized, and the realization of the single sign-on technology is ensured.
In one embodiment, the data interface comprises a plurality of types of interfaces, and step 104 comprises:
determining a corresponding account type according to the user account data;
and calling a corresponding target type interface according to the account type, and sending the user account data to the second target application service through the target type interface.
In this embodiment, the user account data of the first target application service includes user account data of different account types, the types of data interfaces corresponding to the user account data of different account types are different, after the authentication platform receives the user account data of the first target application service, the authentication platform needs to determine the account type of the received user account data, call a corresponding target type interface according to the account type, and send the user account data to the second target application service through the target type interface, so that account synchronization of the first target application service and the second target application service is achieved.
Further, when the user account data of the first target application service received by the authentication platform is updated user account data, in the step of invoking a corresponding target type interface according to the account type and sending the user account data to the second target application service through the target type interface, the method may further include:
and judging the updating type of the user account data, and sending a corresponding calling request to the target type interface according to the updating type so as to call the target type interface.
In this embodiment, the update type includes an addition type, a modification type, and a deletion type; the adding type can be adding user account data with the authority of logging in the first target application service; the modification type can be a non-unique identifier of the user account data such as a display name, an associated mobile phone number and the like in the user account data; the deletion type can be the update type carried in a calling request which is used for deleting the user account data which originally has the authority of logging in the first target application service and is sent to a calling target type interface by the authentication platform, so that the efficiency of synchronizing the user account data can be improved.
Further, in an optional embodiment, the method further comprises:
receiving an error return code returned by the second target application service;
and analyzing the error return code and displaying an analysis result.
In this embodiment, after the authentication platform sends the user account data of the first target application service to the second target application service, the second target application service returns an error return code to the authentication platform after receiving the user account data; the error return code is used for indicating whether the user account data received by the second target application service through the data interface is synchronously updated to the second target application service, and if the synchronous update is successful, the error return code corresponding to the successful update is returned; and if the synchronous updating fails, returning an error return code corresponding to the updating failure. The authentication platform can determine whether the second target application service is successfully updated synchronously by analyzing the error return code, and display a corresponding analysis result on the display, so that an administrator can timely handle the exception when the synchronous update fails.
In an embodiment of the present application, a configuration operation is synchronized by receiving a synchronization configuration operation for a first target application service; wherein, the synchronous configuration operation comprises an input operation of SCIM protocol synchronous address; acquiring a data interface of a second target application service mutually trusting with the first target application service according to synchronous configuration operation; receiving user account data for a first target application service; calling a corresponding data interface by determining an account type corresponding to the user account data, and synchronizing the user account data to a second target application service through the data interface; the consistency and the real-time performance of the account data in the application service and the account data in the authentication platform can be ensured; the unified identity authentication management of a plurality of application services can be realized, the operation of accessing different application services by a user is simplified, and the work efficiency and the use experience of the user are improved.
Referring to fig. 3, a block diagram of an account synchronization apparatus provided in the embodiment of the present application is shown, where the apparatus is applied to an authentication platform deployed in a city portal system; the authentication platform is used for performing authentication management on a plurality of application services of the city portal system; the method specifically comprises the following modules:
a receive configuration module 301, configured to receive a synchronous configuration operation for the first target application service;
an obtaining interface module 302, configured to obtain a data interface of a second target application service associated with the first target application service according to the synchronous configuration operation;
a receive data module 303, configured to receive user account data of the first target application service;
an account synchronization module 304, configured to synchronize the user account data to the second target application service through the data interface.
In a preferred embodiment of the present application, the receiving configuration module 301 may include:
a configuration input submodule for receiving an input operation for a SCIM protocol synchronization address of the first target application service; the SCIM protocol synchronization address includes an address of a data interface of at least one second target application service associated with the first target application service.
In a preferred embodiment of the embodiments of the present application, the apparatus may further include:
and the synchronization function starting module is used for starting an account synchronization function aiming at the first target application service.
In a preferred embodiment of the present application, the data receiving module 303 may include:
the first data receiving submodule is used for responding to the updating operation of the user account data of the first target application service and receiving the user account data of the first target application service.
In a preferred embodiment of the present application, the data receiving module 303 may include:
and the second data receiving submodule is used for receiving the user account data sent by the first target application service.
In a preferred embodiment of the present application, the data interface includes a plurality of types of interfaces, and the account synchronization module 304 may further include:
the type determining submodule is used for determining a corresponding account type according to the user account data;
and the interface calling submodule is used for calling a corresponding target type interface according to the account type and sending the user account data to the second target application service through the target type interface.
In a preferred embodiment of the embodiments of the present application, the apparatus further comprises:
a return code receiving module, configured to receive an error return code returned by the second target application service;
and the return code analysis module is used for analyzing the error return code and displaying an analysis result.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiment of the application also discloses an electronic device, which comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein when the computer program is executed by the processor, the steps of the account synchronization method of the embodiment are realized.
The embodiment of the application also discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the account synchronization method of the embodiment are realized.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method for account synchronization, the device for account synchronization, the electronic device and the storage medium provided by the present application are introduced in detail above, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. The account synchronization method is characterized by being applied to an authentication platform deployed in a city portal system; the authentication platform is used for performing authentication management on a plurality of application services of the city portal system; the method comprises the following steps:
receiving a synchronous configuration operation for the first target application service;
acquiring a data interface of a second target application service associated with the first target application service according to the synchronous configuration operation;
receiving user account data for the first target application service;
synchronizing the user account data to the second target application service through the data interface.
2. The method of claim 1, wherein the step of receiving a synchronous configuration operation for the first target application service comprises:
receiving an input operation for a SCIM protocol synchronization address of the first target application service; the SCIM protocol synchronization address includes an address of a data interface of at least one second target application service associated with the first target application service.
3. The method of claim 2, further comprising, prior to the step of receiving a synchronous configuration operation for the first target application service:
opening an account synchronization function for the first target application service.
4. The method of claim 3, wherein the step of receiving user account data for the first target application service comprises:
receiving user account data for the first target application service in response to an update operation for the user account data for the first target application service.
5. The method of claim 4, wherein the step of receiving user account data for the first target application service further comprises:
and receiving user account data sent by the first target application service.
6. The method of claim 4 or 5, wherein the data interface comprises a plurality of types of interfaces, and wherein the step of synchronizing the user account data to the second target application service via the data interface further comprises:
determining a corresponding account type according to the user account data;
and calling a corresponding target type interface according to the account type, and sending the user account data to the second target application service through the target type interface.
7. The method of claim 1, further comprising:
receiving an error return code returned by the second target application service;
and analyzing the error return code and displaying an analysis result.
8. The identity authentication device is characterized by being applied to an authentication platform deployed in a city portal system; the authentication platform is used for performing authentication management on a plurality of application services of the city portal system; the device comprises:
a receive configuration module to receive a synchronous configuration operation for the first target application service;
the acquisition interface module is used for acquiring a data interface of a second target application service related to the first target application service according to the synchronous configuration operation;
a receive data module to receive user account data for the first target application service;
an account synchronization module to synchronize the user account data to the second target application service through the data interface.
9. An electronic device comprising a processor, a memory and a computer program stored on the memory and being executable on the processor, the computer program, when executed by the processor, implementing the steps of the method of identity authentication according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of identity authentication according to any one of claims 1 to 7.
CN202010753668.9A 2020-07-30 2020-07-30 Account synchronization method and device, electronic equipment and storage medium Active CN111935260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010753668.9A CN111935260B (en) 2020-07-30 2020-07-30 Account synchronization method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010753668.9A CN111935260B (en) 2020-07-30 2020-07-30 Account synchronization method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111935260A true CN111935260A (en) 2020-11-13
CN111935260B CN111935260B (en) 2022-08-02

Family

ID=73315881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010753668.9A Active CN111935260B (en) 2020-07-30 2020-07-30 Account synchronization method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111935260B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779055A (en) * 2021-09-10 2021-12-10 维沃移动通信有限公司 Information processing method, information processing apparatus, electronic device, and readable storage medium
CN113839960A (en) * 2021-11-25 2021-12-24 云账户技术(天津)有限公司 Method, system and storage medium for managing resource and interface authority

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101441734A (en) * 2007-11-19 2009-05-27 上海久隆电力科技有限公司 Unite identification authentication system
CN103702438A (en) * 2013-12-25 2014-04-02 陕西天基通信科技有限责任公司 Wireless access method and CPE (customer premises equipment)
US20170331812A1 (en) * 2016-05-11 2017-11-16 Oracle International Corporation Microservices based multi-tenant identity and data security management cloud service
CN109165499A (en) * 2018-08-21 2019-01-08 努比亚技术有限公司 Single-point logging method, mobile terminal and computer readable storage medium
CN109447609A (en) * 2018-09-25 2019-03-08 平安科技(深圳)有限公司 Method of payment, device, computer equipment and storage medium
CN110336826A (en) * 2019-07-12 2019-10-15 北京字节跳动网络技术有限公司 A kind of acquisition methods, device, equipment and the storage medium of interface parameters type

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101441734A (en) * 2007-11-19 2009-05-27 上海久隆电力科技有限公司 Unite identification authentication system
CN103702438A (en) * 2013-12-25 2014-04-02 陕西天基通信科技有限责任公司 Wireless access method and CPE (customer premises equipment)
US20170331812A1 (en) * 2016-05-11 2017-11-16 Oracle International Corporation Microservices based multi-tenant identity and data security management cloud service
CN109165499A (en) * 2018-08-21 2019-01-08 努比亚技术有限公司 Single-point logging method, mobile terminal and computer readable storage medium
CN109447609A (en) * 2018-09-25 2019-03-08 平安科技(深圳)有限公司 Method of payment, device, computer equipment and storage medium
CN110336826A (en) * 2019-07-12 2019-10-15 北京字节跳动网络技术有限公司 A kind of acquisition methods, device, equipment and the storage medium of interface parameters type

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
佟派技术社区: "跨域身份管理系统(SCIM)", 《GITPRESS》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779055A (en) * 2021-09-10 2021-12-10 维沃移动通信有限公司 Information processing method, information processing apparatus, electronic device, and readable storage medium
CN113839960A (en) * 2021-11-25 2021-12-24 云账户技术(天津)有限公司 Method, system and storage medium for managing resource and interface authority
CN113839960B (en) * 2021-11-25 2022-03-11 云账户技术(天津)有限公司 Method, system and storage medium for managing resource and interface authority

Also Published As

Publication number Publication date
CN111935260B (en) 2022-08-02

Similar Documents

Publication Publication Date Title
CN108667809B (en) Method for realizing synchronous management of account information of WEB interface of multi-system DAS
CN111277432B (en) Configuration information updating method and device, electronic equipment and storage medium
EP2715971B1 (en) Automating cloud service reconnections
WO2021203979A1 (en) Operation and maintenance processing method and apparatus, and computer device
CN111935260B (en) Account synchronization method and device, electronic equipment and storage medium
CN109388766A (en) The method and apparatus of page load
CN110401641B (en) User authentication method and device and electronic equipment
CN110008019B (en) Method, device and system for sharing server resources
US20210042631A1 (en) Techniques for Cyber-Attack Event Log Fabrication
CN113568970A (en) Application service data management method, device, equipment and storage medium
CN109726545B (en) Information display method, equipment, computer readable storage medium and device
CN106254328A (en) A kind of access control method and device
CN113114503B (en) Deployment method and device based on application delivery network requirements
CN112714166B (en) Multi-cluster management method and device for distributed storage system
CN101527646B (en) System and method for WEB network management
CN111695098A (en) Multi-distributed cluster access method and device
US10713278B2 (en) Flexible configuration of offline synchronization scope
CN113886217A (en) Gray level verification method, device and system for cloud database service and storage medium
US11210156B1 (en) Intelligent distributed tracing
CN108769049A (en) A kind of method and server synchronizing user right to openstack
CN109302446B (en) Cross-platform access method and device, electronic equipment and storage medium
CN111447080B (en) Private network decentralization control method, device and computer readable storage medium
CN111935107A (en) Identity authentication method, device, system, electronic equipment and storage medium
CN111176782A (en) Online experimental method and device
CN110231965A (en) A kind of cloud device, applied program processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant