CN101605030B - Active Directory-based uniform authentication realizing method applied to TV station - Google Patents
Active Directory-based uniform authentication realizing method applied to TV station Download PDFInfo
- Publication number
- CN101605030B CN101605030B CN200810114899A CN200810114899A CN101605030B CN 101605030 B CN101605030 B CN 101605030B CN 200810114899 A CN200810114899 A CN 200810114899A CN 200810114899 A CN200810114899 A CN 200810114899A CN 101605030 B CN101605030 B CN 101605030B
- Authority
- CN
- China
- Prior art keywords
- user
- application system
- session token
- active directory
- realizing method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The invention discloses a uniform authentication realizing method, in particular to an Active Directory-based uniform authentication realizing method applied to a backbone network of a TV station. The prior uniform authentication method can not cross a domain and uniformly authenticates among a plurality of browsers simultaneously. The method comprises the following steps: firstly, user information is uniformly configured in an Active Directory server; when a user successfully logs in one application system for the first time, a conversation token is obtained and stored; when the user logs in the other application system by the conversation token, the application system authenticates the legality of the conversation token by the Active Directory server; and if the conversation token is qualified, login is successful. The system can realize the single login of all application systems in different domains in the TV station, and the application systems can be of a B/S or C/S structure.
Description
Technical field
The present invention relates to a kind of uniform authentication realizing method, especially relate to a kind of uniform authentication realizing method of using towards TV station based on Active Directory.
Background technology
Current domestic and international radio, TV and film industries networking, the level of informatization improve day by day.TV station's internal condition scope of business is divided into a plurality of different service plates; Different plates is according to its business demand; Often to use different application systems, for example always control acceptance system, news manufacturing-broadcasting system, integrated production system, studio system, matchmaker and support management system, broadcast system etc.Each application system all need have a unified internal staff of TV station and form information; TV station need provide such as information such as departmental staff's structure, column group structure of personnels for these application systems, and the function of these application systems time checking user name that all need provide to land and password.During work, the user often need be switched between different plates back and forth.If according to traditional development mode, each application system all must be developed independent user authentication module separately.Mainly there is following drawback in this pattern:
(1) user authentication information need be in the repeated storage in the database of a plurality of application systems, thereby brings lot of data redundant, has also caused the overlapping development of each application system;
(2) the user authentication information management of system and user's use are caused inconvenience: the user is when the authentication information of registration or change oneself; Must in all application systems, register one by one or change; When between different application systems, switching, must repeat repeatedly to login;
(3) aspect fail safe and system management, TV station needs a large amount of IT supervisory engineering staff, administers and maintains the user profile of different system respectively;
(4) traditional development mode all is based on the user authentication information administrative model of relevant database, and reading speed is slow, and is portable poor.
Reliable, safe, secret operation system network environment that TV station's informatization need be set up, the business of assurance TV station is not damaged and is disturbed.Obviously, many drawbacks of these traditional development modes have had a strong impact on based on the performance of the application system of WEB and the convenience of use.
So, a single sign-on method is provided in TV station inside, for providing centralized configuration and unified certification function, each operational plate is necessary.
Single-sign-on (Single Sign On) abbreviates SSO as, is one of solution of integrating of at present popular business event.The definition of SSO is in a plurality of application systems, and the user only need login the application system that once just can visit all mutual trusts.It comprises and can current main login be mapped to the mechanism that is used for same user's login in other application.
Industry has a lot of product support SSO at present, and like the WebSphere of IBM and the WebLogic of BEA, but the implementation of each tame SSO product also is not quite similar.WebSphere is through Cookie record authentication information, and WebLogic shares authentication information through Session.Cookie is a kind of client mechanism, and the content of its storage mainly comprises: name, value, expired time, path and territory, and path and territory lump together the sphere of action that has just constituted Cookie, therefore can realize SSO with the Cookie mode, but domain name must be identical.Session is a kind of server end mechanism; When the client-access server, server is that client is created an only SessionID, so that in whole reciprocal process, remain state; Mutual information then can be specified by using voluntarily; Therefore realize SSO with the Session mode, can not between a plurality of browsers, realize single-sign-on, but can be cross-domain.Usually; In TV station's internal network, a plurality of subnets have often been comprised; Each subnet all is an independent territory; And the software that uses in each sub-net is not the B/S structure entirely yet, possibly be the C/S structure of not using browser yet, so above-mentioned dual mode is difficult to realize under the full court net environment of TV station.
Summary of the invention
To the problem that exists in the prior art; The purpose of this invention is to provide a kind of uniform authentication realizing method of using towards TV station based on Active Directory; This method can realize being in the single sign-on of each application system in the same area not, and application system can be B/S structure or C/S structure.
To achieve these goals, the technical scheme that the present invention adopts is that the uniform authentication realizing method based on Active Directory towards TV station uses comprises the steps:
(1) information of unified configure user information and each application system in Active Directory server;
(2) after the user lands an application system success for the first time, obtain a session token, and this session token is stored in the application system of being landed to this user;
(3) when this user lands other application system; At first the session token to this user with storage in the step (2) is passed to application system to be logined; Wait to land the legitimacy of application system then, if, then allow the user to land through checking through this user conversation token of Active Directory server authentication; Upgrade and return this user's session token simultaneously, and the session token after will upgrading deposits in the application system of being landed in.
Aforesaid uniform authentication realizing method; The user lands the process of an application system for the first time and is in the step (2): with application system can distinguish name DN, the user can distinguish name DN and user cipher is sent to Active Directory server; Whether Active Directory server is the custom system of unified certification according to this application system of the name distinguished DN checking of application system earlier; Can distinguish name DN and user cipher checking user's legitimacy again according to the user; If, then land success through checking.
Aforesaid uniform authentication realizing method, wherein, the process of store session token is: at first call the API that the single sign-on client provides, utilize then this API with the session token store in the registration table that is landed application system.
Aforesaid uniform authentication realizing method; The process of the legitimacy of the checking session token described in the step (3) is: with the session token together with waiting that the name the distinguished DN that lands application system is sent to Active Directory server; Active Directory server basis earlier waits the name the distinguished DN that lands application system verifies whether this application system is the custom system of unified certification, and then the legitimacy of checking session token.
Aforesaid uniform authentication realizing method, if the legitimate verification of session token failure in the step (3), then notice waits to land application system demonstration log-in interface, carries out independently landing.
Aforesaid uniform authentication realizing method, behind user log off, this user's of application system deletion session token.
Aforesaid uniform authentication realizing method, described session token has the natural duration of life, and after the user landed above the natural duration of life, session token was revoked.
Method of the present invention is through being provided with a DN attribute for each application system in Active Directory server; Unique identification as session token; Application system needn't be used the unique identification that comprises identical domain name as Cookie, thereby can realize the function that cross-domain single lands.Application system can also can be the C/S structure for the B/S structure.
Description of drawings
Fig. 1 is the system architecture diagram that adopts the method for the invention in the specific embodiment of the invention;
Fig. 2 is the method flow diagram described in the specific embodiment of the invention.
Embodiment
Be described in detail below in conjunction with embodiment and accompanying drawing specific embodiments of the invention.
Method of the present invention is mainly used in the trunk plateform system of broadcasting and TV field TV station, for each operational plate in the TV station provides the centralized configuration of information such as relevant departments' structure, colume structure and user's single sign-on method.Digital improvement along with interior business system of TV station; And the structure of various grids in the platform, often TV station inside has formed to gather and has included, the news record and broadcast, makes comprehensively, performs in a radio or TV programme that network, layout are broadcast fully, numerous application systems such as the matchmaker supports management, broadcast distribution.During work, the user often need be switched between different application systems back and forth, and repeated authentication user profile is used very inconvenience.How a kind of cross-domain and application system is provided in TV station inside can be problem to be solved by this invention for each application system provides the function of centralized configuration and unified certification for single sign-on (SSO:Single Sign-On) method of C/S or B/S pattern.
Fig. 1 has shown the system architecture diagram that adopts the method for the invention, mainly comprises ActiveDirectory server, single sign on server and single sign-on client.Active Directory server is used for the institutional framework information and the user profile of storage application system, and user profile or session token are carried out authentication; Single sign on server is used to resolve authentication information or the operation requests that client transmits, and Active Directory server is operated, and obtained authentication or the operating result that returns from Active Directory server; The single sign-on client is used for storage and between application system, transmits session token.
Fig. 2 has shown a kind of uniform authentication realizing method of using towards TV station based on Active Directory, may further comprise the steps.
(1) information of unified configure user information and each application system in Active Directory server.
Active Directory is meant the directory service in Windows 2000/2003 network.It has two effects, the one, directory services functionality.Active Directory provides the directory services functionality of a series of concentrated organization and administration and accessing network resources.Active Directory makes network topology and agreement become transparent to the user, thereby makes the user on the network can visit any resource (for example printer), and need not to know position and it of this resource are how to be connected to network.Active Directory is divided into the zone and manages, and this makes it can store a large amount of objects.Based on this structure, ActiveDirectory can expand along with the growth of enterprise.The 2nd, centralized management.ActiveDirectory can also manage the visit to Internet resources concentratedly, and allows the user only to land once just to visit all resources on Active Directory.
In the present embodiment, adopt the ldap server product A ctive Directory server of Microsoft to verify as the memory bank of TV station's internal user information and to user profile.At first need carry out necessary configuration to Active Directory server.In the present embodiment, in Active Directory, add three root nodes, be respectively sectorial structure, colume structure and application system.These three organization unit's nodes need the user to manually add, and represent the application system that needs to realize single sign-on in TV station inner departmental staff's structure, column and column member thereof, the TV station's full court net respectively.The user can be under these three root nodes adds respectively and is subordinate to node accordingly.As under the sectorial structure node, adding TV station, channel, department, personnel etc., wherein TV station, channel, department are the node of organization unit's type, and personnel are the node of user type.Add concrete column name (node of secure group type) under the colume structure node and under the application system node, adding concrete application system.
Be provided with then Active Directory server name item (the IP address that can fill out domain controller perhaps " the domain controller name. domain name. extension name "), User DN (the Distinguished Name of visit Active Directory server; But distinguished name), the password of visit Active Directory server, departmental staff's the root DN (character string of representing with node DN form; Corresponding to the sectorial structure node), the root DN that is provided with of the column (character string of representing with node DN form; Corresponding to the colume structure node), the most long-living life time limit of the root DN of application system (character string of representing with node DN form is corresponding to the application system node), session token (minute) and the remember history of session log etc.Session token has the natural duration of life, when needs keep the effective status of session token, need be according to this session token of out-of-service time regular activated of session token, otherwise expired session token is revoked.Session token is crossed after date can be moved into the session log table, infinitely increase for preventing the session log table, and according to the session log remember history that is provided with, the deletion strategy of decision session log.
(2) after the user lands an application system success for the first time, obtain a session token, and this session token is stored in the application system of being landed to this user.
In the present embodiment, suppose to have an application system App1, at first need dispose the DN of App1.DN is the unique identification of App1 in Active Directory server, is provided by Active Directory server, and is stored in the Active Directory server.
When the user lands App1 first; DN, User DN and the user cipher of App1 are sent to the ActiveDirectory server; Whether Active Directory server is the custom system of unified certification according to the DN checking App1 of App1 earlier, according to User DN and user cipher checking user's legitimacy, verifies if pass through again; Then land success, otherwise return error message.
After the user lands the App1 success; Return to session token of App1 from single sign on server to this user; The API that provides of the client program calls single sign-on client of App1 then, utilize this API with the session token store in the registration table of App1.
Session token is an XML character string, and its structure is following:
<xs:complexType?name=″Token_Type″>
<xs:sequence>
<xs:element?name=″TokenID″type=″xs:string″>
<xs:annotation>
<xs:documentation>The ID of token</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element?name=″UserName″type=″xs:string″>
<xs:annotation>
<xs:documentation>User's name</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element?name=″UserDN″type=″xs:string″>
<xs:annotation>
< xs:documentation>user's DN, DN---
DistinguishedName</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element?name=″CreateTime″type=″xs:string″>
<xs:annotation>
The creation-time of < xs:documentation>token, form is: 2000-01-01
12:12:12</xs:documentaion>
</xs:annotation>
</xs:element>
<xs:element?name=″ExpireTime″type=″xs:string″>
<xs:annotation>
The out-of-service time of < xs:documentation>token, form is: 2000-01-01
12:12:12</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element?name=″SystemDN″type=″xs:string″>
<xs:annotation>
< xs:documentation>for the first time from which application system login, and this is this application system
DN, this DN disposes in LDAP, and informs each application system</xs:documentation>
</xs:annotation>
</xs:element>
</xs:sequence>
</xs:complexType>
(3) when this user lands other application system; At first the session token to this user with storage in the step (2) is passed to application system to be logined; Wait to land the legitimacy of application system then, if, then allow the user to land through checking through this user conversation token of ActiveDirectory server authentication; Upgrade and return this user's session token simultaneously, and the session token after will upgrading deposits in the application system of being landed in.
In the present embodiment; When the user lands the App2 of Another application system; The client-side program of App2 (C/S model) or browser (B/S pattern; Need to use javascript this moment) call the acquisition session token function that the single sign-on client provides, obtain the session token after this user lands App1, then the session token that obtains is sent to Active Directory server; Whether the ActiveDirectory server is the custom system of single sign-on according to this application system of DN checking of App2 earlier, verifies the legitimacy of session token again.If through checking; Then allow the user to land; Upgrade and return this user's session token simultaneously, the session token after the store session token function that App2 calls the single sign-on client to be provided will upgrade is saved in the registration table of App2, if failure then notify client-side program or the browser display login interface of App2; Independent login, logining successfully, the back needs to preserve session token equally.No matter be App1 or App2, behind user log off, all need carry out the deletion session token function that the single sign-on client provides, so that the single sign-on client determines whether to be necessary to preserve current session token.
The user can land other application systems with the mode same with landing App2.
In addition, realize that method of the present invention also need meet the following conditions.
(1) single sign on server must be under the jurisdiction of in the Active Directory territory, and single sign on server can be asked to realize the application system visit of single sign-on function.If can not satisfy this condition, can't carry out inquiry, interpolation, deletion, the modify feature of interdependent node to Active Directory, and then cause the unified certification function to realize.
During (2) with single sign-on mode access application system, land with a user that registration table is had an operating right.Because the single sign-on client will be referred to access and the retouching operation of token information in registration table when the user lands; If the active user does not possess the authority to registry operations; Can't be after certain application system to be closed, the user conversation token information is preserved on persistence ground.
Method of the present invention is not limited to the embodiment described in the embodiment, and those skilled in the art's technical scheme according to the present invention draws other execution mode, belongs to technological innovation scope of the present invention equally.
Claims (7)
1. uniform authentication realizing method of using towards TV station based on Active Directory may further comprise the steps:
(1) information of unified configure user information and each application system in Active Directory server;
(2) after the user lands an application system success for the first time, obtain a session token, and this session token is stored in the application system of being landed to this user;
(3) when this user lands other application system; At first the session token to this user with storage in the step (2) is passed to application system to be logined; Wait to land the legitimacy of application system then, if, then allow the user to land through checking through this user conversation token of Active Directory server authentication; Upgrade and return this user's session token simultaneously, and the session token after will upgrading deposits in the application system of being landed in.
2. uniform authentication realizing method as claimed in claim 1; It is characterized in that; The user lands the process of an application system for the first time and is in the step (2): with application system can distinguish name DN, the user can distinguish name DN and user cipher is sent to Active Directory server; Whether Active Directory server is the custom system of unified certification according to this application system of the name distinguished DN checking of application system earlier; Can distinguish name DN and user cipher checking user's legitimacy according to the user again, if, then land success through checking.
3. uniform authentication realizing method as claimed in claim 1 is characterized in that, the process of store session token is: at first call the API that the single sign-on client provides, utilize then this API with the session token store in the registration table that is landed application system.
4. uniform authentication realizing method as claimed in claim 1; It is characterized in that; The process of the legitimacy of the checking session token described in the step (3) is: with the session token together with waiting that the name the distinguished DN that lands application system is sent to Active Directory server; Active Directory server basis earlier waits the name the distinguished DN that lands application system verifies whether this application system is the custom system of unified certification, and then the legitimacy of checking session token.
5. uniform authentication realizing method as claimed in claim 4 is characterized in that: if the legitimate verification of session token failure in the step (3), then notice waits to land application system demonstration log-in interface, carries out independently landing.
6. like the described uniform authentication realizing method of one of claim 1 to 5, it is characterized in that: behind user log off, this user's of application system deletion session token.
7. like the described uniform authentication realizing method of one of claim 1 to 5, it is characterized in that: described session token has the natural duration of life, and after the user landed above the natural duration of life, session token was revoked.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810114899A CN101605030B (en) | 2008-06-13 | 2008-06-13 | Active Directory-based uniform authentication realizing method applied to TV station |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810114899A CN101605030B (en) | 2008-06-13 | 2008-06-13 | Active Directory-based uniform authentication realizing method applied to TV station |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101605030A CN101605030A (en) | 2009-12-16 |
CN101605030B true CN101605030B (en) | 2012-09-05 |
Family
ID=41470593
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810114899A Expired - Fee Related CN101605030B (en) | 2008-06-13 | 2008-06-13 | Active Directory-based uniform authentication realizing method applied to TV station |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101605030B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104052602A (en) * | 2013-03-16 | 2014-09-17 | 国际商业机器公司 | Prevention of password leakage with single sign on in conjunction with command line interfaces |
US9124920B2 (en) | 2011-06-29 | 2015-09-01 | The Nielson Company (Us), Llc | Methods, apparatus, and articles of manufacture to identify media presentation devices |
US9307418B2 (en) | 2011-06-30 | 2016-04-05 | The Nielson Company (Us), Llc | Systems, methods, and apparatus to monitor mobile internet activity |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8910259B2 (en) | 2010-08-14 | 2014-12-09 | The Nielsen Company (Us), Llc | Systems, methods, and apparatus to monitor mobile internet activity |
US8886773B2 (en) | 2010-08-14 | 2014-11-11 | The Nielsen Company (Us), Llc | Systems, methods, and apparatus to monitor mobile internet activity |
CN102082821B (en) * | 2010-12-08 | 2013-12-25 | 北京航空航天大学 | Method and system for safely accessing cross-resource pool resources based on federal center |
CN101989910A (en) * | 2010-12-22 | 2011-03-23 | 北京安天电子设备有限公司 | Multi-system authentication method, device and system |
CN102299805A (en) * | 2011-09-23 | 2011-12-28 | 深圳市华波美通信技术有限公司 | Method for realizing single sign-on based on LDAP (Lightweight Directory Access Protocol) service |
CN103152317B (en) * | 2011-12-07 | 2016-07-06 | 金蝶软件(中国)有限公司 | dynamic verification method and device |
US8689310B2 (en) * | 2011-12-29 | 2014-04-01 | Ebay Inc. | Applications login using a mechanism relating sub-tokens to the quality of a master token |
CN102739678B (en) * | 2012-06-28 | 2015-09-02 | 用友软件股份有限公司 | Single-sign-on treatment system and single-sign-on processing method |
US10356579B2 (en) | 2013-03-15 | 2019-07-16 | The Nielsen Company (Us), Llc | Methods and apparatus to credit usage of mobile devices |
US9301173B2 (en) | 2013-03-15 | 2016-03-29 | The Nielsen Company (Us), Llc | Methods and apparatus to credit internet usage |
CN103701873A (en) * | 2013-12-11 | 2014-04-02 | 深圳海联讯科技股份有限公司 | Method for performing one-click login among multiple applications |
US9762688B2 (en) | 2014-10-31 | 2017-09-12 | The Nielsen Company (Us), Llc | Methods and apparatus to improve usage crediting in mobile devices |
CN104410674B (en) * | 2014-11-12 | 2018-04-10 | 国云科技股份有限公司 | A kind of WEB session synchronization methods of single-node login system |
US11423420B2 (en) | 2015-02-06 | 2022-08-23 | The Nielsen Company (Us), Llc | Methods and apparatus to credit media presentations for online media distributions |
CN106375270B (en) * | 2015-07-24 | 2020-12-08 | 华为技术有限公司 | Token generation and authentication method and authentication server |
CN106101134A (en) * | 2016-07-13 | 2016-11-09 | 十九楼网络股份有限公司 | User's multiple domain is under one's name across the method for station roaming checking logging status |
CN113014568B (en) | 2016-10-10 | 2023-06-30 | 创新先进技术有限公司 | Account login method, equipment and server |
CN107425983A (en) * | 2017-08-08 | 2017-12-01 | 北京明朝万达科技股份有限公司 | A kind of unified identity authentication method and system platform based on WEB service |
CN107819757B (en) * | 2017-10-31 | 2020-08-18 | 下一代互联网重大应用技术(北京)工程研究中心有限公司 | CERID-based virtual machine domain name and certificate system and generation method |
CN107770192A (en) * | 2017-11-13 | 2018-03-06 | 郑州云海信息技术有限公司 | Identity authentication method and computer-readable recording medium in multisystem |
CN107948167B (en) * | 2017-11-29 | 2020-11-06 | 浙江数链科技有限公司 | Single sign-on method and device |
CN107864160A (en) * | 2017-12-21 | 2018-03-30 | 南京东巴电子科技有限公司 | A kind of method that unifying user authentication is carried out based on unique login identification card number |
CN110034933B (en) * | 2018-12-25 | 2023-06-09 | 中国银联股份有限公司 | Cross-system user mutual trust authentication method and cross-system user mutual trust authentication system |
CN110008669A (en) * | 2019-03-28 | 2019-07-12 | 深兰科技(上海)有限公司 | A kind of platform login method, system, device, terminal device and storage medium |
CN110086802B (en) * | 2019-04-24 | 2021-11-23 | 上海易点时空网络有限公司 | Authentication method and device for session |
CN110300154B (en) * | 2019-05-30 | 2020-06-09 | 上海派拉软件股份有限公司 | Method for realizing multi-browser session sharing based on plug-in |
CN111815255A (en) * | 2020-05-11 | 2020-10-23 | 国泰财产保险有限责任公司 | Configuration method and device of user application system based on internet insurance data platform |
CN112543180B (en) * | 2020-11-03 | 2023-03-24 | 福建福诺移动通信技术有限公司 | System and method for realizing single sign-on of multiple authentication centers based on Token |
CN115589336A (en) * | 2022-11-25 | 2023-01-10 | 云筑信息科技(成都)有限公司 | Cross-domain login method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1731723A (en) * | 2005-08-19 | 2006-02-08 | 上海林果科技有限公司 | Electron/handset token dynamic password identification system |
CN101064695A (en) * | 2007-05-16 | 2007-10-31 | 杭州看吧科技有限公司 | P2P(Peer to Peer) safe connection method |
-
2008
- 2008-06-13 CN CN200810114899A patent/CN101605030B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1731723A (en) * | 2005-08-19 | 2006-02-08 | 上海林果科技有限公司 | Electron/handset token dynamic password identification system |
CN101064695A (en) * | 2007-05-16 | 2007-10-31 | 杭州看吧科技有限公司 | P2P(Peer to Peer) safe connection method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9124920B2 (en) | 2011-06-29 | 2015-09-01 | The Nielson Company (Us), Llc | Methods, apparatus, and articles of manufacture to identify media presentation devices |
US9307418B2 (en) | 2011-06-30 | 2016-04-05 | The Nielson Company (Us), Llc | Systems, methods, and apparatus to monitor mobile internet activity |
CN104052602A (en) * | 2013-03-16 | 2014-09-17 | 国际商业机器公司 | Prevention of password leakage with single sign on in conjunction with command line interfaces |
Also Published As
Publication number | Publication date |
---|---|
CN101605030A (en) | 2009-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101605030B (en) | Active Directory-based uniform authentication realizing method applied to TV station | |
CN101605031A (en) | A kind of cross-domain single login system of using towards TV station | |
US9473419B2 (en) | Multi-tenant cloud storage system | |
US8131850B2 (en) | Apparatus and methods for managing network resources | |
US7930735B2 (en) | Service management framework | |
EP3228069B1 (en) | Stack fusion architecture including distributed software clusters to enable software communication services | |
US20190288995A1 (en) | Autonomous secrets management for a managed service identity | |
US10691790B2 (en) | Autonomous secrets management for a temporary shared access signature service | |
CN101217368A (en) | A network logging on system and the corresponding configuration method and methods for logging on the application system | |
CN106664302A (en) | Revoking sessions using signaling | |
CN106612246A (en) | Unified authentication method for simulation identity | |
CN101300779B (en) | Method and system for providing service to subscribers | |
CN104243154A (en) | Server user authority centralized control system and server use authority centralized control method | |
CN106936853A (en) | A kind of system-oriented integrated cross-domain single login system and method | |
CN102082821B (en) | Method and system for safely accessing cross-resource pool resources based on federal center | |
CN101552780B (en) | Verification method and verification device | |
CN101170637A (en) | A method for logging in personalized electronic program list | |
US20190334913A1 (en) | Method and apparatus for native authentication to cloud services with identity management of on-premise applications from the cloud | |
CN101471939A (en) | Multitime user authentication method for fusion business system with SOA architecture | |
CN112714166B (en) | Multi-cluster management method and device for distributed storage system | |
CN103069741A (en) | Credential authentication method and single sign-on server | |
CN105577667A (en) | Multi-account one-key login and authentication mechanism | |
CN110035099B (en) | Multisystem management method, terminal equipment and storage medium | |
KR101070490B1 (en) | Method and system for remote operation of customer's computer | |
US11425172B2 (en) | Application security for service provider networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120905 Termination date: 20170613 |