CN103530547A - Method for logging into third-party application program through integrated authentication function based on Windows operating system - Google Patents

Method for logging into third-party application program through integrated authentication function based on Windows operating system Download PDF

Info

Publication number
CN103530547A
CN103530547A CN201210225153.7A CN201210225153A CN103530547A CN 103530547 A CN103530547 A CN 103530547A CN 201210225153 A CN201210225153 A CN 201210225153A CN 103530547 A CN103530547 A CN 103530547A
Authority
CN
China
Prior art keywords
windows
token
user
management
party application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210225153.7A
Other languages
Chinese (zh)
Inventor
赵克鸣
李骏
刘晓钟
王百康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ai Siai (tianjin) High Seience Technology Co Ltd
Original Assignee
Ai Siai (tianjin) High Seience Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ai Siai (tianjin) High Seience Technology Co Ltd filed Critical Ai Siai (tianjin) High Seience Technology Co Ltd
Priority to CN201210225153.7A priority Critical patent/CN103530547A/en
Publication of CN103530547A publication Critical patent/CN103530547A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method for logging into a third-party application program through an integrated authentication function based on a Windows operating system. According to the method, the background Windows integrated authentication system of the ASP.net is used for acquiring a system token, the token is stored in the database of a third-party system, and therefore in the process of permission assignment and management, token information can be synchronized with a primary domain controller in time, the related process that a final user logs into a Windows mainframe to carry out domain user authentication can be eliminated, and the user can access file resources in the system fast according to authorization with an administrator. According to the method, single and unique user data management can be achieved, and therefore the outlay cost and vigor of an enterprise in user data maintenance are lowered. Meanwhile, safer and more uniform permission system management and permission distribution control is provided, and therefore the safety and controllability of the whole system are improved.

Description

Integrated verification function based on Windows operating system logs in the method for third party application
Technical field
The invention belongs to field of computer technology, especially a kind of integrated verification function based on Windows operating system logs in the method for third party application.
Background technology
Territory user's integrated verification function in Windows operating system is widely used by most enterprises, third party application is conventionally used independently user management module in compiling procedure, if can make both authenticate and verify in conjunction with carrying out user, can significantly reduce enterprise for the personal management cost relevant with right assignment, therefore produced, use integrated verification function to log in the demand of third party's system.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, provide a kind of integrated verification function based on Windows operating system to log in the method for third party application, the method is simple, improves security and the controllability of whole system.
The present invention solves its technical matters and is achieved through the following technical solutions:
A kind of integrated verification function based on Windows operating system logs in the method for third party application, its method is used the backstage Windows integrated verification system of ASP.net, acquisition system token, and token is stored in the database of third party's system, thereby realize in the process of right assignment and management, token information can be timely and main territory control device synchronous, pass through said method, final user can be removed from and log in the correlated process that Windows main frame carries out territory user rs authentication, and have access to fast intrasystem file resource according to the mandate with keeper.
Advantage of the present invention and beneficial effect are:
The present invention logs in third party application by the integrated verification function by Windows operating system, can realize single and unique user data management, thereby reduce expenditure cost and the energy of enterprise aspect maintenance customer's data, safer and unified permission system management and the distribution control of authority are provided simultaneously, thereby improve security and the controllability of whole system.
Embodiment
Below by specific embodiment, the invention will be further described, and following examples are descriptive, is not determinate, can not limit protection scope of the present invention with this.
A kind of integrated verification function based on Windows operating system logs in the method for third party application, its method is used the backstage Windows integrated verification system of ASP.net, acquisition system token, and token is stored in the database of third party's system, thereby realize in the process of right assignment and management, token information can be timely and main territory control device synchronous, pass through said method, final user can be removed from and log in the correlated process that Windows main frame carries out territory user rs authentication, and have access to fast intrasystem file resource according to the mandate with keeper.
By using the function of Windows integrated verification, obtain user profile and the authority of the current field user on primary domain controller, and according to this information simultaneous user's information in third party's system, and be added on authority and other user metadatas in third party's system, realize and in third party's system, use the territory subscriber information management of both having deposited and distribute authority.

Claims (1)

1. the integrated verification function based on Windows operating system logs in the method for third party application, it is characterized in that: the method is used the backstage Windows integrated verification system of ASP.net, acquisition system token, and token is stored in the database of third party's system, thereby realize in the process of right assignment and management, token information can be timely and main territory control device synchronous, pass through said method, final user can be removed from and log in the correlated process that Windows main frame carries out territory user rs authentication, and have access to fast intrasystem file resource according to the mandate with keeper.
CN201210225153.7A 2012-07-02 2012-07-02 Method for logging into third-party application program through integrated authentication function based on Windows operating system Pending CN103530547A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210225153.7A CN103530547A (en) 2012-07-02 2012-07-02 Method for logging into third-party application program through integrated authentication function based on Windows operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210225153.7A CN103530547A (en) 2012-07-02 2012-07-02 Method for logging into third-party application program through integrated authentication function based on Windows operating system

Publications (1)

Publication Number Publication Date
CN103530547A true CN103530547A (en) 2014-01-22

Family

ID=49932551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210225153.7A Pending CN103530547A (en) 2012-07-02 2012-07-02 Method for logging into third-party application program through integrated authentication function based on Windows operating system

Country Status (1)

Country Link
CN (1) CN103530547A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134788A (en) * 2017-12-20 2018-06-08 燧炻科技创新(北京)有限责任公司 A kind of third party login method and system of cloud operating system
CN109684824A (en) * 2014-12-29 2019-04-26 北京奇虎科技有限公司 The authority configuring method and device of process

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684824A (en) * 2014-12-29 2019-04-26 北京奇虎科技有限公司 The authority configuring method and device of process
CN109684824B (en) * 2014-12-29 2021-09-03 北京奇虎科技有限公司 Process permission configuration method and device
CN108134788A (en) * 2017-12-20 2018-06-08 燧炻科技创新(北京)有限责任公司 A kind of third party login method and system of cloud operating system

Similar Documents

Publication Publication Date Title
GB201100045D0 (en) Method and apparatus for on-site authorisation
CN105991734B (en) A kind of cloud platform management method and system
CN104506499B (en) The method and device of single-sign-on application system
TW200629085A (en) Method and system for securely provisioning a client device
CN103179115A (en) Cloud service accessing control method of cross-cloud application facing to cloud television terminal
CN102281142A (en) User identity identification system
CN109299855B (en) Power information communication scheduling system and scheduling method thereof
CN105184144A (en) Multi-system privilege management method
CN103051631A (en) Unified security authentication method for PaaS (Platform as a Service) platform and SaaS (Software as a Service) application system
CN104469762A (en) User grading control system of 3G/WIFI wireless router
CN106992984A (en) A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net
CN106446638A (en) Cloud computing operation system security access method and device
CN105391721A (en) Unified authentication management open system based on cloud computing
CN103475727A (en) Database auditing method based on bridged mode
CN110798474A (en) Power data transmission safety protection system based on Beidou short message communication mode
CN105282160A (en) Credibility-based dynamic access control method
CN103490899A (en) Application cloud safety certification method based on third-party service
WO2010115913A3 (en) Authenticating a node in a communication network
CN105262590A (en) Method and system for safely insulating keys in virtual environment
CN106357614A (en) Uniform identity authentication system based on PKI/CA technology
CN109347831A (en) A kind of double authentication safety access system and method based on UKey certification
CN103595713A (en) Enterprise identity information unified management and authentication platform
CN109787984A (en) A kind of third party authorizes token management method and system
CN103530547A (en) Method for logging into third-party application program through integrated authentication function based on Windows operating system
CN104834998A (en) Intellectual property service information platform for small and medium-sized enterprises

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140122