CN109150913B - Method and device for accessing application under micro-service architecture, storage medium and server - Google Patents

Method and device for accessing application under micro-service architecture, storage medium and server Download PDF

Info

Publication number
CN109150913B
CN109150913B CN201811211123.4A CN201811211123A CN109150913B CN 109150913 B CN109150913 B CN 109150913B CN 201811211123 A CN201811211123 A CN 201811211123A CN 109150913 B CN109150913 B CN 109150913B
Authority
CN
China
Prior art keywords
session
application
information
client
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811211123.4A
Other languages
Chinese (zh)
Other versions
CN109150913A (en
Inventor
赵研
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201811211123.4A priority Critical patent/CN109150913B/en
Publication of CN109150913A publication Critical patent/CN109150913A/en
Application granted granted Critical
Publication of CN109150913B publication Critical patent/CN109150913B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The disclosure relates to a method, a device, a storage medium and a server for accessing applications under a micro-service architecture, so as to realize access to various heterogeneous security framework applications on the basis of not redeveloping original security frameworks of various applications. The method for accessing the application under the micro-service architecture in the disclosure comprises the following steps: receiving a login request sent by a client for logging in a first application under a micro-service architecture; after the login request is successfully authenticated, generating a response message for responding to the login request; deleting the target access specified in the set-cookie information through an API gateway to obtain a target response message; and sending the target response message to the client.

Description

Method and device for accessing application under micro-service architecture, storage medium and server
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for accessing an application under a micro service architecture, a storage medium, and a server.
Background
The micro-service architecture is a very popular server-side distributed architecture scheme at present, and the micro-service architecture can improve the development efficiency and better meet various functional requirements of users. In the microservice architecture, an important component is the API gateway, where a user's access to various applications can be implemented if the applications under the microservice architecture use the same security framework.
However, if the security frameworks used by the applications under the micro service architecture are different, the existing security frameworks of the applications need to be abandoned and redeveloped, so that the security frameworks of the applications are consistent, and then the applications are accessed through the API gateway, which may consume high time cost and labor cost.
Disclosure of Invention
The disclosure aims to provide a method, a device, a storage medium and a server for accessing applications under a micro-service architecture, so as to realize access to various heterogeneous security framework applications on the basis of not redeveloping original security frameworks of various applications.
To achieve the above object, in a first aspect, the present disclosure provides a method for accessing an application under a micro service architecture, including:
receiving a login request sent by a client for logging in a first application under a micro-service architecture;
after the login request is successfully authenticated, generating a response message for responding to the login request, wherein the response message comprises set-cookie information, the set-cookie information is used for setting cookie information of the client and specifying target access for triggering the client to send the cookie information;
deleting the specified target access in the set-cookie information through an API gateway to obtain a target response message, wherein for the cookie information of unspecified target access, the client carries the cookie information in all requests for accessing the application under the micro-service architecture;
and sending the target response message to the client.
Optionally, the method further comprises:
receiving an access request sent by the client for accessing a second application under the micro service architecture, wherein the access request comprises the cookie information;
analyzing the cookie information to acquire a session identifier of the client accessing the first application;
according to the session identification, searching corresponding session information in a session table of the client and the first application, wherein the session identification and the session information are stored in the session table when a session between the first application and the client is established;
and establishing a session between the second application and the client according to the session information.
Optionally, the security frameworks of the first application and the second application are different, and the establishing a session between the second application and the client according to the session information includes:
extracting available information in the session information, wherein the available information is information required for establishing a session under a security framework of the second application;
and generating target session information adapted to the security framework of the second application according to the available information so as to establish a session between the client and the second application.
Optionally, the method further comprises:
and saving the target session information to the current security view of the second application.
In a second aspect, the present disclosure also provides an apparatus for accessing an application under a micro service architecture, including:
the first receiving module is used for receiving a login request which is sent by a client and used for logging in a first application under a micro-service architecture;
a generating module, configured to generate a response message for responding to the login request after the login request is successfully authenticated, where the response message includes set-cookie information, and the set-cookie information is used to set cookie information of the client and specify a target access for triggering the client to send the cookie information;
the target response module is used for deleting the target access specified in the set-cookie information through the API gateway to obtain a target response message, wherein for the cookie information of which the target access is not specified, the client carries the cookie information in all requests for accessing the application under the micro-service architecture;
and the sending module is used for sending the target response message to the client.
Optionally, the apparatus further comprises:
a second receiving module, configured to receive an access request sent by the client for accessing a second application under the microservice architecture, where the access request includes the cookie information;
the analysis module is used for analyzing the cookie information to acquire a session identifier of the client accessing the first application;
a searching module, configured to search, according to the session identifier, corresponding session information in a session table between the client and the first application, where the session identifier and the session information are stored in the session table when a session between the first application and the client is established;
and the session establishing module is used for establishing the session between the second application and the client according to the session information.
Optionally, the session establishing module is configured to, in a case that security frameworks of the first application and the second application are different, extract available information in the session information, where the available information is information required to establish a session under the security framework of the second application, and generate, according to the available information, target session information adapted to the security framework of the second application, so as to establish the session between the client and the second application.
Optionally, the apparatus further comprises:
and the storage module is used for storing the target session information into the current security view of the second application.
In a third aspect, the present disclosure also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of any one of the first aspect.
In a fourth aspect, the present disclosure further provides a server, where the server adopts a micro service architecture, and the server includes:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the method of any of the first aspects.
By the technical scheme, after the login request is successfully authenticated, the target access specified in the set-cookie information corresponding to the login request can be deleted through the API gateway, and the target response message is obtained, so that after the target response message is sent to the client, the client can add the cookie information corresponding to the login request in all requests for accessing the application under the micro-service architecture, a session process is established through the cookie information, access to the applications using different security frameworks under the micro-service architecture is realized, the security frameworks of all the applications do not need to be reconstructed, and the time cost and the labor cost are greatly saved.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating a method of accessing an application under a microservice architecture in accordance with an exemplary embodiment of the present disclosure;
FIG. 2 is a schematic diagram illustrating client-server interaction in a method of accessing an application under a microservice architecture, according to an illustrative embodiment of the present disclosure;
FIG. 3 is a block diagram illustrating an apparatus for accessing applications under a microservice architecture in accordance with an exemplary embodiment of the present disclosure;
fig. 4 is a block diagram illustrating a server according to an exemplary embodiment of the present disclosure.
Detailed Description
The following detailed description of specific embodiments of the present disclosure is provided in connection with the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
An application scenario of the embodiment of the present disclosure is first explained. The embodiment of the disclosure is applied to a server, where a plurality of applications under a micro service architecture are deployed on the server, and at least two applications using different security frameworks exist in the plurality of applications, and meanwhile, the server may receive, through an API gateway, a login request or an access request sent by a client, and forward the login request or the access request to a corresponding application, for example, when the API gateway receives a login request for logging in a first application under the micro service architecture, the API gateway forwards the login request to the first application.
It should be understood that, in the embodiment of the present disclosure, the API gateway and the application of different security frameworks may be deployed on the same server, or may be deployed on different servers.
Fig. 1 is a flowchart illustrating a method of accessing an application under a microservice architecture according to an exemplary embodiment of the present disclosure, and with reference to fig. 1, the method includes the steps of:
step S101, receiving a login request sent by a client for logging in a first application under a micro service architecture;
step S102, after the login request is successfully authenticated, generating a response message for responding to the login request, wherein the response message comprises set-cookie information, the set-cookie information is used for setting cookie information of the client and appointing target access for triggering the client to send the cookie information;
step S103, deleting the specified target access in the set-cookie information through an API gateway to obtain a target response message, wherein for the cookie information of the unspecified target access, the client carries the cookie information in all requests for accessing the application under the micro-service architecture;
and step S104, sending the target response message to the client.
In step S101, the login request includes authentication information, such as a user name, a password, and the like, required by the user to log in the first application, and the login request may be triggered and sent after the client clicks a login button to log in the first application, or may be triggered and sent after the client inputs the user name and the password to log in the first application, and the like, which is not limited in this disclosure.
After receiving a login request for logging in a first application sent by a client, a server needs to authenticate the login request, that is, whether authentication information (such as a user name, a password and the like) carried by the login request is authenticated to be consistent with authentication information stored in the server, if the authentication information carried by the login request is consistent with the authentication information stored in the server, it indicates that the login request is successfully authenticated, and then in step S102, a response message for responding to the login request is generated.
The response message includes set-cookie information for setting cookie information of the client and specifying a target access for triggering the client to transmit the cookie information.
The cookie information is used for storing the login state of a user, when the user accesses some applications needing login information through the client, the cookie information records the login information of the user if the user logs in for the first time, when the application is accessed again next time, the client automatically adds the cookie information to a request sent by the server, and then the server finds the login information of the user and opened pages from the cookie information and directly responds to the user to return the pages needed by the user.
The set-cookie information is used for setting cookie information, and may specify a target access for triggering the client to transmit the cookie information, that is, by setting the set-cookie information, it may be controlled in which access request the client adds the cookie information.
For example, after the client accesses the first application and the server successfully authenticates the login request sent by the client to login the first application, cookie _ a information is generated and sent to the client, all requests of the client to access the first application are added with the cookie _ a information, and conversely, if the client accesses the second application with a security framework different from that of the first application, the cookie _ a information is not added in the requests.
However, if no target access in the set-cookie information is specified, the client adds cookie information in all requests sent to the same server.
Therefore, in the embodiment of the present disclosure, in step S103, the target access specified in the set-cookie information is deleted by the API gateway, and a target response message is obtained, so that after receiving the target response message, the client adds the cookie information to all requests sent to the server.
Deleting the target access specified in the set-cookie information may be, for example, setting a path attribute in the set-cookie information to "/", i.e., not specifying the target access in the set-cookie information, or the like, which is not limited by the present disclosure.
For example, in the above example where the server generated cookie _ a information, the server set the path attribute in the set-cookie information to "/", then the client would add cookie _ a information in all requests to access the server, that is, when the client accesses a second application on the server that is different from the first application security framework, the client would also add cookie _ a information in the request, and the server could then establish a session with the client based on the received cookie _ a information.
The following describes a process in which the server establishes a session with the client based on the received cookie information.
Optionally, in this embodiment of the present disclosure, after step S104, an access request sent by the client for accessing a second application under the microservice architecture may be further received, where the access request includes the cookie information, and then the cookie information is parsed to obtain a session identifier for the client to access the first application, and then according to the session identifier, corresponding session information is looked up in a session table between the client and the first application, where the session identifier and the session information are stored in the session table when a session between the first application and the client is established, and finally, a session between the second application and the client is established according to the session information.
Since the target access specified in the set-cookie information is deleted in step S103, when the client accesses the second application under the micro service architecture, the client adds the cookie information generated when logging in the first application to the access request, so that when the server receives the access request sent by the client for accessing the second application under the micro service architecture, the server can parse the cookie information included in the access request to obtain the session identifier (sessionID) for the client to access the first application.
Then, the server searches the corresponding session information (session) in the session table of the client and the first application according to the session identifier, and establishes a session between the second application and the client according to the searched session information.
It should be noted that the session identifier and the session information are stored in the session table at the time of session establishment between the first application and the client. Specifically, when a session between the first application and the client is established, the session generated in the session establishment process is serialized, and the session id generated in the session establishment process is saved as a record in a session table, where the structure of the session table may refer to table 1.
TABLE 1
ID session
sessionID Serialized session
Through the method, after the login request is successfully authenticated, the client can add the cookie information corresponding to the login request in all requests for accessing the application under the micro-service architecture by deleting the target access specified in the set-cookie information, so that a session process of the second application and the client is established through the cookie information, and the access to the second application is realized.
Optionally, when the security frameworks of the first application and the second application are different, in the embodiment of the present disclosure, a session between the second application and the client is established according to the searched session information, or available information in the session information may be extracted, and then target session information adapted to the security framework of the second application is generated according to the available information, so as to establish a session between the client and the second application.
Since each application has a security framework under the micro-service architecture, and each security framework has information such as authority, user name, etc., which may be different if the security frameworks are different, when the security frameworks of the first application and the second application are different, if a session between the second application and the client is to be established according to the session information of the first application, it is necessary to generate target session information adapted to the security framework of the second application according to the session information of the first application.
The available information is information required for establishing a session under the security framework of the second application, such as information of authority, user name, etc., and the present disclosure is not limited to the specific content of the available information, as long as target session information adapted to the security framework of the second application can be generated according to the available information.
Optionally, in this embodiment of the present disclosure, after generating the target session information adapted to the security framework of the second application, the target session information may also be saved in the current security view of the second application.
The security view (Subject) is used for saving instant information related to security of the current requesting user, such as saving information of the user sending the access request, information of the authority of the user, and the like, and saving the target session information into the security view can clarify the access authority of the current requesting user to the second application content, so as to realize normal access to the second application.
The method for accessing applications under the microservice architecture provided in the present disclosure is illustrated below by a complete embodiment.
Referring to fig. 2, the first application and the second application are two applications using different security frameworks under a micro-service architecture, a client sends a login request for logging in the first application to a server, where the login request carries user name and password information input by a user, and an API gateway of the server receives the login request and then forwards the login request to the first application.
The first application carries out login authentication on the login request, after the login authentication is successful, session _ B (session information) generated in the process of establishing a session between the first application and the client is serialized, the serialized session _ B and session ID (session identification) generated in the session process are stored in a session table as a record, and a response message for responding the login request is returned, wherein the response message comprises set-cookie information for setting cookie information of the client.
The API gateway intercepts the response message returned by the server, modifies the path in the set-cookie information into "/", and obtains a target response message, so that all requests for accessing the server can be automatically added with cookie _ B information generated in the process of logging in the first application.
That is, when accessing the second application, the client adds cookie _ B information to the request for accessing the second application, and when the server receives the access request for accessing the second application sent by the client, the API gateway forwards the access request to the second application.
When the second application receives the access request, the cookie _ B information is firstly analyzed, the session ID of the client for accessing the first application is obtained, then the session _ B is searched in a session table of the client and the first application according to the session ID, if the session _ B is found, the session _ B is deserialized, the available information in the session _ B is extracted, then the target session information matched with the security framework of the second application is generated according to the available information and is stored in the current security view of the second application, and then the second application can be normally accessed.
It should be noted that, in this embodiment of the present disclosure, if the session _ B is not found in the session table of the client and the first application according to the session identifier, a prompt interface is returned to the client to prompt the user to input a user name and a password to perform login access to the second application.
Based on the same inventive concept, referring to fig. 3, the present disclosure further provides an apparatus 300 for accessing an application under a micro service architecture, including:
a first receiving module 301, configured to receive a login request sent by a client for logging in a first application under a micro service architecture;
a generating module 302, configured to generate a response message for responding to the login request after the login request is successfully authenticated, where the response message includes set-cookie information, and the set-cookie information is used to set cookie information of the client and specify a target access for triggering the client to send the cookie information;
a target response module 303, configured to delete the target access specified in the set-cookie information through an API gateway, to obtain a target response message, where for cookie information for which a target access is not specified, a client carries the cookie information in all requests for accessing an application under the microservice architecture;
a sending module 304, configured to send the target response message to the client.
Optionally, the apparatus 300 further comprises:
a second receiving module, configured to receive an access request sent by the client for accessing a second application under the microservice architecture, where the access request includes the cookie information;
the analysis module is used for analyzing the cookie information to acquire a session identifier of the client accessing the first application;
a searching module, configured to search, according to the session identifier, corresponding session information in a session table between the client and the first application, where the session identifier and the session information are stored in the session table when a session between the first application and the client is established;
and the session establishing module is used for establishing the session between the second application and the client according to the session information.
Optionally, the session establishing module is configured to, in a case that security frameworks of the first application and the second application are different, extract available information in the session information, where the available information is information required to establish a session under the security framework of the second application, and generate, according to the available information, target session information adapted to the security framework of the second application, so as to establish the session between the client and the second application.
Optionally, the apparatus 300 further comprises:
and the storage module is used for storing the target session information into the current security view of the second application.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
By the device for accessing the application under the micro-service architecture in the embodiment, after the login request is successfully authenticated, the target access specified in the set-cookie information corresponding to the login request can be deleted through the API gateway to obtain the target response message, so that after the target response message is sent to the client, the client can add the cookie information corresponding to the login request in all requests for accessing the application under the micro-service architecture, a session process is established through the cookie information, access to the applications using different security frameworks under the micro-service architecture is realized, the security frameworks of the applications do not need to be reconstructed, and time cost and labor cost are greatly saved.
Based on the same inventive concept, an embodiment of the present disclosure further provides a server, where the server adopts a micro-service architecture, and the server includes:
a memory having a computer program stored thereon;
a processor for executing said computer program in said memory to implement the steps of any of the above methods for accessing an application under a microservice architecture.
Fig. 4 is a block diagram illustrating a server 400 according to an example embodiment. Referring to fig. 4, the server 400 includes a processor 422, which may be one or more in number, and a memory 432 for storing computer programs executable by the processor 422. The computer program stored in memory 432 may include one or more modules that each correspond to a set of instructions. Further, the processor 422 may be configured to execute the computer program to perform the above-described method of accessing an application under the microservice architecture.
Additionally, the server 400 may also include a power component 426 and a communication component 450, the power component 426 may be configured to perform power management of the server 400, and the communication component 450 may be configured to enable communication, e.g., wired or wireless communication, of the server 400. The server 400 may also include an input/output (I/O) interface 458. The server 400 may operate based on an operating system stored in memory 432, such as Windows Server, Mac OS XTM, UnixTM, Linux, and the like.
In another exemplary embodiment, a computer readable storage medium comprising program instructions which, when executed by a processor, implement the steps of the above-described method of accessing an application under a microservice architecture is also provided. For example, the computer readable storage medium may be the memory 432 described above that includes program instructions executable by the processor 422 of the server 400 to perform the methods described above for accessing applications under the microservice architecture.
The preferred embodiments of the present disclosure are described in detail with reference to the accompanying drawings, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all belong to the protection scope of the present disclosure.
It should be noted that, in the foregoing embodiments, various features described in the above embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, various combinations that are possible in the present disclosure are not described again.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.

Claims (8)

1. A method for accessing an application under a microservice architecture, comprising:
receiving a login request sent by a client for logging in a first application under a micro-service architecture;
after the login request is successfully authenticated, generating a response message for responding to the login request, wherein the response message comprises set-cookie information, the set-cookie information is used for setting cookie information of the client and specifying target access for triggering the client to send the cookie information;
deleting the specified target access in the set-cookie information through an API gateway to obtain a target response message, wherein for the cookie information of unspecified target access, the client carries the cookie information in all requests for accessing the application under the micro-service architecture;
sending the target response message to the client;
the method further comprises the following steps:
receiving an access request sent by the client for accessing a second application under the micro service architecture, wherein the access request comprises the cookie information;
analyzing the cookie information to acquire a session identifier of the client accessing the first application;
according to the session identification, searching corresponding session information in a session table of the client and the first application, wherein the session identification and the session information are stored in the session table when a session between the first application and the client is established;
and establishing a session between the second application and the client according to the session information.
2. The method of claim 1, wherein the security frameworks of the first application and the second application are different, and wherein establishing the session between the second application and the client according to the session information comprises:
extracting available information in the session information, wherein the available information is information required for establishing a session under a security framework of the second application;
and generating target session information adapted to the security framework of the second application according to the available information so as to establish a session between the client and the second application.
3. The method of claim 2, further comprising:
and saving the target session information to the current security view of the second application.
4. An apparatus for accessing an application under a microservice architecture, comprising:
the first receiving module is used for receiving a login request which is sent by a client and used for logging in a first application under a micro-service architecture;
a generating module, configured to generate a response message for responding to the login request after the login request is successfully authenticated, where the response message includes set-cookie information, and the set-cookie information is used to set cookie information of the client and specify a target access for triggering the client to send the cookie information;
the target response module is used for deleting the target access specified in the set-cookie information through the API gateway to obtain a target response message, wherein for the cookie information of which the target access is not specified, the client carries the cookie information in all requests for accessing the application under the micro-service architecture;
the sending module is used for sending the target response message to the client;
the device further comprises:
a second receiving module, configured to receive an access request sent by the client for accessing a second application under the microservice architecture, where the access request includes the cookie information;
the analysis module is used for analyzing the cookie information to acquire a session identifier of the client accessing the first application;
a searching module, configured to search, according to the session identifier, corresponding session information in a session table between the client and the first application, where the session identifier and the session information are stored in the session table when a session between the first application and the client is established;
and the session establishing module is used for establishing the session between the second application and the client according to the session information.
5. The apparatus of claim 4, wherein the session establishing module is configured to, in a case that security frameworks of the first application and the second application are different, extract available information in the session information, where the available information is information required for establishing a session under the security framework of the second application, and generate target session information adapted to the security framework of the second application according to the available information, so as to establish a session between the client and the second application.
6. The apparatus of claim 5, further comprising:
and the storage module is used for storing the target session information into the current security view of the second application.
7. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3.
8. A server, wherein the server employs a microservice architecture, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to carry out the steps of the method of any one of claims 1 to 3.
CN201811211123.4A 2018-10-17 2018-10-17 Method and device for accessing application under micro-service architecture, storage medium and server Active CN109150913B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811211123.4A CN109150913B (en) 2018-10-17 2018-10-17 Method and device for accessing application under micro-service architecture, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811211123.4A CN109150913B (en) 2018-10-17 2018-10-17 Method and device for accessing application under micro-service architecture, storage medium and server

Publications (2)

Publication Number Publication Date
CN109150913A CN109150913A (en) 2019-01-04
CN109150913B true CN109150913B (en) 2020-12-18

Family

ID=64808534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811211123.4A Active CN109150913B (en) 2018-10-17 2018-10-17 Method and device for accessing application under micro-service architecture, storage medium and server

Country Status (1)

Country Link
CN (1) CN109150913B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639723A (en) * 2019-01-10 2019-04-16 深圳市买买提信息科技有限公司 A kind of micro services access method and server based on ERP system
CN110413349B (en) * 2019-07-31 2022-10-14 中国工商银行股份有限公司 Service calling method and device, electronic equipment and storage medium
CN110661782A (en) * 2019-08-27 2020-01-07 紫光云(南京)数字技术有限公司 Public basic service system based on single sign-on and micro-service architecture and implementation method thereof
CN113568762B (en) * 2021-07-19 2024-06-11 远光软件股份有限公司 Cross-system access method and device and computer readable storage medium thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378376A (en) * 2014-11-18 2015-02-25 深圳中兴网信科技有限公司 SOA-based single-point login method, authentication server and browser
CN107347068A (en) * 2017-07-10 2017-11-14 恒生电子股份有限公司 Single-point logging method and system, electronic equipment
WO2018053122A1 (en) * 2016-09-14 2018-03-22 Oracle International Corporation Single sign-on and single logout functionality for a multi-tenant identity and data security management cloud service

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10878079B2 (en) * 2016-05-11 2020-12-29 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378376A (en) * 2014-11-18 2015-02-25 深圳中兴网信科技有限公司 SOA-based single-point login method, authentication server and browser
WO2018053122A1 (en) * 2016-09-14 2018-03-22 Oracle International Corporation Single sign-on and single logout functionality for a multi-tenant identity and data security management cloud service
CN107347068A (en) * 2017-07-10 2017-11-14 恒生电子股份有限公司 Single-point logging method and system, electronic equipment

Also Published As

Publication number Publication date
CN109150913A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN109150913B (en) Method and device for accessing application under micro-service architecture, storage medium and server
CN108306877B (en) NODE JS-based user identity information verification method and device and storage medium
US10021098B2 (en) Account login method, device, and system
KR102029277B1 (en) Device Identifier-Dependent Operation Processing for Packet-Based Data Communications
WO2017000830A1 (en) Cross-terminal login-free method and device
CN112261172B (en) Service addressing access method, device, system, equipment and medium
US20140033286A1 (en) Online user account login method and a server system implementing the method
US20150143475A1 (en) Operation Processing Method and Device
US9398075B2 (en) Communication system, communication apparatus, communication method, and storage medium
CN107079026B (en) Method, system and storage medium for pairing client application instances with user accounts
EP2633667A2 (en) System and method for on the fly protocol conversion in obtaining policy enforcement information
WO2017088634A1 (en) Third-party application authentication method, authentication server, terminal and management server
WO2015074443A1 (en) An operation processing method and device
CN104753960B (en) A kind of system configuration management method based on single-sign-on
CN111585786A (en) Realization of secret-free building method of big data cluster
CN109558710B (en) User login method, device, system and storage medium
CN112966262A (en) Method and device for generating operation log, electronic equipment and storage medium
CN116886428A (en) Service authentication method, system and related equipment
CN111666509A (en) Cross-network geographic data-based cloud query method and system
CN108737350B (en) Information processing method and client
CN112153103B (en) Session management method, device, computer equipment and storage medium
CN112511569B (en) Method and system for processing network resource access request and computer equipment
CN115664686A (en) Login method, login device, computer equipment and storage medium
CN105827667A (en) HTTP access control method, server and monitoring system
CN112632516A (en) User login method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant