CN115499162A - Single sign-on method for solving problem of reconstruction-inconvenient application service - Google Patents

Single sign-on method for solving problem of reconstruction-inconvenient application service Download PDF

Info

Publication number
CN115499162A
CN115499162A CN202210979836.5A CN202210979836A CN115499162A CN 115499162 A CN115499162 A CN 115499162A CN 202210979836 A CN202210979836 A CN 202210979836A CN 115499162 A CN115499162 A CN 115499162A
Authority
CN
China
Prior art keywords
application service
user
intermediate interface
single sign
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210979836.5A
Other languages
Chinese (zh)
Other versions
CN115499162B (en
Inventor
程峰
李耀
彭磊
杨志文
陶佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhongbang Bank Co Ltd
Original Assignee
Wuhan Zhongbang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhongbang Bank Co Ltd filed Critical Wuhan Zhongbang Bank Co Ltd
Priority to CN202210979836.5A priority Critical patent/CN115499162B/en
Publication of CN115499162A publication Critical patent/CN115499162A/en
Application granted granted Critical
Publication of CN115499162B publication Critical patent/CN115499162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to the technical field of single sign-on, and provides a single sign-on method for solving the problem of reconstruction inconvenience of application services. The scheme includes that an application service A calls an intermediate interface, the intermediate interface and the application service A perform interactive verification on a user login state, and if the login fails, the intermediate interface is called to the application service A to perform login again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A; the intermediate interface interacts with the C application service to acquire a dynamic token leading to the C application service; the intermediate interface uses the user name obtained from the application service A and the dynamic token obtained from the application service C to access the application service C, and single sign-on from the application service A to the application service C is completed; and the application service B interacts with the application service C, and the application service B logs in a user to acquire a dynamic token leading to the application service C, accesses the application service C and completes single sign-on from the application service B to the application service C.

Description

Single sign-on method for solving problem of reconstruction-inconvenient application service
Technical Field
The invention relates to the technical fields of Java, spring MVC, maven, mybatis, html and the like, and provides a single sign-on method for solving the problem of reconstruction inconvenience of application services.
Background
With the high-speed development of informatization, various industries start to use electronic systems for office work, and meanwhile, the single sign-on technology is widely applied, so that a user can access a plurality of subsystems only by logging on once without recording a plurality of user passwords and passwords, the user can conveniently and quickly access the system, and the working efficiency is improved.
With the continuous growth of services, single sign-on relates to more and more systems, all the systems need to be compatible, reconstruction of the systems is time-consuming, and in order to solve the defect that single sign-on is not beneficial to reconstruction and simultaneously meet the requirement of multi-party integration of the same system, a mode for realizing an intermediate interface is provided to make up for the defect that single sign-on is inconvenient to reconstruct.
The following scenario examples were analyzed and a feasible solution was proposed.
Scene: the B system and the C system need to realize single sign-on through the A, and the B system needs to integrate the resource page of the C system and the single sign-on.
Figure BDA0003799358840000011
And (2) reconfiguration: on the basis of original software and hardware resources of the system, the system can flexibly change the self system structure, function and the like according to different application requirements, so that the system can quickly adapt to the requirement change.
Inconvenient reconstitution: on the basis of original software and hardware resources of the system, the structure, the function and the like of the system can not be flexibly adjusted in a short time, so that the system can be quickly adapted to the change of the demand, and the reconstruction is time-consuming and labor-consuming.
The integration mode of each system is analyzed through the table, and the following scheme is proposed:
after respective characteristics of the ABC systems are analyzed, a bridge is built between the A system and the C system to solve the integration problem of the two systems, and meanwhile, the integration of the B system and the C system is not influenced. As shown in fig. 1.
The technical scheme provided by the time mainly solves the problem that the A and C systems are not beneficial to reconstruction and expansion.
An intermediate interface is developed between the A and C systems to realize the single sign-on of the A and C systems.
Because the system B can be reconstructed, for the system A and the system B, the unified authentication single sign-on integration is completed by adopting an Oauth2 integration mode provided by the system A; for B and C, any one of the 3 ways provided by the C system may be adopted for integration, and the integration implementation of a and B, and B and C is not described here.
Disclosure of Invention
The invention aims to solve the defect that single sign-on is not beneficial to reconstruction and simultaneously meet the requirement of multi-party integration of the same system, and provides a mode for realizing an intermediate interface to make up the defect that single sign-on is not convenient to reconstruct.
In order to achieve the purpose, the invention adopts the following technical scheme:
a single sign-on method for solving the problem of inconvenient reconstruction of application services comprises the following steps:
step a, the application service A calls an intermediate interface, the intermediate interface and the application service A carry out interactive verification on the user login state, and if the user login fails, the application service A is called to log in again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A;
step b, the intermediate interface interacts with the application service C to acquire a dynamic token leading to the application service C;
c, the intermediate interface accesses the application service C by using the user name obtained from the application service A and the dynamic token obtained from the application service C to finish single sign-on from the application service A to the application service C;
and d, the application service B interacts with the application service C, the application service B logs in the user, acquires the dynamic token leading to the application service C, accesses the application service C and finishes single sign-on from the application service B to the application service C.
In the above technical solution, the step a specifically includes:
step a11.A, the application service performs access operation on the intermediate interface;
step a12, the intermediate interface and the application A perform interactive authentication to obtain the information of the user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
and step a13. The application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information in the application service C, and the user information of the application service A is synchronized to the application service C.
In the above technical solution, the step b specifically includes:
and b11, calling the authentication service login of the application C by the intermediate interface, and acquiring a login dynamic Token.
In the above technical solution, the step c specifically includes:
and C11, accessing the C application service through the user name obtained in the step a12 and the dynamic Token obtained in the step b11 by an HTTP protocol, and completing single sign-on from the A application service to the C application service.
In the above technical solution, the step d specifically includes:
step d11.B application service calls authentication service login of C application, and acquires a login dynamic Token;
and d12, accessing the C application service through the HTTP protocol by the login dynamic Token acquired in the step d11 and the user logged in by the B application service, and completing single sign-on from the B application service to the C application service.
In the above technical solution, the intermediate interface implementation step:
step 1, the intermediate interface adopts CAS filter configuration, a service address and a filter of an authentication center of the system A are configured in web.
Step 2, accessing the url address of the intermediate interface system as' ip: jsp' of the system, performing single sign-on authentication according to the filter set in the step 1, if the user does not log in, jumping to an authentication interface of a server of the system A, and if the user logs in, acquiring information of the user logging in the system A by the intermediate interface system through a getRemoteUser () method of an HttpServletRequest;
getremoteUser () is a built-in method provided by a jsp page, and can be used for acquiring login user information after CAS single sign-on;
step 3, analyzing the user information obtained in the step 2 by the intermediate interface system in a Map, JSONobject and other modes to obtain a username;
step 4, the url address of the username value obtained in the step 3 passing through the intermediate interface system is' ip: a user name is transmitted into a getUserTokenToBi () method by a port/loginbi, a user login interface of an SDK service of a C system is called in the getUserTokenToBi () method, a token dynamic token is obtained, and a concatenation url address is "ip: port/bitoken & username "and returns the url address as a json to lognsso.
getUserTokenToBi () implements the logic: reading a configuration file to obtain a server address url, a user name userNm and a password pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives the return value of the getUserTokenToBi () method, and the url address is "ip: and the port/bitoken & username uses a Window Location mode of JavaScript to process url into "ip: port/bi? And (5) token & username', jumping to the home page index.
In the above technical solution, the intermediate interface further includes a step of user synchronization:
step 2.1, when the user information changes, the system A calls the url address of the intermediate interface system to be' ip: do ", pass user information (JSON) into getdatafrmmothsys ().
And 2.2, analyzing and splitting the JSON character string of the user by the getDataFrmOthSys () method, acquiring related information of the user name, the job number, the mailbox, the department and the like, and storing the related information into a database of the C system.
In the scheme, getDataFrmOthSys () implements the logic: converting the received JSON characters into JSONArrary objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArrary objects and converting the JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.
Because the invention adopts the technical scheme, the invention has the following beneficial effects:
1) The invention is based on web application built by a java SSM framework, adopts the technical scheme to complete the bidirectional interaction of the A system and the C system, plays a role of a bridge in the middle and completes the seamless butt joint of the systems.
2) The single sign-on system solves the problem that the functional structure of the system cannot be flexibly adjusted in a short time and can be quickly adapted to the requirement change by adopting the technical scheme.
3) The technology is portable and reconfigurable, can reduce the development cost of systems inconvenient to reconfigure, meets the service requirements, and is widely applied to various systems.
Drawings
FIG. 1 is a flow diagram of an intermediate interface access application;
FIG. 2 is a diagram illustrating a solution for inconvenient reconfiguration of an application system;
FIG. 3 is an intermediate interface software architecture.
Detailed Description
Hereinafter, a detailed description will be given of embodiments of the present invention. While the invention will be described and illustrated in connection with certain specific embodiments thereof, it should be understood that the invention is not limited to those embodiments. Rather, modifications and equivalents of the invention are intended to be included within the scope of the claims.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present invention. It will be understood by those skilled in the art that the present invention may be practiced without these specific details.
The method provided by the invention realizes the single sign-on of the application service A to the application service C and the single sign-on of the application service B to the application service C.
A single sign-on method for solving the problem of inconvenient reconstruction of application services comprises the following steps:
step a, the application service A calls an intermediate interface, the intermediate interface and the application service A carry out interactive verification on the login state of the user, and if the user login is invalid, the application service A is called to log in again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A;
step b, the intermediate interface interacts with the application service C to acquire a dynamic token leading to the application service C;
c, the intermediate interface accesses the application service C by using the user name obtained from the application service A and the dynamic token obtained from the application service C to finish single sign-on from the application service A to the application service C;
and d, the application service B interacts with the application service C, the application service B logs in the user, acquires the dynamic token leading to the application service C, accesses the application service C and finishes single sign-on from the application service B to the application service C.
In the above technical solution, the step a specifically includes:
step a11.A, the application service performs access operation on the intermediate interface;
step a12, the intermediate interface and the application A perform interactive authentication to obtain the information of the user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
and step a13. The application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information in the C application service, and the synchronization of the user information of the A application service to the C application service is completed.
In the above technical solution, the step b specifically includes:
and b11, calling the authentication service login of the application C by the intermediate interface, and acquiring a login dynamic Token.
In the above technical solution, the step c specifically includes:
and C11, accessing the C application service through the user name obtained in the step a12 and the dynamic Token obtained in the step b11 by an HTTP protocol, and completing single sign-on from the A application service to the C application service.
In the above technical solution, the step d specifically includes:
step d11.B application service calls authentication service login of C application, and acquires login dynamic Token;
and d12, accessing the C application service through the HTTP protocol by the login dynamic Token acquired in the step d11 and the user logged in by the B application service, and completing single-point login from the B application service to the C application service.
In the above technical solution, the intermediate interface implementation step:
step 1, the intermediate interface adopts CAS filter configuration, and a service address and a filter of an authentication center of the system A are configured in web.xml for carrying out uniform authentication filtering on url requests provided by the intermediate interface.
Step 2, accessing the url address of the intermediate interface system as' ip: jsp' when the port/loginnSso, performing single sign-on authentication according to the filter set in the step 1, if the user does not log in, jumping to an authentication interface of a server of the system A, and if the user logs in, acquiring information of the login user of the system A by the intermediate interface system through a getRemoteUser () method of HttpServletRequest;
getremoteUser () is a built-in method provided by a jsp page, and can be used for acquiring login user information after CAS single sign-on;
step 3, analyzing the user information obtained in the step 2 by the intermediate interface system in a Map, JSONobject and other modes to obtain a username;
step 4, the url address of the username value obtained in the step 3 passing through the intermediate interface system is' ip: a user name is transmitted into a getUserTokenToBi () method through a port/loginBi, the user login interface of the SDK service of the C system is called in the getUserTokenToBi () method, a token dynamic token is obtained, and the obtained token dynamic token and the transmitted username are used for splicing url addresses which are' ip: port/bitoken & username "and returns the url address as a json to lognsso.
getUserTokenToBi () implements the logic: reading the configuration file to obtain a server address url, a user name userNm and a password pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives the return value of the getUserTokenToBi () method, and the url address is "ip: and the port/bitoken & username uses a Window Location mode of JavaScript to process url into "ip: port/bi? And (5) token & username, jumping to the first page index.
In the above technical solution, the intermediate interface further includes a step of user synchronization:
step 2.1, when the user information changes, the system A calls the url address of the intermediate interface system to be 'ip' in an apiush mode: do ", pass user information (JSON) into getdatafrmmothsys ().
And 2.2, analyzing and splitting the JSON character string of the user by a getDataFrmOthSys () method, acquiring related information such as the name, the user name, the work number, the mailbox, the department and the like of the user, and storing the related information into a database of the C system.
In the scheme, getDataFrmOthSys () implements the logic: converting the received JSON characters into JSONArraray objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArraray objects and converting the JSONArraray objects into List objects of user information, and then calling a mapper realized based on a Mybatis framework to store the user information into a database in batches.
The implementation logic steps of the intermediate interface are as follows:
the intermediate interface adopts web application built by components such as SSM, JSP, CSS, html, jquery and the like, and is a set of extensible, portable and reconfigurable system for solving the problem that the single sign-on of a unified authentication system is inconvenient to reconfigure.
The intermediate interface software architecture, as shown in fig. 3.
Single sign-on integration
And the intermediate interface adopts CAS filter configuration, and configures the service address, the filter (filter) and the like of the authentication center of the A system in web.xml, so as to perform uniform authentication filtering on url requests provided by the intermediate interface.
The url address for accessing the intermediate interface system is "ip: jsp ", performing single sign-on authentication according to the filter set in the step 1, if the user does not log in, jumping to an authentication interface of a server of the system A, and if the user logs in, acquiring information (JSON) of the logged-in user of the system A by the intermediate interface system through a getRemoteUser () method of HttpServletRequest.
Getremoteuser () is a built-in method provided by a jsp page, and can be used to acquire login user information after CAS single sign-on.
And (3) analyzing the user information acquired in the step (2) by the intermediate interface system in a Map, JSONobject and other modes to obtain a user name (username).
And (3) setting the url address of the user name (username) obtained in the step (3) through the intermediate interface system as' ip: a user name is transmitted into a getUserTokenToBi () method by a port/loginbi.dousername = user name ", a user login interface of an SDK service of a C system is called in the getUserTokenToBi () method, a token dynamic token is obtained, and a concatenation url address is" ip: port/bi? token & username "and returns the url address as a json to loginsso.
getUserTokenToBi () implements the logic: reading a configuration file to obtain a server address url, a user name userNm and a password (encrypted) pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives getUserTokenToBi () mode return value url address is "ip: port/bi? token & username ", using JavaScript Window Location to process url as" ip: port/bi? And (5) token & username, jumping to the first page index.
(II) user synchronization
1. When the user information changes, the system A calls the url address of the intermediate interface system in an apiush mode to be' ip: do ", pass user information (JSON) into getdatafrmmothsys ().
2. The getDataFrmOthSys () method analyzes and splits the JSON character string of the user, acquires the related information of the user name, job number, mailbox, department and the like, and stores the related information into the database of the C system.
getDataFrmOthSys () implements the logic: converting the received JSON characters into JSONArraray objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArraray objects and converting the JSONArraray objects into List objects of user information, and then calling a mapper realized based on a Mybatis framework to store the user information into a database in batches.

Claims (8)

1.A single sign-on method for resolving the problem of inconvenient reconstruction of application services,
step a, the application service A calls an intermediate interface, the intermediate interface and the application service A carry out interactive verification on the user login state, and if the user login fails, the application service A is called to log in again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A;
b, the intermediate interface interacts with the application service C to acquire a dynamic token leading to the application service C;
step C, the intermediate interface uses the user name obtained from the application service A and the dynamic token obtained from the application service C to access the application service C, and single sign-on from the application service A to the application service C is completed;
and d, the application service B interacts with the application service C, the application service B logs in the user, acquires the dynamic token leading to the application service C, accesses the application service C and finishes single sign-on from the application service B to the application service C.
2. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the step a specifically includes:
step a11.A, the application service performs access operation on the intermediate interface;
step a12, the intermediate interface and the application single sign-on A perform interactive authentication to obtain the information of the user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
and step a13. The application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information in the C application service, and the synchronization of the user information of the A application service to the C application service is completed.
3. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the step b specifically comprises:
and b11, calling the authentication service login of the application C by the intermediate interface, and acquiring a login dynamic Token.
4. The method for solving the single sign-on problem of the reconstruction application service with the inconvenient reconstruction problem as recited in claims 2 and 3, wherein the step c specifically comprises:
and C11, accessing the C application service through the user name obtained in the step a12 and the dynamic Token obtained in the step b11 by an HTTP protocol, and completing single sign-on from the A application service to the C application service.
5. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the step d specifically includes:
step d11.B application service calls authentication service login of C application, and acquires a login dynamic Token;
and d12, accessing the C application service through the HTTP protocol by the login dynamic Token acquired in the step d11 and the user logged in by the B application service, and completing single-point login from the B application service to the C application service.
6. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the intermediate interface implements the steps of:
step 1, the intermediate interface adopts CAS filter configuration, and a service address and a filter of an authentication center of the system A are configured in web.xml for carrying out uniform authentication filtering on url requests provided by the intermediate interface.
Step 2, accessing the url address of the intermediate interface system as' ip: jsp' of the system, performing single sign-on authentication according to the filter set in the step 1, if the user does not log in, jumping to an authentication interface of a server of the system A, and if the user logs in, acquiring information of the user logging in the system A by the intermediate interface system through a getRemoteUser () method of an HttpServletRequest;
getremoteUser () is a built-in method provided by a jsp page, and can be used for acquiring login user information after CAS single sign-on;
step 3, analyzing the user information obtained in the step 2 by the intermediate interface system in a Map, JSONobject and other modes to obtain a username;
step 4, the url address of the username value obtained in the step 3 passing through the intermediate interface system is' ip: a user name is transmitted into a getUserTokenToBi () method by a port/loginbi, a user login interface of an SDK service of a C system is called in the getUserTokenToBi () method, a token dynamic token is obtained, and a concatenation url address is "ip: port/bitoken & username "and returns the url address as a json to lognsso.
getUserTokenToBi () implements the logic: reading a configuration file to obtain a server address url, a user name userNm and a password pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives a return value of the getUserTokenToBi () method, and the url address is' ip: port/bi? token & username ", using a Window Location mode of JavaScript to process url into" ip: port/bi? And (5) token & username', jumping to the home page index.
7. The method for resolving single sign-on for an un-reconfigurable fabric application service as recited in claim 1, wherein the intermediate interface further comprises the step of user synchronization:
step 2.1, when the user information changes, the system A calls the url address of the intermediate interface system to be 'ip' in an apiush mode: do ", pass user information (JSON) into getdatafrmmothsys ().
And 2.2, analyzing and splitting the JSON character string of the user by a getDataFrmOthSys () method, acquiring related information such as the name, the user name, the work number, the mailbox, the department and the like of the user, and storing the related information into a database of the C system.
8. The method for resolving single sign-on for an inconvenient re-configuration application service of claim 1, wherein getDataFrmOthSys () implements logic to: converting the received JSON characters into JSONArrary objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArrary objects and converting the JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.
CN202210979836.5A 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service Active CN115499162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210979836.5A CN115499162B (en) 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210979836.5A CN115499162B (en) 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service

Publications (2)

Publication Number Publication Date
CN115499162A true CN115499162A (en) 2022-12-20
CN115499162B CN115499162B (en) 2024-07-19

Family

ID=84466499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210979836.5A Active CN115499162B (en) 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service

Country Status (1)

Country Link
CN (1) CN115499162B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117786651A (en) * 2024-02-27 2024-03-29 杭州玳数科技有限公司 Method and device for realizing single sign-on based on java class loader

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050204148A1 (en) * 2004-03-10 2005-09-15 American Express Travel Related Services Company, Inc. Security session authentication system and method
US20170041296A1 (en) * 2015-08-05 2017-02-09 Intralinks, Inc. Systems and methods of secure data exchange
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050204148A1 (en) * 2004-03-10 2005-09-15 American Express Travel Related Services Company, Inc. Security session authentication system and method
US20170041296A1 (en) * 2015-08-05 2017-02-09 Intralinks, Inc. Systems and methods of secure data exchange
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李小标;温巧燕;代战锋;: "PKI/PMI支持多模式应用的单点登录方案", 北京邮电大学学报, no. 03, 15 June 2009 (2009-06-15) *
洪生: "基于CAS与令牌的单点授权实现", 《信息化研究》, vol. 47, no. 02, 20 April 2021 (2021-04-20), pages 70 - 73 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117786651A (en) * 2024-02-27 2024-03-29 杭州玳数科技有限公司 Method and device for realizing single sign-on based on java class loader
CN117786651B (en) * 2024-02-27 2024-06-07 杭州玳数科技有限公司 Method and device for realizing single sign-on based on java class loader

Also Published As

Publication number Publication date
CN115499162B (en) 2024-07-19

Similar Documents

Publication Publication Date Title
CN109314704B (en) Single sign-on and single sign-off functions for multi-tenant identity and data security management cloud services
CN103475726B (en) A kind of virtual desktop management, server and client side
CN103581213B (en) A kind of application process of shared Hosts files, equipment and system
WO2017097123A1 (en) Access request conversion method and device
CN112235285B (en) Method and system for user authentication mode and service based on non-session
CN108353095A (en) Domain name analytic method, client, fringe node and domain name analysis system
CN103023933B (en) A kind of log-on message Integrated Processing System and method
CN106685949A (en) Container access method, container access device and container access system
CN112541190B (en) Map authority control method and control system based on unified user information
CN105516171B (en) Portal keep-alive system and method, Verification System and method based on authentication service cluster
JP7398580B2 (en) Partner integration network
CN102739678B (en) Single-sign-on treatment system and single-sign-on processing method
CN106169963A (en) The access method of service page and system, proxy server
CN101656609A (en) Single sign-on method, system and device thereof
CN109783357A (en) The method and device of test application program, computer equipment, storage medium
CN110401641A (en) User authen method, device, electronic equipment
CN115499162A (en) Single sign-on method for solving problem of reconstruction-inconvenient application service
CN111585786A (en) Realization of secret-free building method of big data cluster
CN106936660B (en) Data acquisition method and device
CN102299945A (en) Gateway configuration page registration method, system thereof and portal certificate server
CN108683651A (en) A kind of single-point logging method, server-side and system
WO2015131606A1 (en) Object information processing method, device and ors application gateway
CN113377454A (en) Method for realizing Flink dynamic connection Kerberos authentication component
Sarkar Nginx 1 web server implementation cookbook
CN109639433B (en) Method, storage medium and processor for mutual authorization between multiple system accounts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant