CN115499162A - Single sign-on method for solving problem of reconstruction-inconvenient application service - Google Patents
Single sign-on method for solving problem of reconstruction-inconvenient application service Download PDFInfo
- Publication number
- CN115499162A CN115499162A CN202210979836.5A CN202210979836A CN115499162A CN 115499162 A CN115499162 A CN 115499162A CN 202210979836 A CN202210979836 A CN 202210979836A CN 115499162 A CN115499162 A CN 115499162A
- Authority
- CN
- China
- Prior art keywords
- application service
- user
- intermediate interface
- single sign
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000002452 interceptive effect Effects 0.000 claims abstract description 7
- 238000012795 verification Methods 0.000 claims abstract description 4
- 230000009191 jumping Effects 0.000 claims description 8
- 238000001914 filtration Methods 0.000 claims description 3
- 239000004744 fabric Substances 0.000 claims 1
- 230000010354 integration Effects 0.000 description 10
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000007547 defect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Stored Programmes (AREA)
Abstract
The invention relates to the technical field of single sign-on, and provides a single sign-on method for solving the problem of reconstruction inconvenience of application services. The scheme includes that an application service A calls an intermediate interface, the intermediate interface and the application service A perform interactive verification on a user login state, and if the login fails, the intermediate interface is called to the application service A to perform login again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A; the intermediate interface interacts with the C application service to acquire a dynamic token leading to the C application service; the intermediate interface uses the user name obtained from the application service A and the dynamic token obtained from the application service C to access the application service C, and single sign-on from the application service A to the application service C is completed; and the application service B interacts with the application service C, and the application service B logs in a user to acquire a dynamic token leading to the application service C, accesses the application service C and completes single sign-on from the application service B to the application service C.
Description
Technical Field
The invention relates to the technical fields of Java, spring MVC, maven, mybatis, html and the like, and provides a single sign-on method for solving the problem of reconstruction inconvenience of application services.
Background
With the high-speed development of informatization, various industries start to use electronic systems for office work, and meanwhile, the single sign-on technology is widely applied, so that a user can access a plurality of subsystems only by logging on once without recording a plurality of user passwords and passwords, the user can conveniently and quickly access the system, and the working efficiency is improved.
With the continuous growth of services, single sign-on relates to more and more systems, all the systems need to be compatible, reconstruction of the systems is time-consuming, and in order to solve the defect that single sign-on is not beneficial to reconstruction and simultaneously meet the requirement of multi-party integration of the same system, a mode for realizing an intermediate interface is provided to make up for the defect that single sign-on is inconvenient to reconstruct.
The following scenario examples were analyzed and a feasible solution was proposed.
Scene: the B system and the C system need to realize single sign-on through the A, and the B system needs to integrate the resource page of the C system and the single sign-on.
And (2) reconfiguration: on the basis of original software and hardware resources of the system, the system can flexibly change the self system structure, function and the like according to different application requirements, so that the system can quickly adapt to the requirement change.
Inconvenient reconstitution: on the basis of original software and hardware resources of the system, the structure, the function and the like of the system can not be flexibly adjusted in a short time, so that the system can be quickly adapted to the change of the demand, and the reconstruction is time-consuming and labor-consuming.
The integration mode of each system is analyzed through the table, and the following scheme is proposed:
after respective characteristics of the ABC systems are analyzed, a bridge is built between the A system and the C system to solve the integration problem of the two systems, and meanwhile, the integration of the B system and the C system is not influenced. As shown in fig. 1.
The technical scheme provided by the time mainly solves the problem that the A and C systems are not beneficial to reconstruction and expansion.
An intermediate interface is developed between the A and C systems to realize the single sign-on of the A and C systems.
Because the system B can be reconstructed, for the system A and the system B, the unified authentication single sign-on integration is completed by adopting an Oauth2 integration mode provided by the system A; for B and C, any one of the 3 ways provided by the C system may be adopted for integration, and the integration implementation of a and B, and B and C is not described here.
Disclosure of Invention
The invention aims to solve the defect that single sign-on is not beneficial to reconstruction and simultaneously meet the requirement of multi-party integration of the same system, and provides a mode for realizing an intermediate interface to make up the defect that single sign-on is not convenient to reconstruct.
In order to achieve the purpose, the invention adopts the following technical scheme:
a single sign-on method for solving the problem of inconvenient reconstruction of application services comprises the following steps:
step a, the application service A calls an intermediate interface, the intermediate interface and the application service A carry out interactive verification on the user login state, and if the user login fails, the application service A is called to log in again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A;
step b, the intermediate interface interacts with the application service C to acquire a dynamic token leading to the application service C;
c, the intermediate interface accesses the application service C by using the user name obtained from the application service A and the dynamic token obtained from the application service C to finish single sign-on from the application service A to the application service C;
and d, the application service B interacts with the application service C, the application service B logs in the user, acquires the dynamic token leading to the application service C, accesses the application service C and finishes single sign-on from the application service B to the application service C.
In the above technical solution, the step a specifically includes:
step a11.A, the application service performs access operation on the intermediate interface;
step a12, the intermediate interface and the application A perform interactive authentication to obtain the information of the user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
and step a13. The application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information in the application service C, and the user information of the application service A is synchronized to the application service C.
In the above technical solution, the step b specifically includes:
and b11, calling the authentication service login of the application C by the intermediate interface, and acquiring a login dynamic Token.
In the above technical solution, the step c specifically includes:
and C11, accessing the C application service through the user name obtained in the step a12 and the dynamic Token obtained in the step b11 by an HTTP protocol, and completing single sign-on from the A application service to the C application service.
In the above technical solution, the step d specifically includes:
step d11.B application service calls authentication service login of C application, and acquires a login dynamic Token;
and d12, accessing the C application service through the HTTP protocol by the login dynamic Token acquired in the step d11 and the user logged in by the B application service, and completing single sign-on from the B application service to the C application service.
In the above technical solution, the intermediate interface implementation step:
step 1, the intermediate interface adopts CAS filter configuration, a service address and a filter of an authentication center of the system A are configured in web.
getremoteUser () is a built-in method provided by a jsp page, and can be used for acquiring login user information after CAS single sign-on;
getUserTokenToBi () implements the logic: reading a configuration file to obtain a server address url, a user name userNm and a password pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives the return value of the getUserTokenToBi () method, and the url address is "ip: and the port/bitoken & username uses a Window Location mode of JavaScript to process url into "ip: port/bi? And (5) token & username', jumping to the home page index.
In the above technical solution, the intermediate interface further includes a step of user synchronization:
step 2.1, when the user information changes, the system A calls the url address of the intermediate interface system to be' ip: do ", pass user information (JSON) into getdatafrmmothsys ().
And 2.2, analyzing and splitting the JSON character string of the user by the getDataFrmOthSys () method, acquiring related information of the user name, the job number, the mailbox, the department and the like, and storing the related information into a database of the C system.
In the scheme, getDataFrmOthSys () implements the logic: converting the received JSON characters into JSONArrary objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArrary objects and converting the JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.
Because the invention adopts the technical scheme, the invention has the following beneficial effects:
1) The invention is based on web application built by a java SSM framework, adopts the technical scheme to complete the bidirectional interaction of the A system and the C system, plays a role of a bridge in the middle and completes the seamless butt joint of the systems.
2) The single sign-on system solves the problem that the functional structure of the system cannot be flexibly adjusted in a short time and can be quickly adapted to the requirement change by adopting the technical scheme.
3) The technology is portable and reconfigurable, can reduce the development cost of systems inconvenient to reconfigure, meets the service requirements, and is widely applied to various systems.
Drawings
FIG. 1 is a flow diagram of an intermediate interface access application;
FIG. 2 is a diagram illustrating a solution for inconvenient reconfiguration of an application system;
FIG. 3 is an intermediate interface software architecture.
Detailed Description
Hereinafter, a detailed description will be given of embodiments of the present invention. While the invention will be described and illustrated in connection with certain specific embodiments thereof, it should be understood that the invention is not limited to those embodiments. Rather, modifications and equivalents of the invention are intended to be included within the scope of the claims.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present invention. It will be understood by those skilled in the art that the present invention may be practiced without these specific details.
The method provided by the invention realizes the single sign-on of the application service A to the application service C and the single sign-on of the application service B to the application service C.
A single sign-on method for solving the problem of inconvenient reconstruction of application services comprises the following steps:
step a, the application service A calls an intermediate interface, the intermediate interface and the application service A carry out interactive verification on the login state of the user, and if the user login is invalid, the application service A is called to log in again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A;
step b, the intermediate interface interacts with the application service C to acquire a dynamic token leading to the application service C;
c, the intermediate interface accesses the application service C by using the user name obtained from the application service A and the dynamic token obtained from the application service C to finish single sign-on from the application service A to the application service C;
and d, the application service B interacts with the application service C, the application service B logs in the user, acquires the dynamic token leading to the application service C, accesses the application service C and finishes single sign-on from the application service B to the application service C.
In the above technical solution, the step a specifically includes:
step a11.A, the application service performs access operation on the intermediate interface;
step a12, the intermediate interface and the application A perform interactive authentication to obtain the information of the user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
and step a13. The application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information in the C application service, and the synchronization of the user information of the A application service to the C application service is completed.
In the above technical solution, the step b specifically includes:
and b11, calling the authentication service login of the application C by the intermediate interface, and acquiring a login dynamic Token.
In the above technical solution, the step c specifically includes:
and C11, accessing the C application service through the user name obtained in the step a12 and the dynamic Token obtained in the step b11 by an HTTP protocol, and completing single sign-on from the A application service to the C application service.
In the above technical solution, the step d specifically includes:
step d11.B application service calls authentication service login of C application, and acquires login dynamic Token;
and d12, accessing the C application service through the HTTP protocol by the login dynamic Token acquired in the step d11 and the user logged in by the B application service, and completing single-point login from the B application service to the C application service.
In the above technical solution, the intermediate interface implementation step:
step 1, the intermediate interface adopts CAS filter configuration, and a service address and a filter of an authentication center of the system A are configured in web.xml for carrying out uniform authentication filtering on url requests provided by the intermediate interface.
getremoteUser () is a built-in method provided by a jsp page, and can be used for acquiring login user information after CAS single sign-on;
getUserTokenToBi () implements the logic: reading the configuration file to obtain a server address url, a user name userNm and a password pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives the return value of the getUserTokenToBi () method, and the url address is "ip: and the port/bitoken & username uses a Window Location mode of JavaScript to process url into "ip: port/bi? And (5) token & username, jumping to the first page index.
In the above technical solution, the intermediate interface further includes a step of user synchronization:
step 2.1, when the user information changes, the system A calls the url address of the intermediate interface system to be 'ip' in an apiush mode: do ", pass user information (JSON) into getdatafrmmothsys ().
And 2.2, analyzing and splitting the JSON character string of the user by a getDataFrmOthSys () method, acquiring related information such as the name, the user name, the work number, the mailbox, the department and the like of the user, and storing the related information into a database of the C system.
In the scheme, getDataFrmOthSys () implements the logic: converting the received JSON characters into JSONArraray objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArraray objects and converting the JSONArraray objects into List objects of user information, and then calling a mapper realized based on a Mybatis framework to store the user information into a database in batches.
The implementation logic steps of the intermediate interface are as follows:
the intermediate interface adopts web application built by components such as SSM, JSP, CSS, html, jquery and the like, and is a set of extensible, portable and reconfigurable system for solving the problem that the single sign-on of a unified authentication system is inconvenient to reconfigure.
The intermediate interface software architecture, as shown in fig. 3.
Single sign-on integration
And the intermediate interface adopts CAS filter configuration, and configures the service address, the filter (filter) and the like of the authentication center of the A system in web.xml, so as to perform uniform authentication filtering on url requests provided by the intermediate interface.
The url address for accessing the intermediate interface system is "ip: jsp ", performing single sign-on authentication according to the filter set in the step 1, if the user does not log in, jumping to an authentication interface of a server of the system A, and if the user logs in, acquiring information (JSON) of the logged-in user of the system A by the intermediate interface system through a getRemoteUser () method of HttpServletRequest.
Getremoteuser () is a built-in method provided by a jsp page, and can be used to acquire login user information after CAS single sign-on.
And (3) analyzing the user information acquired in the step (2) by the intermediate interface system in a Map, JSONobject and other modes to obtain a user name (username).
And (3) setting the url address of the user name (username) obtained in the step (3) through the intermediate interface system as' ip: a user name is transmitted into a getUserTokenToBi () method by a port/loginbi.dousername = user name ", a user login interface of an SDK service of a C system is called in the getUserTokenToBi () method, a token dynamic token is obtained, and a concatenation url address is" ip: port/bi? token & username "and returns the url address as a json to loginsso.
getUserTokenToBi () implements the logic: reading a configuration file to obtain a server address url, a user name userNm and a password (encrypted) pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives getUserTokenToBi () mode return value url address is "ip: port/bi? token & username ", using JavaScript Window Location to process url as" ip: port/bi? And (5) token & username, jumping to the first page index.
(II) user synchronization
1. When the user information changes, the system A calls the url address of the intermediate interface system in an apiush mode to be' ip: do ", pass user information (JSON) into getdatafrmmothsys ().
2. The getDataFrmOthSys () method analyzes and splits the JSON character string of the user, acquires the related information of the user name, job number, mailbox, department and the like, and stores the related information into the database of the C system.
getDataFrmOthSys () implements the logic: converting the received JSON characters into JSONArraray objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArraray objects and converting the JSONArraray objects into List objects of user information, and then calling a mapper realized based on a Mybatis framework to store the user information into a database in batches.
Claims (8)
1.A single sign-on method for resolving the problem of inconvenient reconstruction of application services,
step a, the application service A calls an intermediate interface, the intermediate interface and the application service A carry out interactive verification on the user login state, and if the user login fails, the application service A is called to log in again; if the user logs in, the intermediate interface acquires the user name of the login user from the application service A;
b, the intermediate interface interacts with the application service C to acquire a dynamic token leading to the application service C;
step C, the intermediate interface uses the user name obtained from the application service A and the dynamic token obtained from the application service C to access the application service C, and single sign-on from the application service A to the application service C is completed;
and d, the application service B interacts with the application service C, the application service B logs in the user, acquires the dynamic token leading to the application service C, accesses the application service C and finishes single sign-on from the application service B to the application service C.
2. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the step a specifically includes:
step a11.A, the application service performs access operation on the intermediate interface;
step a12, the intermediate interface and the application single sign-on A perform interactive authentication to obtain the information of the user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
and step a13. The application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information in the C application service, and the synchronization of the user information of the A application service to the C application service is completed.
3. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the step b specifically comprises:
and b11, calling the authentication service login of the application C by the intermediate interface, and acquiring a login dynamic Token.
4. The method for solving the single sign-on problem of the reconstruction application service with the inconvenient reconstruction problem as recited in claims 2 and 3, wherein the step c specifically comprises:
and C11, accessing the C application service through the user name obtained in the step a12 and the dynamic Token obtained in the step b11 by an HTTP protocol, and completing single sign-on from the A application service to the C application service.
5. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the step d specifically includes:
step d11.B application service calls authentication service login of C application, and acquires a login dynamic Token;
and d12, accessing the C application service through the HTTP protocol by the login dynamic Token acquired in the step d11 and the user logged in by the B application service, and completing single-point login from the B application service to the C application service.
6. The method for solving the single sign-on problem of the reconfigurable application service according to claim 1, wherein the intermediate interface implements the steps of:
step 1, the intermediate interface adopts CAS filter configuration, and a service address and a filter of an authentication center of the system A are configured in web.xml for carrying out uniform authentication filtering on url requests provided by the intermediate interface.
Step 2, accessing the url address of the intermediate interface system as' ip: jsp' of the system, performing single sign-on authentication according to the filter set in the step 1, if the user does not log in, jumping to an authentication interface of a server of the system A, and if the user logs in, acquiring information of the user logging in the system A by the intermediate interface system through a getRemoteUser () method of an HttpServletRequest;
getremoteUser () is a built-in method provided by a jsp page, and can be used for acquiring login user information after CAS single sign-on;
step 3, analyzing the user information obtained in the step 2 by the intermediate interface system in a Map, JSONobject and other modes to obtain a username;
step 4, the url address of the username value obtained in the step 3 passing through the intermediate interface system is' ip: a user name is transmitted into a getUserTokenToBi () method by a port/loginbi, a user login interface of an SDK service of a C system is called in the getUserTokenToBi () method, a token dynamic token is obtained, and a concatenation url address is "ip: port/bitoken & username "and returns the url address as a json to lognsso.
getUserTokenToBi () implements the logic: reading a configuration file to obtain a server address url, a user name userNm and a password pwd of the system C; calling an SDK service user login interface packaged by the C system according to the obtained url, userNm and pwd values to obtain a token dynamic token;
jsp receives a return value of the getUserTokenToBi () method, and the url address is' ip: port/bi? token & username ", using a Window Location mode of JavaScript to process url into" ip: port/bi? And (5) token & username', jumping to the home page index.
7. The method for resolving single sign-on for an un-reconfigurable fabric application service as recited in claim 1, wherein the intermediate interface further comprises the step of user synchronization:
step 2.1, when the user information changes, the system A calls the url address of the intermediate interface system to be 'ip' in an apiush mode: do ", pass user information (JSON) into getdatafrmmothsys ().
And 2.2, analyzing and splitting the JSON character string of the user by a getDataFrmOthSys () method, acquiring related information such as the name, the user name, the work number, the mailbox, the department and the like of the user, and storing the related information into a database of the C system.
8. The method for resolving single sign-on for an inconvenient re-configuration application service of claim 1, wherein getDataFrmOthSys () implements logic to: converting the received JSON characters into JSONArrary objects by adopting a JSON method packaged by alibaba, analyzing the converted JSONArrary objects and converting the JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210979836.5A CN115499162B (en) | 2022-08-16 | 2022-08-16 | Single sign-on method for solving inconvenient reconfiguration application service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210979836.5A CN115499162B (en) | 2022-08-16 | 2022-08-16 | Single sign-on method for solving inconvenient reconfiguration application service |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115499162A true CN115499162A (en) | 2022-12-20 |
CN115499162B CN115499162B (en) | 2024-07-19 |
Family
ID=84466499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210979836.5A Active CN115499162B (en) | 2022-08-16 | 2022-08-16 | Single sign-on method for solving inconvenient reconfiguration application service |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115499162B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117786651A (en) * | 2024-02-27 | 2024-03-29 | 杭州玳数科技有限公司 | Method and device for realizing single sign-on based on java class loader |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050204148A1 (en) * | 2004-03-10 | 2005-09-15 | American Express Travel Related Services Company, Inc. | Security session authentication system and method |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
CN107359996A (en) * | 2016-05-09 | 2017-11-17 | 阿里巴巴集团控股有限公司 | Automatic logging method and device between more websites |
-
2022
- 2022-08-16 CN CN202210979836.5A patent/CN115499162B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050204148A1 (en) * | 2004-03-10 | 2005-09-15 | American Express Travel Related Services Company, Inc. | Security session authentication system and method |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
CN107359996A (en) * | 2016-05-09 | 2017-11-17 | 阿里巴巴集团控股有限公司 | Automatic logging method and device between more websites |
Non-Patent Citations (2)
Title |
---|
李小标;温巧燕;代战锋;: "PKI/PMI支持多模式应用的单点登录方案", 北京邮电大学学报, no. 03, 15 June 2009 (2009-06-15) * |
洪生: "基于CAS与令牌的单点授权实现", 《信息化研究》, vol. 47, no. 02, 20 April 2021 (2021-04-20), pages 70 - 73 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117786651A (en) * | 2024-02-27 | 2024-03-29 | 杭州玳数科技有限公司 | Method and device for realizing single sign-on based on java class loader |
CN117786651B (en) * | 2024-02-27 | 2024-06-07 | 杭州玳数科技有限公司 | Method and device for realizing single sign-on based on java class loader |
Also Published As
Publication number | Publication date |
---|---|
CN115499162B (en) | 2024-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109314704B (en) | Single sign-on and single sign-off functions for multi-tenant identity and data security management cloud services | |
CN103475726B (en) | A kind of virtual desktop management, server and client side | |
CN103581213B (en) | A kind of application process of shared Hosts files, equipment and system | |
WO2017097123A1 (en) | Access request conversion method and device | |
CN112235285B (en) | Method and system for user authentication mode and service based on non-session | |
CN108353095A (en) | Domain name analytic method, client, fringe node and domain name analysis system | |
CN103023933B (en) | A kind of log-on message Integrated Processing System and method | |
CN106685949A (en) | Container access method, container access device and container access system | |
CN112541190B (en) | Map authority control method and control system based on unified user information | |
CN105516171B (en) | Portal keep-alive system and method, Verification System and method based on authentication service cluster | |
JP7398580B2 (en) | Partner integration network | |
CN102739678B (en) | Single-sign-on treatment system and single-sign-on processing method | |
CN106169963A (en) | The access method of service page and system, proxy server | |
CN101656609A (en) | Single sign-on method, system and device thereof | |
CN109783357A (en) | The method and device of test application program, computer equipment, storage medium | |
CN110401641A (en) | User authen method, device, electronic equipment | |
CN115499162A (en) | Single sign-on method for solving problem of reconstruction-inconvenient application service | |
CN111585786A (en) | Realization of secret-free building method of big data cluster | |
CN106936660B (en) | Data acquisition method and device | |
CN102299945A (en) | Gateway configuration page registration method, system thereof and portal certificate server | |
CN108683651A (en) | A kind of single-point logging method, server-side and system | |
WO2015131606A1 (en) | Object information processing method, device and ors application gateway | |
CN113377454A (en) | Method for realizing Flink dynamic connection Kerberos authentication component | |
Sarkar | Nginx 1 web server implementation cookbook | |
CN109639433B (en) | Method, storage medium and processor for mutual authorization between multiple system accounts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |