CN116668096A - LDAP-based unified identity verification method and system - Google Patents

LDAP-based unified identity verification method and system Download PDF

Info

Publication number
CN116668096A
CN116668096A CN202310554728.8A CN202310554728A CN116668096A CN 116668096 A CN116668096 A CN 116668096A CN 202310554728 A CN202310554728 A CN 202310554728A CN 116668096 A CN116668096 A CN 116668096A
Authority
CN
China
Prior art keywords
authentication
server
ldap
request
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310554728.8A
Other languages
Chinese (zh)
Inventor
方进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujia Newland Software Engineering Co ltd
Original Assignee
Fujia Newland Software Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujia Newland Software Engineering Co ltd filed Critical Fujia Newland Software Engineering Co ltd
Priority to CN202310554728.8A priority Critical patent/CN116668096A/en
Publication of CN116668096A publication Critical patent/CN116668096A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Hardware Redundancy (AREA)

Abstract

The application provides an LDAP-based unified authentication method and system in the technical field of authentication, wherein the method comprises the following steps: step S10, configuring a reverse proxy of the web application on a reverse proxy server for forwarding a verification request of the web application to an authentication server; step S20, creating user data for authentication on an LDAP server; s30, intercepting the verification request of the web application by the reverse proxy server, and forwarding the intercepted verification request to the authentication server; step S40, the authentication server forwards the authentication request to an LDAP server, and the LDAP server generates an authentication result after carrying out identity authentication on the authentication request based on user data; step S50, the LDAP server sends the verification result to the web application through the authentication server, the reverse proxy server and the network firewall in sequence; step S60, the web application performs a login operation based on the received verification result. The application has the advantages that: the convenience and the safety of unified identity verification are greatly improved.

Description

LDAP-based unified identity verification method and system
Technical Field
The application relates to the technical field of authentication, in particular to an LDAP-based unified authentication method and system.
Background
With the development of the internet, more and more web applications emerge to provide various services to users. However, this also presents a problem: the user needs to input a user name and a password in the web system corresponding to each web application to log in, which not only brings trouble to the user, but also increases the risk of information leakage of the user. In order to solve this problem, a unified authentication concept is proposed, and the objective is to enable a user to log in only one web system, so that the user can log in other web systems automatically without inputting a user name and a password again.
Traditionally, there are several methods to achieve unified identity verification:
one is realized through session data sharing or session persistence, and although the methods can achieve the aim of unified identity verification, additional components or data storage layers are required to be maintained, so that the complexity of a web system is increased, and the situation of large-scale concurrent access cannot be well dealt with.
Another is to integrate multiple web systems using Single Sign On (SSO), which allows a user to automatically log in one web system after logging in the other web system. However, this approach adds complexity to the web system because additional components and trust relationships need to be maintained, a certain modification to the web system is required, different authentication clients need to be developed according to the authentication servers, and security risks are also brought, because once the authentication server is breached, an attacker can obtain access rights to all web systems.
Therefore, how to provide an authentication method and system based on LDAP, to improve the convenience and safety of authentication, is a technical problem to be solved.
Disclosure of Invention
The application aims to solve the technical problem of providing an LDAP-based unified authentication method and system for identity, which can improve the convenience and safety of unified authentication.
In a first aspect, the present application provides an LDAP-based unified authentication method, comprising the steps of:
step S10, configuring a reverse proxy of the web application on a reverse proxy server for forwarding a verification request of the web application to an authentication server;
step S20, creating user data for authentication on an LDAP server;
s30, intercepting a verification request of the web application by the reverse proxy server, and forwarding the intercepted verification request to the authentication server;
step S40, the authentication server forwards the authentication request to an LDAP server, and the LDAP server generates an authentication result after carrying out authentication on the authentication request based on the user data;
step S50, the LDAP server sends the verification result to the web application through an authentication server, a reverse proxy server and a network firewall in sequence;
step S60, the web application executes login operation based on the received verification result.
Further, the step S20 specifically includes:
user data for authentication is created on an LDAP server and stored to a pre-created LDAP directory.
Further, the step S30 specifically includes:
the reverse proxy server intercepts a verification request of the web application through a network firewall, encrypts the intercepted verification request by using a preset key and forwards the encrypted verification request to the authentication server based on a security protocol; the verification request carries at least data to be verified and a request time.
Further, the step S40 specifically includes:
the authentication server stores URL, DN and password for connecting with the LDAP server in advance; the authentication server forwards the authentication request to an LDAP server based on the URL, the DN and the password, the LDAP server decrypts the authentication request by using a preset key, and an authentication result is generated after the authentication request is authenticated based on the user data.
Further, the step S50 specifically includes:
and after the verification result is encrypted by the LDAP server through a preset secret key, the LDAP server sequentially transmits the verification result to the web application through the authentication server, the reverse proxy server and the network firewall based on a security protocol, records a log in the verification process, and monitors the log in real time based on a preset supervision rule.
In a second aspect, the present application provides an LDAP-based unified authentication system, comprising:
a reverse proxy server configuration module for configuring a reverse proxy of the web application on the reverse proxy server for forwarding a verification request of the web application to the authentication server;
an LDAP server configuration module for creating user data for authentication on the LDAP server;
the authentication request interception module is used for intercepting an authentication request of the web application by the reverse proxy server and forwarding the intercepted authentication request to the authentication server;
the authentication module is used for transmitting the authentication request to an LDAP server by the authentication server, and generating an authentication result after the authentication request is authenticated by the LDAP server based on the user data;
the authentication result sending module is used for sending the authentication result to the web application through the authentication server, the reverse proxy server and the network firewall in sequence by the LDAP server;
and the login module is used for the web application to execute login operation based on the received verification result.
Further, the LDAP server configuration module is specifically configured to:
user data for authentication is created on an LDAP server and stored to a pre-created LDAP directory.
Further, the verification request interception module is specifically configured to:
the reverse proxy server intercepts a verification request of the web application through a network firewall, encrypts the intercepted verification request by using a preset key and forwards the encrypted verification request to the authentication server based on a security protocol; the verification request carries at least data to be verified and a request time.
Further, the identity verification module is specifically configured to:
the authentication server stores URL, DN and password for connecting with the LDAP server in advance; the authentication server forwards the authentication request to an LDAP server based on the URL, the DN and the password, the LDAP server decrypts the authentication request by using a preset key, and an authentication result is generated after the authentication request is authenticated based on the user data.
Further, the verification result sending module is specifically configured to:
and after the verification result is encrypted by the LDAP server through a preset secret key, the LDAP server sequentially transmits the verification result to the web application through the authentication server, the reverse proxy server and the network firewall based on a security protocol, records a log in the verification process, and monitors the log in real time based on a preset supervision rule.
The application has the advantages that:
intercepting and forwarding an authentication request of the web application through a reverse proxy server to an authentication server, forwarding the authentication request to an LDAP server by the authentication server, generating an authentication result after the authentication request is authenticated by the LDAP server based on the created user data, and sending the authentication result to the web application sequentially through the authentication server, the reverse proxy server and a network firewall, wherein the web application executes login operation based on the received authentication result; the authentication request of the web application is forwarded to the LDAP server for authentication through the reverse proxy server, the LDAP server allows a user to perform seamless switching among a plurality of web applications, login in each web application is not needed, and identity authentication can be realized without invading the web applications, so that convenience of uniform identity authentication is greatly improved; the network firewall is used for protecting data transmitted between the web application and the reverse proxy server, the data transmission is carried out among the reverse proxy server, the authentication server and the LDAP server through a security protocol, the transmitted data are encrypted, the logs in the verification process are recorded in combination, the logs are monitored in real time based on preset supervision rules, five security measures are adopted before and after, and therefore the security of identity unified verification is greatly improved.
Drawings
The application will be further described with reference to examples of embodiments with reference to the accompanying drawings.
FIG. 1 is a flow chart of an LDAP-based unified authentication method of the present application.
FIG. 2 is a schematic diagram of the structure of an LDAP-based unified authentication system of the present application.
Detailed Description
The technical scheme in the embodiment of the application has the following overall thought: the authentication request of the web application is forwarded to the LDAP server for authentication through the reverse proxy server, the LDAP server allows a user to perform seamless switching among a plurality of web applications, login in each web application is not needed, and the authentication is non-invasive, so that the convenience of unified authentication of the identity is improved; the network firewall is used for protecting the transmitted data, the reverse proxy server, the authentication server and the LDAP server are used for transmitting the data through a security protocol, the transmitted data are encrypted, and the logs in the verification process are combined with the logs, so that the logs are monitored in real time based on preset supervision rules, and the security of unified identity verification is improved.
Referring to fig. 1 to 2, a preferred embodiment of an LDAP-based authentication method according to the present application includes the following steps:
step S10, configuring a reverse proxy of the web application on a reverse proxy server (such as Nginx) for forwarding a verification request of the web application to an authentication server;
step S20, creating user data for authentication on an LDAP server;
an LDAP server is deployed on an independent server, all web applications are configured to use the LDAP server for authentication, unified management of user data can be achieved, when a user logs in one web application, credentials of the user are sent to the LDAP server for authentication, the user is granted access right after authentication is successful, and the user does not need to log in again when switching to other web applications, user experience is greatly improved, and trouble of switching among a plurality of systems is reduced for the user. Compared with other authentication servers (such as OAuth 2), the LDAP server has the advantages of light weight and high efficiency, and can quickly respond to the authentication request of the user.
S30, intercepting a verification request of the web application by the reverse proxy server, and forwarding the intercepted verification request to the authentication server;
step S40, the authentication server forwards the authentication request to an LDAP server, and the LDAP server generates an authentication result after carrying out authentication on the authentication request based on the user data;
step S50, the LDAP server sends the verification result to the web application through an authentication server, a reverse proxy server and a network firewall in sequence;
step S60, the web application executes login operation based on the received verification result, namely single sign-on and unified user identity authentication are realized without modifying the web application.
In the aspect of user authentication design, based on the LDAP design thought, the application designs a more effective authentication architecture, so that the user management of a plurality of web applications is more efficient, and better single sign-on experience is achieved. In the aspect of network security design, based on the design thought of a reverse proxy server, a more effective identity verification architecture is designed, so that request interception and identity verification of web applications are more efficient, and the aim of realizing single sign-on under the condition of not modifying the web applications is fulfilled.
The step S20 specifically includes:
user data for authentication is created on an LDAP server and stored to a pre-created LDAP directory. User data of all web applications and systems are unified into the LDAP catalogue, so that user management is simplified, and an administrator can manage and maintain the user data more easily.
The LDAP provides an information service called directory service, can be regarded as a special database system, can effectively solve the problem of user accounts of a plurality of network services, defines a unified identity information database, an identity authentication mechanism and an interface, realizes unified management of resources and information, and ensures consistency and integrity of the user data.
The step S30 specifically includes:
the reverse proxy server intercepts a verification request of the web application through a network firewall, encrypts the intercepted verification request by using a preset key and forwards the encrypted verification request to the authentication server based on a security protocol; the verification request carries at least data to be verified and a request time.
The reverse proxy server intercepts the verification request of the web application and performs identity verification, and then forwards the verified verification request to the web application, so that single sign-on can be realized without modifying the web application; and the reverse proxy server is deployed behind the network firewall and used as a front end to control and protect the access to the back end server on the private network, so that the back end server can be effectively protected from attack, and the security of the system is improved.
The step S40 specifically includes:
the authentication server stores URL, DN and password for connecting with the LDAP server in advance; the authentication server forwards the authentication request to an LDAP server based on the URL, the DN and the password, the LDAP server decrypts the authentication request by using a preset key, and an authentication result is generated after the authentication request is authenticated based on the user data.
The step S50 specifically includes:
and after the verification result is encrypted by the LDAP server through a preset secret key, the LDAP server sequentially transmits the verification result to the web application through the authentication server, the reverse proxy server and the network firewall based on a security protocol, records a log in the verification process, and monitors the log in real time based on a preset supervision rule.
The application discloses a preferred embodiment of an LDAP-based identity unified verification system, which comprises the following modules:
a reverse proxy server configuration module for configuring a reverse proxy of the web application on a reverse proxy server (e.g., nginnx) for forwarding a validation request of the web application to an authentication server;
an LDAP server configuration module for creating user data for authentication on the LDAP server;
an LDAP server is deployed on an independent server, all web applications are configured to use the LDAP server for authentication, unified management of user data can be achieved, when a user logs in one web application, credentials of the user are sent to the LDAP server for authentication, the user is granted access right after authentication is successful, and the user does not need to log in again when switching to other web applications, user experience is greatly improved, and trouble of switching among a plurality of systems is reduced for the user. Compared with other authentication servers (such as OAuth 2), the LDAP server has the advantages of light weight and high efficiency, and can quickly respond to the authentication request of the user.
The authentication request interception module is used for intercepting an authentication request of the web application by the reverse proxy server and forwarding the intercepted authentication request to the authentication server;
the authentication module is used for transmitting the authentication request to an LDAP server by the authentication server, and generating an authentication result after the authentication request is authenticated by the LDAP server based on the user data;
the authentication result sending module is used for sending the authentication result to the web application through the authentication server, the reverse proxy server and the network firewall in sequence by the LDAP server;
and the login module is used for the web application to execute login operation based on the received verification result, namely, single sign-on and unified user identity authentication are realized under the condition of not modifying the web application.
In the aspect of user authentication design, based on the LDAP design thought, the application designs a more effective authentication architecture, so that the user management of a plurality of web applications is more efficient, and better single sign-on experience is achieved. In the aspect of network security design, based on the design thought of a reverse proxy server, a more effective identity verification architecture is designed, so that request interception and identity verification of web applications are more efficient, and the aim of realizing single sign-on under the condition of not modifying the web applications is fulfilled.
The LDAP server configuration module is specifically used for:
user data for authentication is created on an LDAP server and stored to a pre-created LDAP directory. User data of all web applications and systems are unified into the LDAP catalogue, so that user management is simplified, and an administrator can manage and maintain the user data more easily.
The LDAP provides an information service called directory service, can be regarded as a special database system, can effectively solve the problem of user accounts of a plurality of network services, defines a unified identity information database, an identity authentication mechanism and an interface, realizes unified management of resources and information, and ensures consistency and integrity of the user data.
The verification request interception module is specifically configured to:
the reverse proxy server intercepts a verification request of the web application through a network firewall, encrypts the intercepted verification request by using a preset key and forwards the encrypted verification request to the authentication server based on a security protocol; the verification request carries at least data to be verified and a request time.
The reverse proxy server intercepts the verification request of the web application and performs identity verification, and then forwards the verified verification request to the web application, so that single sign-on can be realized without modifying the web application; and the reverse proxy server is deployed behind the network firewall and used as a front end to control and protect the access to the back end server on the private network, so that the back end server can be effectively protected from attack, and the security of the system is improved.
The identity verification module is specifically used for:
the authentication server stores URL, DN and password for connecting with the LDAP server in advance; the authentication server forwards the authentication request to an LDAP server based on the URL, the DN and the password, the LDAP server decrypts the authentication request by using a preset key, and an authentication result is generated after the authentication request is authenticated based on the user data.
The verification result sending module is specifically configured to:
and after the verification result is encrypted by the LDAP server through a preset secret key, the LDAP server sequentially transmits the verification result to the web application through the authentication server, the reverse proxy server and the network firewall based on a security protocol, records a log in the verification process, and monitors the log in real time based on a preset supervision rule.
To facilitate an understanding of the application, the following examples are provided for further explanation:
1. setting up Nginx, and configuring a reverse proxy and identity verification:
1. configuring a reverse proxy on nginnx: in the configuration file of Nginx, a new server block is added for forwarding the request of Kibana to the Kibana server. For example:
2. configuration of authentication on ng nx: in the configuration file of nginnx, the ngx _http_auth_request_module module is used to implement LDAP authentication. For example:
the use of the ngx http authrequest module of Nginx to effect LDAP authentication provides more flexibility in allowing sub-requests to be sent to external authentication servers prior to processing the request, and the use of this module to send authentication requests to an LDAP-enabled authentication server, such as an authldap, which is responsible for receiving authentication requests from Nginx and communicating with the LDAP server using the LDAP protocol to verify the identity of the user, thus flexibly configuring the authentication flow as required to meet the needs of different applications.
2. Building an LDAP server:
creating a new user on the LDAP server for use in Kibana authentication, for example:
dn:uid=kibanauser,ou=people,dc=yourdomain,dc=com
objectClass:top
objectClass:person
objectClass:organizationalPerson
objectClass:inetOrgPerson
uid:kibanauser
cn:Kibana User
sn:User
givenName:Kibana
mail:kibanauser@yourdomain.com
userPassword:{CLEARTEXT}password
3. application configuration:
in the Kibana's profile, the elastiscearch. Username and elastiscearch. Password are set to null so that Kibana can be authenticated and authorized through nginnx. Specifically, the following needs to be added to the kibana. Yml file:
```
elasticsearch.username:""
elasticsearch.password:""
```
4. LDAP-enabled Authentication Server authentication server building and configuration:
the authentication server is responsible for receiving authentication requests from nmginx and communicating with the LDAP server using the LDAP protocol to verify the identity of the user. The implementation can be realized by writing python codes by oneself, and an OAuth2 authorization server can also be installed.
If the security requirement on the system is not high, the ldap_server can be directly configured in the Nginx, the authentication server is skipped, the authentication is directly performed on the ldap server, and the configuration of the ldap_server in the Nginx is as follows:
configuring an auth-ldap module. You need to add an ldap_server block in the configuration file of nginnx, which is used for configuring related information of the LDAP server. For example:
in summary, the application has the advantages that:
intercepting and forwarding an authentication request of the web application through a reverse proxy server to an authentication server, forwarding the authentication request to an LDAP server by the authentication server, generating an authentication result after the authentication request is authenticated by the LDAP server based on the created user data, and sending the authentication result to the web application sequentially through the authentication server, the reverse proxy server and a network firewall, wherein the web application executes login operation based on the received authentication result; the authentication request of the web application is forwarded to the LDAP server for authentication through the reverse proxy server, the LDAP server allows a user to perform seamless switching among a plurality of web applications, login in each web application is not needed, and identity authentication can be realized without invading the web applications, so that convenience of uniform identity authentication is greatly improved; the network firewall is used for protecting data transmitted between the web application and the reverse proxy server, the data transmission is carried out among the reverse proxy server, the authentication server and the LDAP server through a security protocol, the transmitted data are encrypted, the logs in the verification process are recorded in combination, the logs are monitored in real time based on preset supervision rules, five security measures are adopted before and after, and therefore the security of identity unified verification is greatly improved.
While specific embodiments of the application have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the application, and that equivalent modifications and variations of the application in light of the spirit of the application will be covered by the claims of the present application.

Claims (10)

1. An LDAP-based unified identity authentication method is characterized in that: the method comprises the following steps:
step S10, configuring a reverse proxy of the web application on a reverse proxy server for forwarding a verification request of the web application to an authentication server;
step S20, creating user data for authentication on an LDAP server;
s30, intercepting a verification request of the web application by the reverse proxy server, and forwarding the intercepted verification request to the authentication server;
step S40, the authentication server forwards the authentication request to an LDAP server, and the LDAP server generates an authentication result after carrying out authentication on the authentication request based on the user data;
step S50, the LDAP server sends the verification result to the web application through an authentication server, a reverse proxy server and a network firewall in sequence;
step S60, the web application executes login operation based on the received verification result.
2. An LDAP-based unified authentication method as set forth in claim 1, wherein: the step S20 specifically includes:
user data for authentication is created on an LDAP server and stored to a pre-created LDAP directory.
3. An LDAP-based unified authentication method as set forth in claim 1, wherein: the step S30 specifically includes:
the reverse proxy server intercepts a verification request of the web application through a network firewall, encrypts the intercepted verification request by using a preset key and forwards the encrypted verification request to the authentication server based on a security protocol; the verification request carries at least data to be verified and a request time.
4. An LDAP-based unified authentication method as set forth in claim 1, wherein: the step S40 specifically includes:
the authentication server stores URL, DN and password for connecting with the LDAP server in advance; the authentication server forwards the authentication request to an LDAP server based on the URL, the DN and the password, the LDAP server decrypts the authentication request by using a preset key, and an authentication result is generated after the authentication request is authenticated based on the user data.
5. An LDAP-based unified authentication method as set forth in claim 1, wherein: the step S50 specifically includes:
and after the verification result is encrypted by the LDAP server through a preset secret key, the LDAP server sequentially transmits the verification result to the web application through the authentication server, the reverse proxy server and the network firewall based on a security protocol, records a log in the verification process, and monitors the log in real time based on a preset supervision rule.
6. An LDAP-based identity unified verification system is characterized in that: the device comprises the following modules:
a reverse proxy server configuration module for configuring a reverse proxy of the web application on the reverse proxy server for forwarding a verification request of the web application to the authentication server;
an LDAP server configuration module for creating user data for authentication on the LDAP server;
the authentication request interception module is used for intercepting an authentication request of the web application by the reverse proxy server and forwarding the intercepted authentication request to the authentication server;
the authentication module is used for transmitting the authentication request to an LDAP server by the authentication server, and generating an authentication result after the authentication request is authenticated by the LDAP server based on the user data;
the authentication result sending module is used for sending the authentication result to the web application through the authentication server, the reverse proxy server and the network firewall in sequence by the LDAP server;
and the login module is used for the web application to execute login operation based on the received verification result.
7. An LDAP-based unified authentication system as set forth in claim 6, wherein: the LDAP server configuration module is specifically used for:
user data for authentication is created on an LDAP server and stored to a pre-created LDAP directory.
8. An LDAP-based unified authentication system as set forth in claim 6, wherein: the verification request interception module is specifically configured to:
the reverse proxy server intercepts a verification request of the web application through a network firewall, encrypts the intercepted verification request by using a preset key and forwards the encrypted verification request to the authentication server based on a security protocol; the verification request carries at least data to be verified and a request time.
9. An LDAP-based unified authentication system as set forth in claim 6, wherein: the identity verification module is specifically used for:
the authentication server stores URL, DN and password for connecting with the LDAP server in advance; the authentication server forwards the authentication request to an LDAP server based on the URL, the DN and the password, the LDAP server decrypts the authentication request by using a preset key, and an authentication result is generated after the authentication request is authenticated based on the user data.
10. An LDAP-based unified authentication system as set forth in claim 6, wherein: the verification result sending module is specifically configured to:
and after the verification result is encrypted by the LDAP server through a preset secret key, the LDAP server sequentially transmits the verification result to the web application through the authentication server, the reverse proxy server and the network firewall based on a security protocol, records a log in the verification process, and monitors the log in real time based on a preset supervision rule.
CN202310554728.8A 2023-05-17 2023-05-17 LDAP-based unified identity verification method and system Pending CN116668096A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310554728.8A CN116668096A (en) 2023-05-17 2023-05-17 LDAP-based unified identity verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310554728.8A CN116668096A (en) 2023-05-17 2023-05-17 LDAP-based unified identity verification method and system

Publications (1)

Publication Number Publication Date
CN116668096A true CN116668096A (en) 2023-08-29

Family

ID=87719862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310554728.8A Pending CN116668096A (en) 2023-05-17 2023-05-17 LDAP-based unified identity verification method and system

Country Status (1)

Country Link
CN (1) CN116668096A (en)

Similar Documents

Publication Publication Date Title
US7313816B2 (en) Method and system for authenticating a user in a web-based environment
US6662228B1 (en) Internet server authentication client
US6490679B1 (en) Seamless integration of application programs with security key infrastructure
US6198824B1 (en) System for providing secure remote command execution network
EP1595190B1 (en) Service provider anonymization in a single sign-on system
US20020147927A1 (en) Method and system to provide and manage secure access to internal computer systems from an external client
US20010020274A1 (en) Platform-neutral system and method for providing secure remote operations over an insecure computer network
US20060206616A1 (en) Decentralized secure network login
EP2544117A1 (en) Method and system for sharing or storing personal data without loss of privacy
US20110170696A1 (en) System and method for secure access
CN111770088A (en) Data authentication method, device, electronic equipment and computer readable storage medium
EP2021938A2 (en) Policy driven, credential delegation for single sign on and secure access to network resources
EP1388060A1 (en) Method and apparatus for serving content from a semi-trusted server
Oksiiuk et al. Security technique for authentication process in the cloud environment
CN117354032A (en) Multiple authentication method based on code server
Rosenthal EINet: a secure, open network for electronic commerce
EP1530343B1 (en) Method and system for creating authentication stacks in communication networks
CN116668096A (en) LDAP-based unified identity verification method and system
CN105871788B (en) Password generation method and device for login server
Snow et al. Simple authentication
Blundo et al. A lightweight approach to authenticated web caching
CN114900372B (en) Resource protection system based on zero trust security sentinel system
KR100406292B1 (en) Password Transmission system and method in Terminal Communications
CN115130116A (en) Business resource access method, device, equipment, readable storage medium and system
He et al. A single sign-on scheme for cross domain web applications based on SOA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination