[go: up one dir, main page]

CN115499162B - Single sign-on method for solving inconvenient reconfiguration application service - Google Patents

Single sign-on method for solving inconvenient reconfiguration application service Download PDF

Info

Publication number
CN115499162B
CN115499162B CN202210979836.5A CN202210979836A CN115499162B CN 115499162 B CN115499162 B CN 115499162B CN 202210979836 A CN202210979836 A CN 202210979836A CN 115499162 B CN115499162 B CN 115499162B
Authority
CN
China
Prior art keywords
application service
user
intermediate interface
service
single sign
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210979836.5A
Other languages
Chinese (zh)
Other versions
CN115499162A (en
Inventor
程峰
李耀
彭磊
杨志文
陶佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhongbang Bank Co Ltd
Original Assignee
Wuhan Zhongbang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhongbang Bank Co Ltd filed Critical Wuhan Zhongbang Bank Co Ltd
Priority to CN202210979836.5A priority Critical patent/CN115499162B/en
Publication of CN115499162A publication Critical patent/CN115499162A/en
Application granted granted Critical
Publication of CN115499162B publication Critical patent/CN115499162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the technical field of single sign-on, and provides a single sign-on method for solving inconvenient reconfiguration of application services. The method aims at solving the defect that single sign-on is unfavorable for reconstruction, and the scheme comprises that an A application service calls an intermediate interface, the intermediate interface and the A application service interactively verify the login state of a user, and if login fails, the A application service is called to re-login; if the user is logged in, the intermediate interface acquires the user name of the logged-in user from the application A service; the intermediate interface interacts with the C application service to acquire a dynamic token leading to the C application service; the intermediate interface accesses the C application service by using the user name obtained from the A application service and the dynamic token obtained from the C application service, and completes single sign-on from the A application service to the C application service; the B application service interacts with the C application service, the B application service logs in the user, acquires a dynamic token leading to the C application service, accesses the C application service, and completes single sign-on from the B application service to the C application service.

Description

Single sign-on method for solving inconvenient reconfiguration application service
Technical Field
The invention relates to the technical field of Java, spring, springMVC, maven, mybatis, html and the like, and provides a single sign-on method for solving the problem of inconvenient reconfiguration of application services.
Background
Along with the development of informatization, various industries begin to use an electronic system for office work, meanwhile, a single sign-on technology begins to be widely applied, a user can access a plurality of subsystems only by logging in once, a plurality of user passwords and passwords do not need to be recorded, the user can conveniently and quickly access the system, and the working efficiency is improved.
Along with the continuous growth of business, single sign-on relates to more and more systems, and is more time-consuming to be compatible with all systems for reconstruction, in order to solve the defect that the single sign-on is unfavorable for reconstruction, and simultaneously, the requirement of multiparty integration of the same system is met, a mode for realizing an intermediate interface is provided to remedy the defect of inconvenient reconstruction of the single sign-on.
The following scenario examples are analyzed and a viable solution is presented.
Scene: the B and C systems need to realize single sign-on through A, and the B system needs to integrate the resource page and single sign-on of the C system.
Reconfigurable: based on the original software and hardware resources of the system, the system can flexibly change the architecture, the function and the like of the system according to different application requirements so as to quickly adapt to the change of the requirements.
Inconvenient reconstruction: on the basis of the original software and hardware resources of the system, the structure, the function and the like of the system cannot be flexibly adjusted in a short time, so that the system is quickly adapted to the change of the demand, and the reconstruction is time-consuming and labor-consuming.
The integrated mode of each system is analyzed through the table, and the following scheme is provided:
After analyzing the respective characteristics of the ABC three systems, a bridge is built between A, C systems to solve the problem of integration of the two systems, and meanwhile, the integration of the B and C systems is not affected. As shown in fig. 1.
The technical scheme mainly solves the problem that A, C systems are unfavorable for reconstruction and expansion.
An intermediate interface was developed between A, C systems to enable single sign-on of A, C systems.
Because the B system can reconstruct, for A and B, the integration of unified authentication single sign-on is completed by adopting an Oauth2 integration mode provided by the A system; for B and C, any one of the 3 ways of integration provided by the C system is adopted, and the integration implementation of A and B, B and C is not described herein.
Disclosure of Invention
The invention aims to solve the defect that single sign-on is not convenient for reconstruction, and simultaneously, the requirement of multiparty integration of the same system is met, and a mode for realizing an intermediate interface is provided to remedy the defect that the single sign-on is inconvenient for reconstruction.
The invention adopts the following technical scheme for realizing the purposes:
A method of resolving single sign-on for inconvenient reconfiguration of application services, comprising the steps of:
a, calling an intermediate interface by the application service A, and interactively verifying the user login state by the intermediate interface and the application service A, if the user login is invalid, calling the application service A to re-login; if the user is logged in, the intermediate interface acquires the user name of the logged-in user from the A application service;
Step b, the intermediate interface interacts with the C application service to obtain a dynamic token leading to the C application service;
c, the intermediate interface accesses the C application service by using the user name obtained from the A application service and the dynamic token obtained from the C application service, and completes single sign-on from the A application service to the C application service;
And d, the application service B interacts with the application service C, the application service B logs in the user, acquires a dynamic token leading to the application service C, accesses the application service C, and completes single sign-on from the application service B to the application service C.
In the above technical solution, the step a specifically includes:
A11, an application service performs access operation on the intermediate interface;
Step a12, the intermediate interface performs interactive authentication with the application A single sign-on to obtain information of a user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
And a13. The A application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information to the C application service, and the synchronization of the A application service user information to the C application service is completed.
In the above technical solution, the step b specifically includes:
And b11, calling the authentication service of the C application by the intermediate interface to log in, and obtaining a login dynamic Token.
In the above technical solution, the step c specifically includes:
Step C11, accessing the C application service through the HTTP through the user name obtained in the step a12 and the dynamic Token obtained in the step b11, and completing single sign-on from the A application service to the C application service.
In the above technical solution, the step d specifically includes:
Step d11, the B application service calls the authentication service login of the C application and acquires a login dynamic Token;
Step d12, accessing the C application service through the HTTP protocol by the logged-in dynamic Token acquired in the step d11 and the logged-in user of the B application service, and completing single sign-on from the B application service to the C application service.
In the above technical solution, the intermediate interface implementation step:
and step 1, configuring a CAS filter by an intermediate interface, and configuring a service address and a filter of an authentication center of the A system in web xml for unified authentication filtering of url requests provided by the intermediate interface.
Step 2, when the url address of the access intermediate interface system is ip port/loginSso, performing single sign-on authentication according to the filter set in the step 1, if the user is not logged in, jumping to the authentication interface of the server of the A system, and if the user is logged in, acquiring information of the login user of the A system by the intermediate interface system through a getRemoteUser () method of HttpServletRequest;
The request, getrequest user () is a built-in method provided by a jsp page, and can be used to obtain login user information after CAS single sign-on;
Step 3, analyzing the user information obtained in the step 2 by using a Map, JSONobject and other modes through an intermediate interface system to obtain a username;
Step 4, transmitting the user name into getUserTokenToBi () method through the url address of the intermediate interface system, wherein the url address is "ip: port/loginBi.dousername=user name", calling the user login interface of SDK service of C system in getUserTokenToBi () method, obtaining token dynamic token, using the obtained token dynamic token and the transmitted username, splicing url address is "ip: port/bitoken & username", and returning url address as json to loginSso.jsp;
getUserTokenToBi () implements logic: reading the configuration file to obtain a server address url, a user name userNm and a password pwd of the C system; the method comprises the steps of obtaining a token dynamic token by calling an encapsulated SDK service user login interface of a C system with an obtained url, userNm, pwd value;
and 5, receiving getUserTokenToBi a return value of a method of loginSso.jsp, wherein url addresses are "ip: port/bitoken & username", processing url by using a Window Location mode of JavaScript to be "ip: port/bitoken & username", and jumping to a first page index.jsp of the C system.
In the above technical solution, the intermediate interface further includes a step of user synchronization:
And 2.1, when the user information is changed, the A system calls the url address of the intermediate interface system to be 'ip: port/accdata.do' in apipush mode, and the user information (JSON) is transmitted into getDataFrmOthSys ().
And 2.2, getDataFrmOthSys () method analyzes and splits the user JSON character string to obtain related information such as user name, job number, mailbox, department and the like, and storing the related information in a database of the C system.
In the scheme getDataFrmOthSys () implements logic: converting the received JSON characters into JSONArrary objects by adopting a alibaba packaged JSON method, analyzing the converted JSONArrary objects and converting the converted JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.
Because the invention adopts the technical scheme, the invention has the following beneficial effects:
1) The invention is a web application built based on a java SSM framework, the bidirectional interaction of A, C systems is completed by adopting the technical scheme, and the bridge function is realized in the middle, so that the seamless butt joint of the systems is completed.
2) The technical scheme solves the problem that the functional structure of the system cannot be flexibly adjusted in a short time and the single sign-on system can rapidly adapt to the change of the demand.
3) The technology is portable and reconfigurable, can reduce the development cost of inconvenient reconfiguration systems, meets the service requirements, and is widely applied to various systems.
Drawings
FIG. 1 is a flow chart of an intermediate interface access application;
FIG. 2 is a diagram of a reconfiguration scheme to address application system inconvenience;
Fig. 3 is an intermediate interface software architecture.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. While the invention will be described and illustrated in conjunction with certain specific embodiments, it will be understood that it is not intended to limit the invention to these embodiments alone. On the contrary, the invention is intended to cover modifications and equivalent arrangements included within the scope of the appended claims.
In addition, numerous specific details are set forth in the following description in order to provide a better illustration of the invention. It will be understood by those skilled in the art that the present invention may be practiced without these specific details.
The method provided by the invention realizes the single sign-on C application service of the A application service and the single sign-on C application service of the B application service.
A method of resolving single sign-on for inconvenient reconfiguration of application services, comprising the steps of:
a, calling an intermediate interface by the application service A, and interactively verifying the user login state by the intermediate interface and the application service A, if the user login is invalid, calling the application service A to re-login; if the user is logged in, the intermediate interface acquires the user name of the logged-in user from the A application service;
Step b, the intermediate interface interacts with the C application service to obtain a dynamic token leading to the C application service;
c, the intermediate interface accesses the C application service by using the user name obtained from the A application service and the dynamic token obtained from the C application service, and completes single sign-on from the A application service to the C application service;
And d, the application service B interacts with the application service C, the application service B logs in the user, acquires a dynamic token leading to the application service C, accesses the application service C, and completes single sign-on from the application service B to the application service C.
In the above technical solution, the step a specifically includes:
A11, an application service performs access operation on the intermediate interface;
Step a12, the intermediate interface performs interactive authentication with the application A single sign-on to obtain information of a user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
And a13. The A application service pushes the user object information to the intermediate interface, the intermediate interface analyzes the user object information and stores the user object information to the C application service, and the synchronization of the A application service user information to the C application service is completed.
In the above technical solution, the step b specifically includes:
And b11, calling the authentication service of the C application by the intermediate interface to log in, and obtaining a login dynamic Token.
In the above technical solution, the step c specifically includes:
Step C11, accessing the C application service through the HTTP through the user name obtained in the step a12 and the dynamic Token obtained in the step b11, and completing single sign-on from the A application service to the C application service.
In the above technical solution, the step d specifically includes:
Step d11, the B application service calls the authentication service login of the C application and acquires a login dynamic Token;
Step d12, accessing the C application service through the HTTP protocol by the logged-in dynamic Token acquired in the step d11 and the logged-in user of the B application service, and completing single sign-on from the B application service to the C application service.
In the above technical solution, the intermediate interface implementation step:
and step 1, configuring a CAS filter by an intermediate interface, and configuring a service address and a filter of an authentication center of the A system in web xml for unified authentication filtering of url requests provided by the intermediate interface.
Step 2, when the url address of the access intermediate interface system is ip port/loginSso, performing single sign-on authentication according to the filter set in the step 1, if the user is not logged in, jumping to the authentication interface of the server of the A system, and if the user is logged in, acquiring information of the login user of the A system by the intermediate interface system through a getRemoteUser () method of HttpServletRequest;
The request, getrequest user () is a built-in method provided by a jsp page, and can be used to obtain login user information after CAS single sign-on;
Step 3, analyzing the user information obtained in the step 2 by using a Map, JSONobject and other modes through an intermediate interface system to obtain a username;
Step 4, transmitting the user name into getUserTokenToBi () method through the url address of the intermediate interface system, wherein the url address is "ip: port/loginBi.dousername=user name", calling the user login interface of SDK service of C system in getUserTokenToBi () method, obtaining token dynamic token, using the obtained token dynamic token and the transmitted username, splicing url address is "ip: port/bitoken & username", and returning url address as json to loginSso.jsp;
getUserTokenToBi () implements logic: reading the configuration file to obtain a server address url, a user name userNm and a password pwd of the C system; the method comprises the steps of obtaining a token dynamic token by calling an encapsulated SDK service user login interface of a C system with an obtained url, userNm, pwd value;
and 5, receiving getUserTokenToBi a return value of a method of loginSso.jsp, wherein url addresses are "ip: port/bitoken & username", processing url by using a Window Location mode of JavaScript to be "ip: port/bitoken & username", and jumping to a first page index.jsp of the C system.
In the above technical solution, the intermediate interface further includes a step of user synchronization:
And 2.1, when the user information is changed, the A system calls the url address of the intermediate interface system to be 'ip: port/accdata.do' in apipush mode, and the user information (JSON) is transmitted into getDataFrmOthSys ().
And 2.2, getDataFrmOthSys () method analyzes and splits the user JSON character string to obtain related information such as user name, job number, mailbox, department and the like, and storing the related information in a database of the C system.
In the scheme getDataFrmOthSys () implements logic: converting the received JSON characters into JSONArrary objects by adopting a alibaba packaged JSON method, analyzing the converted JSONArrary objects and converting the converted JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.
The realization logic steps of the intermediate interface are as follows:
the intermediate interface adopts web application built by SSM, JSP, CSS, html, jquery and other components, and is an expandable, portable and reconfigurable system for solving the problem of inconvenient reconfiguration of single sign-on of a unified authentication system.
An intermediate interface software architecture as shown in fig. 3.
Single sign-on integration
The intermediate interface adopts CAS filter configuration, and a service address, a filter (filter) and the like of an authentication center of the A system are configured in web xml, so as to perform unified authentication filtering on url requests provided by the intermediate interface.
When the url address of the access intermediate interface system is "ip: port/loginsso.jsp", single sign-on authentication is performed according to the filter set in step 1, if the user is not logged in, the access intermediate interface system jumps to the authentication interface of the server of the a system, and if the user is logged in, the intermediate interface system obtains the information (JSON) of the login user of the a system through getRemoteUser () method of HttpServletRequest.
The request. Getrequest user () is a built-in method provided by the jsp page, and can be used to obtain login user information after CAS single sign-on.
And (3) analyzing the user information acquired in the step (2) by using a Map, JSONobject mode and the like by the intermediate interface system to acquire a user name (username).
And (3) transmitting the user name (username) obtained in the step (3) into a getUserTokenToBi () method through a url address of an intermediate interface system, namely 'ip: port/loginBi.dousername=user name', calling a user login interface of an SDK service of a C system in the getUserTokenToBi () method, obtaining a token dynamic token, splicing the url address into 'ip: port/bitoken & username' by using the obtained token dynamic token and the transmitted user name (username), and returning the url address to a logic sso.jsp as a json.
GetUserTokenToBi () implements logic: reading the configuration file to obtain a server address url, a user name userNm and a password (encrypted) pwd of the C system; the method comprises the steps of obtaining a token dynamic token by calling an encapsulated SDK service user login interface of a C system with an obtained url, userNm, pwd value;
The loginsso.jsp receives getUserTokenToBi () mode return value url address as 'ip: port/bitoken & username', processes url as 'ip: port/bitoken & username' by using Window Location mode of JavaScript, and jumps to the first page index.jsp of the C system.
(II) user synchronization
1. When the user information changes, the A system calls the url address of the intermediate interface system to be 'ip: port/accdata. Do' in apipush mode, and transmits the user information (JSON) into getDataFrmOthSys ().
2. And the getDataFrmOthSys () method analyzes and splits the user JSON character string to obtain related information such as the user name, the job number, the mailbox, the department and the like, and stores the related information into a database of the C system.
GetDataFrmOthSys () implements logic: converting the received JSON characters into JSONArrary objects by adopting a alibaba packaged JSON method, analyzing the converted JSONArrary objects and converting the converted JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.

Claims (4)

1. A method for solving the problem of inconvenient single sign-on of a reconfiguration application service is characterized in that an A application service and a C application service are non-reconfigurable, a B application service is reconfigurable,
A, calling an intermediate interface by the application service A, and interactively verifying the user login state by the intermediate interface and the application service A, if the user login is invalid, calling the application service A to re-login; if the user is logged in, the intermediate interface acquires the user name of the logged-in user from the A application service;
Step b, the intermediate interface interacts with the C application service to obtain a dynamic token leading to the C application service;
c, the intermediate interface accesses the C application service by using the user name obtained from the A application service and the dynamic token obtained from the C application service, and completes single sign-on from the A application service to the C application service;
Step d, the application service B interacts with the application service C, the application service B logs in the user, obtains a dynamic token leading to the application service C, accesses the application service C, and completes single sign-on from the application service B to the application service C;
the step a specifically comprises the following steps:
A11, an application service performs access operation on the intermediate interface;
Step a12, the intermediate interface performs interactive authentication with the single sign-on of the application A service to obtain information of a user object, and the intermediate interface analyzes the information of the user object to obtain a user name;
step a13, the A application service pushes user object information to an intermediate interface, the intermediate interface analyzes the user object information and stores the user object information to the C application service, and the synchronization of the A application service user information to the C application service is completed;
The step b specifically comprises the following steps:
Step b11, the intermediate interface calls the authentication service of the C application to log in and obtains a login dynamic Token;
the step c specifically comprises the following steps:
Step C11, accessing the C application service through the HTTP through the user name obtained in the step a12 and the dynamic Token obtained in the step b11, and completing single sign-on from the A application service to the C application service;
The step d specifically comprises the following steps:
Step d11, the B application service calls the authentication service login of the C application and acquires a login dynamic Token;
Step d12, accessing the C application service through the HTTP protocol by the logged-in dynamic Token acquired in the step d11 and the logged-in user of the B application service, and completing single sign-on from the B application service to the C application service.
2. The method for resolving single sign-on of inconvenient reconfiguration application services according to claim 1, wherein the intermediate interface implementation steps:
Step 1, configuring a CAS filter by an intermediate interface, and configuring a service address and a filter of an authentication center of an A system in web xml, wherein the service address and the filter are used for carrying out unified authentication filtering on url requests provided by the intermediate interface;
step 2, when the url address of the access intermediate interface system is ip port/loginSso, performing single sign-on authentication according to the filter set in the step 1, if the user is not logged in, jumping to the authentication interface of the server of the A system, and if the user is logged in, acquiring information of the login user of the A system by the intermediate interface system through a getRemoteUser () method of HttpServletRequest;
The request, getrequest user () is a built-in method provided by a jsp page, and can be used to obtain login user information after CAS single sign-on;
Step 3, analyzing the user information obtained in the step 2 by using a Map, JSONobject and other modes through an intermediate interface system to obtain a username;
Step 4, transmitting the user name into getUserTokenToBi () method through the url address of the intermediate interface system, wherein the url address is "ip: port/loginBi.dousername=user name", calling the user login interface of SDK service of C system in getUserTokenToBi () method, obtaining token dynamic token, using the obtained token dynamic token and the transmitted username, splicing url address is "ip: port/bitoken & username", and returning url address as json to loginSso.jsp;
getUserTokenToBi () implements logic: reading the configuration file to obtain a server address url, a user name userNm and a password pwd of the C system; the method comprises the steps of obtaining a token dynamic token by calling an encapsulated SDK service user login interface of a C system with an obtained url, userNm, pwd value;
and 5, receiving getUserTokenToBi a return value of a method of loginSso.jsp, wherein url addresses are "ip: port/bitoken & username", processing url by using a Window Location mode of JavaScript to be "ip: port/bitoken & username", and jumping to a first page index.jsp of the C system.
3. The method for resolving single sign-on for inconvenient reconfiguration of an application service of claim 1, wherein the intermediate interface further includes the step of user synchronization:
Step 2.1, when the user information changes, the A system calls the url address of the intermediate interface system to be 'ip: port/accdata. Do' in apipush mode, and the user information (JSON) is transmitted into getDataFrmOthSys ();
And 2.2, getDataFrmOthSys () method analyzes and splits the user JSON character string to obtain related information such as user name, job number, mailbox, department and the like, and storing the related information in a database of the C system.
4. The method of single sign-on to resolve inconvenient reconfiguration of application services of claim 1, wherein getDataFrmOthSys () implements logic to: converting the received JSON characters into JSONArrary objects by adopting a alibaba packaged JSON method, analyzing the converted JSONArrary objects and converting the converted JSONArrary objects into user information List objects, and then calling a mapper realized based on a Mybatis framework to store the user information in a database in batches.
CN202210979836.5A 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service Active CN115499162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210979836.5A CN115499162B (en) 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210979836.5A CN115499162B (en) 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service

Publications (2)

Publication Number Publication Date
CN115499162A CN115499162A (en) 2022-12-20
CN115499162B true CN115499162B (en) 2024-07-19

Family

ID=84466499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210979836.5A Active CN115499162B (en) 2022-08-16 2022-08-16 Single sign-on method for solving inconvenient reconfiguration application service

Country Status (1)

Country Link
CN (1) CN115499162B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117786651B (en) * 2024-02-27 2024-06-07 杭州玳数科技有限公司 Method and device for realizing single sign-on based on java class loader

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356694B2 (en) * 2004-03-10 2008-04-08 American Express Travel Related Services Company, Inc. Security session authentication system and method
US10033702B2 (en) * 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites

Also Published As

Publication number Publication date
CN115499162A (en) 2022-12-20

Similar Documents

Publication Publication Date Title
CN103475726B (en) A kind of virtual desktop management, server and client side
CN106856434B (en) Method and apparatus for access request conversion
CN103581213B (en) A kind of application process of shared Hosts files, equipment and system
CN106209726B (en) A mobile application single sign-on method and device
JP7398580B2 (en) Partner integration network
CN114025021B (en) Communication method, system, medium and electronic equipment crossing Kubernetes cluster
CN103716326A (en) Resource access method and URG
CN106169963A (en) The access method of service page and system, proxy server
CN106685949A (en) Container access method, container access device and container access system
US20140006579A1 (en) Techniques to discover services recursively in a distributed environment
CN109379742A (en) Access method, device and storage medium of wireless local area network
CN107231445A (en) A kind of dynamic domain name system DNS reorientation methods, apparatus and system
CN115499162B (en) Single sign-on method for solving inconvenient reconfiguration application service
CN111585786A (en) Realization of secret-free building method of big data cluster
CN112769863B (en) Method and device for processing service request message data, electronic equipment and readable storage medium
CN116506136A (en) Cross-domain login authentication method and device for government service
CN110321498A (en) A kind of two dimensional code generates and analyzing method and device
CN105991568A (en) Proxy realizing device
US20160164969A1 (en) Personal Computer Network, Mobile Connection and Searching Systems
CN108737350B (en) Information processing method and client
CN110035089A (en) A kind of network security verification method and system of distributed system
CN114827246A (en) Gateway flow control method and device, electronic equipment and storage medium
TW201828093A (en) Visit request conversion method and device that identifies a target service type of a visit request and breaks down the visit request to a data structure corresponding to the target service type to be supplied to a corresponding server
CN115348041A (en) Equipment activation method and device
CN116582516B (en) Data transmission method, device, system, medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant