Single sign-on implementation method based on ukey authentication

An implementation method and single sign-on technology, applied in the network field, to achieve the effect of highlighting substance and ensuring legitimacy

Inactive Publication Date: 2019-11-26
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But currently cas only supports authentication of username and password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single sign-on implementation method based on ukey authentication
  • Single sign-on implementation method based on ukey authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Such as figure 1 A single sign-on implementation method based on ukey authentication is shown, including:

[0034] Use the security management framework to establish an identity authentication system, and perform key and system user binding and identity authentication.

[0035] Save authenticated user information through cross-domain authentication solutions.

[0036] When the user directly logs in to the system, he first enters the identity authentication system for identity authentication. After the identity authentication is successful, he jumps to the homepage of the system that the user wants to visit, and the identity authentication system automatically jumps back to the homepage of the identity authentication system.

[0037] When the user logs in to the system through the identity authentication system, the identity authentication system shows the user the accessible systems, and the user chooses to enter.

Embodiment 2

[0039] Based on the first embodiment, the security management framework adopts Apache Shiro; the cross-domain authentication solution adopts JSON Web Token. Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, password and session management. With the help of the existing excellent security management framework shiro to realize the authority management of the system, and at the same time refer to the cas mode to realize the authentication system, the authentication of the system is completed based on the ukey authentication at the PKI level. After the authentication is completed, the token generated by jwt is saved in memcached, and the user can log in to other systems without further authentication. After the user logs out of a certain system, he needs to re-authenticate. SON Web Token (JWT) is currently the most popular cross-domain authentication solution.

[0040] Such as figure 2 A single sign-on implementation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a single sign-on implementation method based on ukey authentication. A key and a system user are bonded through an identity authentication system. A token is generated through ajJSON Web Token. Authentication user information is stored. After authentication succeeds, a system is accessed, and the corresponding token is acquired in the system for verification. A home page isentered after the Token is successfully verified, and the system home page is authenticated after the Token is successfully verified. If the authentication system is directly accessed, the authentication system is entered to display the system accessible to the user, and the user selects to enter.

Description

technical field [0001] The present invention relates to the field of network technology, and more specifically relates to a single sign-on implementation method based on ukey authentication. Background technique [0002] Single sign-on SSO (Single Sign On) simply means that in a multi-system coexistence environment, after the user logs in in one place, he does not need to log in in other systems, that is, the user's one-time login can gain the trust of all other systems . [0003] Single sign-on is a widely used solution, whether on a large website or an enterprise website. Due to the large scale of the website, hundreds of subsystems are involved. If each system needs to be re-authenticated, it will not only take time and effort, but also be extremely bad for users. [0004] Now the most common solution to achieve single sign-on is through CAS. CAS is the abbreviation of Central Authentication Service, Central Authentication Service, an independent open instruction proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/46
CPCG06F21/46H04L63/0428H04L63/08H04L63/0815
Inventor 毕亮亮
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products