Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web system log in constraint method based on single sign-on

A single sign-on, web application technology, applied in transmission systems, electrical components, etc., can solve problems such as flexible configuration of different application systems

Active Publication Date: 2017-05-24
G CLOUD TECH
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, the traditional single sign-on system cannot be individually and flexibly configured for different application systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web system log in constraint method based on single sign-on
  • Web system log in constraint method based on single sign-on

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Such as figure 1 Shown, method of the present invention comprises the steps:

[0030] Step 1: The user browser sends an access request to the Web application system;

[0031] Step 2: The web application system checks whether the service certificate exists in the user's browser, if it exists, then go to step 9, otherwise, go to step 3;

[0032] Step 3: Redirect the access request to the single sign-on server;

[0033] Step 4: The single sign-on server checks whether the authorization certificate exists in the user's browser, if it exists, then go to step 5, otherwise, go to step 8;

[0034] Step 5: The single sign-on server verifies the validity of the authorization credential, if valid, go to step 6, otherwise, go to step 8;

[0035] Step 6: The single sign-on server verifies whether the user's login constraint rules for the web application system are valid, if valid, go to step 7, otherwise, go to step 8;

[0036] Step 7: The single sign-on server will issue a serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of Web system identity authentication, and particularly relates to a Web system log in constraint method based on single sign-on. The method comprises the steps that a user issues an access request; when an authorization certificate verified to be valid, a single sign-on server verifies whether the log in constraint rule of a user is valid for a Web application system; if the log in constraint rule is valid, the single sign-on server issues a service certificate to the user, otherwise the current log in page continues to be returned; after the service certificate is issued, the single sign-on server redirects a browser to the Web application system page the user requests to access; and whether the service certificate is valid continues to be verified. According to the invention, the problem of single constraint of different application systems of a single sign-on system is effectively solved, and the method can be applied to the Web system based on single sign-on.

Description

technical field [0001] The invention relates to the technical field of Web system identity authentication, in particular to a Web system login constraint method based on single sign-on. Background technique [0002] With the expansion of enterprise business and the increase of business complexity, the application systems required by enterprises continue to increase, and enterprise employees also need to use different application systems to complete their daily work. But each application system has its own authentication method; the system administrator not only has to maintain the integrity of each application system's security policy, but also maintains each application system's own user authentication data. When the company recruits new employees and needs to add their information to the application system, the system administrator needs to add the required authentication information in each application system for the new employees. Single sign-on came into being to meet ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L67/02
Inventor 莫展鹏杨松季统凯
Owner G CLOUD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products