Distributed system security authentication method based on JWT
A distributed system and security authentication technology, applied in the field of JWT-based distributed system security authentication, can solve the problems of increased application system development complexity, bloated technical architecture, difficult maintenance, etc., to save development and operation and maintenance costs, improve Verify performance and ensure the effect of architecture performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0078] The user side maintains the token (Token) in local storage media such as Cookie, localStorage, sessionStorage, etc., which ensures the scalability of the solution.
[0079] The verification method for the user side of the Auth authentication service is: verify the authentication conditions of the user side through a single sign-on system (SSO), etc., and the authentication conditions generally include whether the user name and password are correct or not.
[0080] Please see attached figure 2 , when the user side accesses the resource provider, the access sequence is as follows:
[0081] Step 1: Build the Auth authentication service and provide a token (Token) issuance interface, which is called by the user side.
[0082] Step 2: The Auth authentication service generates a pair of public key and private key, maintains the private key locally, and provides the public key to all resource providers. The public key is provided to the resource provider offline in advance....
Embodiment 2
[0104] The service party maintains the token (Token) in storage media such as Redis, database, and memory.
[0105] The authentication conditions of the Auth authentication service for the server generally include whether the service code and the password are consistent or not.
[0106] Please see attached image 3 , when the server accesses the resource provider, the access sequence is as follows:
[0107] Step 1: Build the Auth authentication service and provide a token (Token) issuing interface, which is called by the service party.
[0108] Step 2: The Auth authentication service generates a pair of public key and private key, maintains the private key locally, and provides the public key to all resource providers. The public key is provided to the resource provider offline in advance. The resource provider integrates the Auth dependency package. The Auth dependency package maintains the public key corresponding to the private key carried by the Auth authentication servi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


