Internet identity authentication management method
An identity authentication and management method technology, applied in the field of Internet identity authentication management, can solve the problems of password authentication, such as security, users forgetting passwords, brute force cracking, etc., to ensure security, facilitate access control, and simplify operations.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0022] This solution uses Kong for identity authentication, authority control, and request forwarding, combined with SpringBoot framework, Redis cache, and mysql database to design and implement a microservice system.
[0023] Password authentication method:
[0024] When a user accesses and logs in to the system, the request will first be sent to the gateway. The gateway performs different processing according to different requests of users. The gateway is set with a black and white list for different interception and release processing. When it is identified as a login operation, the request is forwarded; the authentication service first judges whether secondary authentication is required based on the user's needs, and if necessary, verifies the mobile phone verification code. The identity consistency of the information entered by the user and the user information of the user service is judged. When the authentication is passed, the token (token)-userInfo is stored on Redi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More