Multi-application single sign-on method and device, equipment and storage medium

A single sign-on and multi-application technology, applied in the computer field, can solve the problems of weak framework compatibility, difficulty in compatibility with single sign-on business, and weak expansion ability of framework business, so as to improve flexibility and compatibility and reduce modification , Improve the effect of user experience

Pending Publication Date: 2020-12-04
RUN TECH CO LTD BEIJING
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current framework based on JWT token authentication does not have strong business expansion capabilities, cannot flexibly adapt to o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-application single sign-on method and device, equipment and storage medium
  • Multi-application single sign-on method and device, equipment and storage medium
  • Multi-application single sign-on method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It is a flowchart of a multi-application single sign-on method provided by Embodiment 1 of the present invention, and this embodiment is applicable to the situation of implementing multi-application single sign-on. The method can be executed by a multi-application single sign-on device, and the device can be implemented by hardware and / or software, for example, the multi-application single sign-on device can be configured in a computer device. Such as figure 1 As shown, the method specifically includes the following steps:

[0030] Step S110, in response to the received login verification request, acquire the session identifier in the login verification request.

[0031] In this embodiment, the login verification request is initiated by the client and is used to make the server perform a single sign-on login verification request. Optionally, the login verification request includes the client ID of the client that initiates the login verification request, the...

Embodiment 2

[0046] figure 2 It is a flow chart of a multi-application single sign-on method provided by the embodiment of the present invention. On the basis of the above-mentioned solution, this embodiment specifies the operation when the JWT corresponding to the session identifier is not obtained. Such as figure 2 As shown, the method specifically includes the following steps:

[0047] Step S210, in response to the received login verification request, acquire the session ID in the login verification request.

[0048] Step S220: Determine the session corresponding to the session ID according to the session ID, obtain the JWT corresponding to the session ID from the session, and generate a manual login instruction and send it to the client when there is no JWT corresponding to the session ID in the session or the database.

[0049] In this embodiment, when there is no JWT corresponding to the session identifier in either the session or the database, it means that neither the session n...

Embodiment 3

[0058] image 3 It is a flow chart of a multi-application single sign-on method provided by an embodiment of the present invention, and this embodiment is further optimized on the basis of the foregoing embodiments. Such as image 3 As shown, the method specifically includes the following steps:

[0059] S310. In response to the received login verification request, acquire the session identifier in the login verification request.

[0060] S320. Acquire a javaScrip object numbered notation network token JWT corresponding to the session identifier.

[0061] S330. Verifying the payload information, survival time, and update time of the JWT in sequence.

[0062] In this embodiment, after the JWT is obtained, the JWT is parsed to obtain the payload information, survival time and update time of the JWT, and the payload information, survival time and renewal time are verified in sequence. Wherein, the payload information is the subject content part of the JWT, which is a JSON obj...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-application single sign-on method and device, equipment and a storage medium The method comprises the following steps of: in response to a received login verification request, obtaining a session identifier in the login verification request; obtaining a javaScrip object numbered musical notation network token JWT corresponding to the session identifier; and verifying the JWT, generating login response information according to a verification result, and sending the login response information to a client. According to the method provided by the embodiment of the invention, the session identifier and the JWT are stored in an associated manner, so that login verification is carried out based on the session identifier, single sign-on flows under different sessionmanagement modes can be compatible, the modification on a business process is reduced, and the flexibility and compatibility of a framework are improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a multi-application single sign-on method, device, device and storage medium. Background technique [0002] Single sign-on (Single Sign On, SSO) means that in multiple application systems, users only need to log in once to access multiple applications. [0003] JWT (JSON Web Token) is currently a commonly used single sign-on solution. The principle of JWT is that after server authentication, a JSON object will be generated and sent back to the user. After the user receives the token information, each subsequent request will bring the token information as authentication information. After receiving the user request, the server will obtain the token from the request header and verify its validity, thus completing the identity The process of certification. [0004] However, the current framework based on JWT token authentication does not have strong...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/41
CPCG06F21/41
Inventor 卢竹松程强张志远
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products