Multi-system security unified authentication system and method based on jwt
An authentication method and authentication system technology, which is applied in the jwt-based multi-system security unified authentication method and system field, can solve problems such as hidden safety hazards and system damage, and achieve the effects of reducing difficulty in use, reducing operation and maintenance costs, and avoiding security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] The overall idea of the present invention is as follows: Aiming at the problems that there are multiple software systems in the enterprise, the authentication systems between the systems are independent, and the switching and login are complicated, a jwt-based multi-system security unified authentication method is proposed, in order to solve the security problem of jwt stateless token , to achieve unified login authentication for the security of multiple software systems, including:
[0038] 1) The issuance and verification of jwt is carried out by the token certification center;
[0039] 2) Use the ocelot gateway for routing and forwarding, follow the oauth2 standard, and connect to the token authentication center to realize real-time authentication of jwt;
[0040] 3) The accessed application system distributes the response menu according to the user information and permission information carried in the jwt;
[0041] 4) When the user logs out or logs out, the brows...
Embodiment 2
[0053] like image 3 As shown, this embodiment provides a jwt-based multi-system security unified authentication method, including the following steps:
[0054] Receive the access request from the client, judge the access request, and determine whether the request header of the access request contains a token. If it contains a token, send the token to the authentication center for verification. After the verification is passed, the verification result is returned, and the access request is returned. Forward to the corresponding application interface to realize the user's login, otherwise, forward the access request to the client login interface.
[0055] The technical advantage of the above solution is that it realizes the unified authentication of multiple systems, reduces the difficulty of using the user, and reduces the operation and maintenance cost of the enterprise maintaining the login authentication of each system.
[0056] The sending of the token to the certificatio...
Embodiment 3
[0064] This embodiment provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, implements the steps in the above-mentioned jwt-based multi-system security unified authentication method.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


