background However, as the company develops, the number of systems used increases. When operating different systems, operators need to log in multiple times, and each system has a different account. This is very difficult for operators. So, it is very inconvenient. So, I thought, can I log in to one system without logging in to other systems? This is the problem that single sign-on is going to solve. Single Sign On, or SSO, is short for Single Sign On. It means that in multiple application systems, you only need to log in once to access other mutually trusted application systems. image As shown in the figure, there are 4 systems, namely Application1, Application2, Application3, and SSO. Application1, Application2, and Application3 do not have login modules, while SSO only has login modules and no other business modules. When Application1, Application2, and Application3 need to log in, they will jump to the SSO system. After the SSO system completes the login, other application systems will also log in. This fully meets our definition of single sign-on (SSO). Technical Implementation As shown in the figure above, we access an application in the browser. This application requires login. After we fill in the username and password, we complete the login authentication. At this time, we mark the login status as yes (logged in) in the session of this user, and write a cookie in the browser. This cookie is the unique identifier of this user. The next time we access this application, the request will carry this cookie. The server will find the corresponding session based on this cookie and determine whether the user is logged in through the session. If no special configuration is made, the name of this cookie is jsessionid, and the value is unique on the server. Single sign-on in the same domain As long as we log in to sso.a.com, app1.a.com and app2.a.com will also log in. Through the above login authentication mechanism, we can know that when we log in to sso.a.com, the login status is actually recorded in the session of the sso.a.com server, and the cookie is written under sso.a.com on the browser side (Browser). So how can we let app1.a.com and app2.a.com log in? There are two questions here:
So how do we solve these two problems? For the first problem, after SSO login, the domain of the cookie can be set to the top domain, that is, .a.com, so that all subdomain systems can access the top domain cookie. When we set cookies, we can only set the top domain and our own domain, and cannot set other domains. For example: we cannot set cookies for the domain of baidu.com in our own system. The cookie problem has been solved. Now let's look at the session problem. We have logged in to the sso system. When we visit app1, the cookie is also brought to the server of app1. How can the server of app1 find the session corresponding to this cookie? Here we need to share the sessions of the three systems, as shown in the figure. There are many solutions for sharing sessions, such as Spring-Session. This solves the second problem. Single sign-on in the same domain is achieved, but this is not true single sign-on. Single sign-on under different domains Here we have to talk about the CAS process, which is the standard process for single sign-on. cas_flow_diagram The above picture is the standard process on the CAS official website. The specific process is as follows:
At this point, cross-domain single sign-on is complete. When we access the app system in the future, the app will be logged in. Next, let's take a look at the process of accessing the app2 system.
In this way, the app2 system does not need to go through the login process, it is already logged in. SSO, app and app2 are in different domains, and there is no problem with not sharing the session between them. Some students asked me that after logging in to the SSO system, when jumping back to the original business system, there is a parameter ST, and the business system needs to use ST to access SSO again for verification. They think this step is a bit redundant. He wants to return the user information to the original business system through the callback address after the SSO login authentication is passed, and the original business system directly sets the login status. This process is simple and the login is completed. Isn't it great? In fact, this problem is very serious. If I do not log in to SSO, but directly type the callback address in the browser with forged user information, will the business system also think that I am logged in? This is very scary. Summarize All the processes of single sign-on (SSO) have been introduced, and the principles are clear to everyone. To summarize what single sign-on needs to do:
|
<<: 5G development: Don’t be afraid of the clouds blocking your view
HostYun launched a special promotion from the 12t...
There are still a few days before Black Friday, a...
[[350048]] This article is reprinted from the WeC...
In the near future, mankind will once again usher...
CloudSilk.io recently offered a 10% discount coup...
Aruba, a subsidiary of Hewlett Packard Enterprise...
Labs Guide When we talk about narrowband communic...
A few days ago, we shared the Black Friday VPS pr...
4G, the mobile network that allows us to make cal...
Historically, one of the biggest drawbacks of Wi-...
Recently, IDC released the "China Ethernet S...
[51CTO.com original article] On April 25, Huawei ...
On October 24, the 1024 Kunpeng Programmer's ...
In March this year, the Ministry of Industry and ...
The Beijing Municipal Communications Administrati...