1 user authentication needs analysis
1.1 User Authentication and Authorization
To date, the project has completed the online learning function, users learn through online learning pages on-demand video. How to record students' learning process it? To grasp the situation of students need to know the user's identity information, which users learn what the course record at what time; if you want to buy to buy the course also need to know the user's identity. Therefore, to manage the learning process essential to implement user authentication.
What is User Authentication?
User authentication system that is user to access the system resources required to verify the user's identity information, legal status may continue to access. Common user identity recognition certificate forms are: user name password, fingerprint punch card and other ways.
What is the user authorized?
After user authentication to access the resources of the system, the system determines whether the user has permission to access a resource, allowing only access to privileged system resources, did not have permission to access the resources will not be, a process called user authorization.
1.2 single sign-on requirements
of the project includes several subprojects, such as: learning system, teaching center management, system management center, in order to improve the user experience of the user only needs to achieve recognition system certificate once they can have access to multiple access this feature is called single sign-on.
References Baidu Encyclopedia: single sign-on ( Single Sign the On ), referred to as SSO , it is one of the more popular enterprise business integration solutions.
SSO defined in multiple applications, users need only log in once to access all applications of mutual trust.
The figure isSSO schematic, the user logs into the network to learn once to access multiple systems.
1.3 third-party certification requirements
as the Internet project will inevitably need to access resources outside the system, the same system resources have access to third-party interface to the system, a scene follows
a micro-channel studies have not registered online users in the system can be requested by letter Micro System to verify the identity of the user, after verification by the user can be in the system study, its basic process is as follows:
as can be seen from the figure, the micro-channel does not belong to the present system, the present system does not information storing micro-channel user account and password this system, if you want to obtain the user 's information is need to be authenticated by the authentication system micro-channel (micro-channel authentication), the micro-channel authentication system can obtain the micro-channel user 's information, so that this system the micro-channel users avatar, nicknames and other information displayed, the user will not have to learn it can be directly registered in the system learning.
What is a third-party certification (cross-platform authentication)?
When you need to access the resources of third-party systems we need to be certified by third party systems (such as: micro-channel certification), by a third party system for user authentication through before, and authorize access to resources.
Online studies - Day 16 - Lecture - Spring Security Oauth2 JWT a
Guess you like
Origin blog.csdn.net/qq_40208605/article/details/104207375
Recommended
Ranking