Online studies - Day 16 - Lecture - Spring Security Oauth2 JWT a

user authentication needs analysis
1.1  User Authentication and Authorization 
To date, the project has completed the online learning function, users learn through online learning pages on-demand video. How to record students' learning process it? To grasp the situation of students need to know the user's identity information, which users learn what the course record at what time; if you want to buy to buy the course also need to know the user's identity. Therefore, to manage the learning process essential to implement user authentication.
What is User Authentication? 
User authentication system that is user to access the system resources required to verify the user's identity information, legal status may continue to access. Common user identity recognition certificate forms are: user name password, fingerprint punch card and other ways.
What is the user authorized? 
After user authentication to access the resources of the system, the system determines whether the user has permission to access a resource, allowing only access to privileged system resources, did not have permission to access the resources will not be, a process called user authorization.
1.2  single sign-on requirements 
of the project includes several subprojects, such as: learning system, teaching center management, system management center, in order to improve the user experience of the user only needs to achieve recognition system certificate once they can have access to multiple access this feature is called single sign-on.
References Baidu Encyclopedia: single sign-on ( Single Sign the On ), referred to as  SSO , it is one of the more popular enterprise business integration solutions. 
SSO defined in multiple applications, users need only log in once to access all applications of mutual trust. 
The figure isSSO schematic, the user logs into the network to learn once to access multiple systems.
 
1.3  third-party certification requirements 
as the Internet project will inevitably need to access resources outside the system, the same system resources have access to third-party interface to the system, a scene follows

a micro-channel studies have not registered online users in the system can be requested by letter Micro System to verify the identity of the user, after verification by the user can be in the system study, its basic process is as follows: 

 
as can be seen from the figure, the micro-channel does not belong to the present system, the present system does not information storing micro-channel user account and password this system, if you want to obtain the user 's information is need to be authenticated by the authentication system micro-channel (micro-channel authentication), the micro-channel authentication system can obtain the micro-channel user 's information, so that this system the micro-channel users avatar, nicknames and other information displayed, the user will not have to learn it can be directly registered in the system learning.
What is a third-party certification (cross-platform authentication)? 
When you need to access the resources of third-party systems we need to be certified by third party systems (such as: micro-channel certification), by a third party system for user authentication through before, and authorize access to resources. 

 

Published 835 original articles · won praise 152 · Views 140,000 +

Guess you like

Origin blog.csdn.net/qq_40208605/article/details/104207375