Part 1: install and configure Tomcat
Part 2: install and configure cas
1. Download CAS and. Net CAS client.
CAS: http://www.jasig.org/cas/download
. Net CAS client: https://wiki.jasig.org/display/CASC/.Net+Cas+Client
2. Install cas
Decompress the downloaded example -server-3.5.1-release.zip ",
Find cas-server-webapp-3.5.1.war in the modules folder and rename it as CAS. War"
Copy "CAs. War" to the "% tomcat_home % \ webapps" folder. Wait a moment and refresh it. Tomcat automatically dec
, so you cannot access SQL server data through IP addresses, the solution is to start the SQL Server Configuration Manager and enable TCP/IP in it. After enabling it, remember to restart the SQL Server service for the setting to take effect. :
(4) Save the changes to '% atat_home % \ webapps \ CAS \ WEB-INF \ deployerconfigcontext. xml.
(5) restart the Tomcat service.
4. Test Database-based Identity Authentication
Run the previously debugged webform from the clientProgram(See Yale
Easy Single Sign-on with ASP. NET Forms Identity AuthenticationFor example, our primary domain is domain.com.The other two-level domains have1, list.domain.com2, item.domain.com3, home.domain.comLogin and register are placed in passport.domain.com this level two domain name goes down processingconfiguring in Web. config1 AuthenticationMode= "Forms"> 4 Formsname= "CNBDQ"loginurl= "/login"Protection= "All"Timeout= "480"Path="/"Domain= ". domain.com"/> 7 Authentication>8 9 Ten MachineKeyvalid
) Import the certificate into the certificate Truststore of the JDKFirst step: Export the certificate.Execute command "Keytool-export-trustcacerts-alias tomcat-file c:\keys\tomcat.cer-keystore C:\keys\.keystore-storepass Changeit "Export the certificate to the Keys folder.Step Two: Import the certificate into the JDK certificate Truststore.Execute command "Keytool-import-trustcacerts-alias tomcat-file c:\keys\tomcat.cer-keystore" C:\Program files\java\jre7\lib\ Security\cacerts "-storepass Chang
[SSO single-point series] (6): CAS4.0 single-point process Sequence Diagram (Chinese version) and related terminology (TGT, ST, PGT, PT, PGTIOU), tgtpgt
CAS-related content has not been written for a long time. It may be updated next week.
Since the single-point process sequence diagram in the previous article was directly downloaded from the official website, it was in English and may not be understood by some friends, so it was changed to Chinese.
[SSO single-point series] (4): Return of user information after cas server logon, ssocas
Next, in the previous article, we described how to add a verification code on the cas server logon page and log on. Once the cas server is successfully verified, we will jump to the client. After you jump to the client, let's think about it. The client always needs to obtain user information. Otherwise, how does the client know which user to log on. How does the
CAS SSO integrated java + PHP (DISCUZ,BBS) configuration
CAS Construction Preparation:
cas-server-3.4.4
cas-client-3.2.0
apache-tomcat-6.0.14
?
Remove HTTPS authentication and change to HTTP authentication
1. Enter the Web-inf\spring-configuration directoryOpen Warncookiegenerator.xml FileModify the value of P:cookiesecure to False2. Open Ticketgrantingticketcookiegenerator.xml FileAlso modifies the value of P:cookiesecure to False3. Open Web-inf\de
I based on the framework of the use of OAuth2.0 summary, drawing a user name + password to achieve OAuth2.0 login certification flowchart, today we look at the logout process:/** * 用户注销 * @param accessToken * @return */ @RequestMapping(value = "/user/logout", method = RequestMethod.POST) public ResponseVO userLogout(@RequestHeader(value = "accessToken", required = true) String accessToken, @RequestHeader(value = "userId", required = true) Long userId) throws Exception{
I based on the framework of the use of OAuth2.0 summary, drawing a user name + password to achieve OAuth2.0 login certification flowchart, today we look at the logout process: /** * User logoff * @param accesstoken * @return */@RequestMapping (value = "/user/logout", Metho D = requestmethod.post) public Responsevo userlogout (@RequestHeader (value = "Accesstoken", required = true) String access Token, @RequestHeader (value = "userid", required = True) Long userId) throws exception{Oauthaccesstok
Boolean authenticateusernamepasswordinternal (final usernamepasswordcredentials Credentials) throws Authenticationexception {
//Get the value passed by the foreground, username and password
final String username = Getprincipalnametransformer (). Transform (Credentials.getusername ());
Final String password = Credentials.getpassword ();
Final String Encryptedpassword = This.getpasswordencoder (). Encode (
password);
try {
final
PHP SSO Single Sign-on and logout function with CAsOne.. CAS Server SetupCAS Server side: http://downloads.jasig.org/cas/Unzip Cas-server-4.0.0-release.zip to rename the Cas-server-webapp-4.0.0.war under the modules directory as Cas.war copy to under Tomcat's WebApps, launch Tomcat, Access: Http://localhost:8080/cas/login you will see the login screen:CAS server by default is the user name = password authentication, and the use of HTTPS authentication
1. Scene Restore
There is always a single sign on the wood to hear. But I do not know the principle of it; Single Sign-On (SSO) is a popular business integration scheme, and users can access mutual trust application system only once. Today I am based on CAs to achieve single sign-on, hoping to give everyone inspiration. 2. precautions
In this instance project, contains 3 Tomcat:tomcat-main,tomcat-1,tomcat-2;tomcat-main to implement HTTPS access; Tomc
Above is the overall flowchart, this SSO component is very safe to consider, can be said to be very safe, then look at the login request data format, and why it can guarantee authenticity and integrity
In this way, when the data in the transmission process, if the site number, user number, request number of any one to make any changes, when the certification center received data, can not match the signature information. All Certification Center can
Source: Https://github.com/Jasig/phpCAS Document: Https://wiki.jasig.org/display/CASC/phpCAS+examples Installation Use Pear installation under Ubuntu sudo pear install http://downloads.jasig.org/cas-clients/php/current.tgz Configuration CAS server
With the previous foundation, you can now start the deployment of the CAS server side.
First you can go to http://www.jasig.org/cas/download. Download the latest server and client side of CAs
Here we are downloading Cas-server-3.4.2-release.zip and
Apacheds document is more difficult to read, the definition of User Rights section is more obscure, fortunately, nut has been chewed down.
First, leave the useful information I have seen:
1, official documents-Basic User manual:
In response to changes in demand, when logging in to CAS, the default is based on user name and password verification, if you add a user name, password and a system ID to verify it? How to do it? We know the CAS default login interface, enter the
The invocation of a page is implemented primarily through recursive invocation and the dynamic creation of a script tag.SSO a JS script that writes cookies across domains
Login Persistence mechanism: cookies&&sessionCookies: The information is stored to the client, all information is unsafe, the information is encrypted, the cookie stores the unique identity of the current session, that is, SessionID, he will also be
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.