In this configuration document, refer to Argan's blog... use Yale CAS server to achieve single point of login (SSO)Argan's blog... Address: http://blog.matrix.org.cn/page/cas
Configure java_home as follows:Java_home = D:/Java/jdk1.5.0 _ 06
CAS (Central Authentication Service) is an open-source Java implementation developed by its of Yale University.SSO (Single Si
that user creden。 cannot flow to remote services (such as SQL Server ). However, Kerberos does not have this problem. It maintains a stable and secure verification server.
You can also easily use delegation in a Windows environment. We will discuss this mechanism.
Microsoft Active Directory is required for Kerberos in most cases because Active Directory acts as
Linux Server Secure Login considerations
Remove unnecessary users
Remove unnecessary groups of users
Set the responsible login password (case, number, letter, underscore, special character)
Disable root for remote login, use normal user
As PHP becomes more popular, Linux vps/servers are used more and more, and Linux security issues need to be enhanced, if you install denyhosts and set up email reminders, you may be subject to several letters each day denyhosts The reporting will come to break the SSH password IP join/etc/hosts.deny.
There are two types of Linux ssh logins:
1, the use of password Authentication login
Typically, a VPS or server
The secure client logs into the server via a key:1. Secure Client SettingsGenerate key650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M02/8C/1A/wKioL1hiT2_i5IZJAABxAlPoYyA079.png-wh_500x0-wm_3 -wmp_4-s_1034965126.png "title=" 1.png "alt=" Wkiol1hit2_i5izjaabxalpoyya079.png-wh_50 "/>Click Next:650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M01/8C/1A
which is Used to # Allow or deny connections to network services This # either use the Tcp_wrappers library or that has bee N # started through a tcp_wrappers-enabled xinetd. # # see ' Mans 5 Hosts_options ' and ' Man 5 hosts_access ' # for information on rule syntax. # see ' Mans TCPD ' for information on Tcp_wrappers # Sshd:192.168.1.*, 114.165.77.144,133.110.186.130,133.110.186.139:allow //The last allow can be omitted Sshd:all:deny () nbsp //This is a setup
In the previous article to ensure that Linux VPS and server more secure Xshell set key login article has been shared to Xshell use the key to login to our VPS server to ensure the safety of the machine, but many students are not like the old left with Xshell, There are still
identification string from UNKNOWNNov 4 13:25:26 Server sshd[12201]: Did not receive identification string from UNKNOWNNov 4 13:26:26 Server sshd[13312]: Did not receive identification string from UNKNOWNNov 4 13:27:26 Server sshd[13400]: Did not receive identification string from UNKNOWNNov 4 13:28:26 Server sshd[135
prohibits password login. For the management of multiple servers, I am a direct replacement of the file, so simple and maintain the persistence.// Local SCP -P [Port] sshd_config [email protected]:/your/home///serversudoCP ~/sshd_config/etc/ssh/sshd_config4. Iptables settingsudo 1 22000-J ACCEPTsudo service iptables Save5. Restart the sshd service, test loginsudo service sshd restartSSH [email protected]-p [Port]Note: Do not close the previously ope
What is SSO?
Single sign-on SSO (Sign-On) is a part of identity management. A more popular definition of SSO is that SSO is the same user who accesses protected resources in different applications of the same server and only needs to log in once, that is, after security val
Sort it out:
1 For pure web SSO, if there is an independent SSO Login server, all the verification will jump to the interface of this server, the login status will be retained on the SSO
landed.
Two, Sina SSO
Sina realizes the unified landing of cross-domain names, and is also based on cookies. If the user disables cookies, they will not be able to log in anyway. For example: Sina SSO server is login.sina.com.cn/sso/login.php
, Weibo landing address is weibo.com/login.php. The use of callback function
logged on.
Scenario 2: (the user has logged on) log on directly.
Ii. Sina SSO
Sina implements cross-domain unified login, which is based on cookies in essence. If you disable cookies, you cannot log on to them in any way. For example, the Sina SSO server is login.sina.com.cn/
encryption, you only need to match the guid and username of the server. However, the stress on WebService is much greater than that on cookie decryption. If the site is mostly visited and the access volume is high, such authentication requests will put a lot of pressure on SSO.
· Server Design
If SSO has other
Php uses CAS to implement SSO single-point login and logout .. CAS Server setup cas server: downloads.jasig.orgcasdecompress cas-server-4.0.0-release.zip rename the cas-server-webapp-4.0.0.war under the modules directory as cas. c
other is to verify whether the user has returned the cookie through WebService when the local cookie is saved. in the login status. The two methods have their own advantages and disadvantages. The first is that you do not need to know whether a local cookie exists. The second is to use WebService, but the added validation is rigorous. If we perform important data operations on B .com, we recommend that you use se
CAS-based SSO Single Sign-On-achieving automatic ajax cross-origin access login, ssoajax
Make up the course first. You can set up the CAS environment on the following website.
[JA-SIG CAS service environment construction] http://linliangyi2007.iteye.com/blog/165307
[JA-SIG CAS Business Architecture Introduction] http://linliangyi2007.iteye.com/blog/165310
[JA-SIG CAS technical framework] http://linliangyi20
most of the options are represented by Tokenstore (back-end storage or local encoding).(1) When validating tokens in the request, use Remotetokenservices to invoke the/auth/check_token in Authserver.(2) share the database, use JDBC to store and verify tokens, and avoid accessing authserver.(3) using the JWT signature method, the resource server checks itself directly, without any intermediary media.Five, OAuth clientAfter the client obtains the token
defaulttokenservices, and most of the options are represented by Tokenstore (back-end storage or local encoding).(1) When validating tokens in the request, use Remotetokenservices to invoke the/auth/check_token in Authserver.(2) share the database, use JDBC to store and verify tokens, and avoid accessing authserver.(3) using the JWT signature method, the resource server checks itself directly, without any intermediary media.Five, OAuth clientAfter th
, it is quite simple to use.DevelopmentNow start to explain how to add verification code verification code in the single point process!Project ImportIn the first environment, we were all working directly under Tomcat, and now we need to import CAS server into our eclipse before we can proceed.Find our downloaded Cas-server-4.0.0-release.zip decompression and go to the subdirectory to find the Cas-
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.