sso

SSO from ADAL in WPF Client to ADFS 3.0 on Windows Server 2012 R2

匿名 (未验证) 提交于 2019-12-03 07:50:05
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I am trying to write an WPF client which uses ADAL to authenticate against ADFS on a Windows Server 2012 R2. I have successfully implemented this using "Forms Authentication" where the user is prompted for the domain username and password. However, I want to take advantage of SSO and use the currently logged on domain user to authenticate against the ADFS. Unfortunately, I'm only getting an error message saying: This method overload is not supported by '< ADFS servername>' I have done a lot of searching, but find some of the information

ADFS 2.0, SSO and SAML 2.0

匿名 (未验证) 提交于 2019-12-03 02:53:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: This is a classic example of too much information = too much confusion. I have a ASP.NET web application that uses the usual POST form authentication and would like to implement SSO. Since we're a Microsoft shop we will use the ADFS 2.0. In order to implement SSO I understand that I will need to have also WIF to process SAML requests? Do I install the WIF under the same server as the ADFS? I still want to re-direct failed SSO requests or non SSO requests to use the form, how do I handle this? Can someone please describe the flow? Thanks! 回答1

SSO单点登录实例

隐身守侯 提交于 2019-12-03 01:48:00
单点登录流程图 系统登陆拦截器 // // Source code recreated from a .class file by IntelliJ IDEA // (powered by Fernflower decompiler) // package com.jdcloud.policycloudapi.sso; import com.alibaba.fastjson.JSON; import com.jdcloud.policycloudapi.domain.response.RetResponse; import com.jdcloud.policycloudapi.domain.vo.LoginUser; import org.apache.commons.lang.StringUtils; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.springframework.web.servlet.HandlerInterceptor; import org.springframework.web.servlet.ModelAndView; import javax.servlet.http.Cookie; import javax.servlet.http

Using SSO alfresco automatically logged in LIferay Portal

匿名 (未验证) 提交于 2019-12-03 01:41:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: how to use SSO in liferay portal if alfresco it is been integrated ? Meanwhile i have to login in liferay portal and again login in alfresco portlet and alfresco it is been integrated in liferay portal ?? Image of Alfresco_Liferay 回答1: Alfresco in the Cloud has SAML integration that can use an SSO identity provider. There is an enterprise SAML module for on-premise coming soon, or you can pay for consulting to get it earlier. Otherwise, perhaps you can do something with Alfresco External Authentication, and hook into an SSO solution that way

I/O Error: SSO Failed: Native SSPI library not loaded

匿名 (未验证) 提交于 2019-12-03 01:00:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I am trying to run the following bit of code: import java.sql.DriverManager; public class Connect { public static void main(String[] args){ try{ String databaseDriver = "net.sourceforge.jtds.jdbc.Driver"; Class.forName(databaseDriver); } catch (Exception e) { e.printStackTrace(); } try{ String url = "jdbc:jtds:sqlserver://BHX:1433/Forecast;instance=SQLEPXRESS"; java.sql.Connection con = DriverManager.getConnection(url); System.out.println("Connection"); } catch (Exception e){ e.printStackTrace(); } } } My SQL server is running on port 1433

SSO with signing and signature validation doesn't work

匿名 (未验证) 提交于 2019-12-03 00:59:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: I have succesfully configured SSO using WSO2IS 4.6.0 and spring saml grails plugin, but when I enable signing and signature validation like this: I see errors on WSO2 console WARN { org . wso2 . carbon . identity . sso . saml . util . SAMLSSOUtil } - Signature Validation Failed for the SAML Assertion : Signature is invalid . DEBUG org . wso2 . carbon . identity . sso . saml . util . SAMLSSOUtil } - org . opensaml . xml . validation . ValidationException : Unable to evaluate key against signature WARN { org . wso2 . carbon .

SpringBoot+MyBatis+Redis实现SSO单点登录系统(二)

匿名 (未验证) 提交于 2019-12-03 00:44:02
配置文件配置数据库,redis等相关的信息。 # See http://docs.spring.io/spring-boot/docs/current/reference/html/common-application-properties.html # Thymeleaf配置 spring .thymeleaf .cache =false spring .thymeleaf .mode =HTML spring .main .show -banner=false spring .thymeleaf .prefix =classpath:/templates spring .thymeleaf .suffix = .html logging .level .jdbc =OFF logging .level .jdbc .sqltiming =DEBUG logging .level .jdbc .resultsettable =DEBUG # 数据库配置 spring .datasource .driver -class-name= com .mysql .jdbc .Driver spring .datasource .url =jdbc:mysql:// 127.0 .0 .1 : 3306 /taotao?useSSL=false spring .datasource

浅谈架构之路:单点登录 SSO

匿名 (未验证) 提交于 2019-12-03 00:40:02
前言:SSO 单点登录   “半吊子”的全栈工程师又来了,技术类的文章才发表了两篇,本来想先将主攻的几个系列都开个头(Nodejs、Java、前端、架构、全栈等等),无奈博客起步太晚,写博文的时间又没有很多,只好不按顺序乱发一通,请大家见谅。   本篇文章介绍一下单点登录,不像上一篇博文介绍的前后端分离,SSO 并不能算是一种架构吧,只能说是一个解决方案。由于笔者参与过医院集成平台项目,负责其中单点登录的设计研发工作,将经验总结分享一下,也不一定是最优方案,正确与否那就“仁者见仁智者见智”了。   单点登录(Single Sign On),简称为 SSO,是目前比较流行的企业业务整合的解决方案之一。SSO的定义是在多个应用系统中,用户只需要登录一次就可以访问所有相互信任的应用系统,即用户只需要记住一组用户名和密码就可以登录所有有权限的系统。   文章导读:开篇先介绍一下笔者从事医疗行业出现单点登录的项目需求,毕竟是需求驱动研发;再将整理的通用版的单点登录知识进行分享;接着介绍一下笔者当前采用集成平台单点登录方案,最后是一些相关扩展。 单点登录背景介绍    【医疗行业的需求】      随着医院信息化建设的深入,信息化系统越来越多,五花八门多种多样,初步统计目前医院信息化子系统数量已经多达几十个。这些系统的安装维护不仅让信息中心花费大量心血,也让多角色的用户在使用系统时头疼不已

基于 Cookie 的 SSO 中间件 kisso

匿名 (未验证) 提交于 2019-12-03 00:40:02
kisso sso ki ss o !! kisso 帮助文档下载 1、支持单点登录 2、支持登录Cookie缓存 3、支持防止 xss攻击, SQL注入,脚本注入 4、支持 Base64 / MD5 / AES / PBE / RSA 算法 5、支持浏览器客户端校验 6、支持Cookie参数配置及扩展 7、支持跨域登录,模拟登录 8、支持在线人数统计 9、支持生成动态图片验证码 10、支持 app 移动端 api 服务验证,采用微信公众平台 api 验证机制认证 11、自带权限验证逻辑,支持基础 Shiro , SpringSecurity 权限系统 kisso 依赖 jars kisso_ApiServer 移动 APP 端 API 演示 demo kisso_JFinal 演示 demo kisso_SpringMvc 演示 demo kisso_crossdomain 跨域演示 demo 实例演示 SSM 架构后台管理系统 Maven 坐标: http://search.maven.org/#search%7Cgav%7C1%7Cg%3A%22com.baomidou%22%20AND%20a%3A%22kisso%22 ?

SSO单点登录之OAuth2.0登录认证(1)

匿名 (未验证) 提交于 2019-12-03 00:37:01
之前写了很多关于spring cloud的文章,今天我们对OAuth2.0的整合方式做一下笔记,首先我从网上找了一些关于OAuth2.0的一些基础知识点,帮助大家回顾一下知识点: 一、oauth中的角色 client:调用资源服务器API的应用 Oauth 2.0 Provider:包括Authorization Server和Resource Server (1)Authorization Server:认证服务器,进行认证和授权 (2)Resource Server:资源服务器,保护受保护的资源 user:资源的拥有者 二、下面详细介绍一下Oauth 2.0 Provider Authorization Server: (1)AuthorizationEndpoint:进行授权的服务,Default URL: /oauth/authorize (2)TokenEndpoint:获取token的服务,Default URL: /oauth/token Resource Server: OAuth2AuthenticationProcessingFilter:给带有访问令牌的请求加载认证 三、下面再来详细介绍一下Authorization Server: 2、@Beans:需要实现AuthorizationServerConfigurer