jeesite整合单点登录
来源:互联网 发布:华为面试常见算法题 编辑:程序博客网 时间:2024/06/04 00:57
1.什么是单点登录
单点登录SSO(Single Sign On)实际上就是用户在一个系统登录之后,在单点登录的其他客户端(应用)不用重复的登陆,登陆校验交给中央认证服务器去校验。单点登录的应用场景通常为一个大型的系统下有很多小系统,并且这些系统使用的是同一套认证体系。
常用的单点登录框架为cas,cas分为cas-server,cas-client.
2.使用jeesite实现单点登录的配置
看过jeesite的应该知道,jeesite使用的是shiro整合spring的方式,并且自定义实现了多种SessionManager和多种cacheManager,。由于单点登录的特殊性,需要我们自定义realm,realm可以看做是一个安全数据源,用来收集用户的认证信息和授权信息。
2.1单点登录的配置文件
2.1.1 loginUrl配置的为单点登录认证服务器的地址和service回调地址
2.1.2 需要单独配置logoutFilter,用于到认证服务器进行单点退出。
2.1.3 配置casFilter用于接收认证服务器验证之后的信息。并进行认证授权的处理
2.1.4自定义relam,在SystemAuthorizingRealm基础上进行改造。
2.1.5单点登录的配置文件:
<?xml version="1.0" encoding="UTF-8"?><beans xmlns="http://www.springframework.org/schema/beans"xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:context="http://www.springframework.org/schema/context"xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-4.0.xsdhttp://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context-4.0.xsd"default-lazy-init="true"><description>Shiro Configuration</description><!-- 加载配置属性文件 --><context:property-placeholderignore-unresolvable="true" location="classpath:app.properties" /><!-- Shiro权限过滤过滤器定义 --><bean name="shiroFilterChainDefinitions" class="java.lang.String"><constructor-arg><value>/static/** = anon/userfiles/** = anon${adminPath}/cas = cas<!-- ${adminPath}/login = authc -->${adminPath}/logout = logout${adminPath}/** = user/act/rest/service/editor/** = perms[act:model:edit]/act/rest/service/model/** = perms[act:model:edit]/act/rest/service/** = user/ReportServer/** = user</value></constructor-arg></bean><!-- 安全认证过滤器 --><bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean"><property name="securityManager" ref="securityManager" /><property name="loginUrl" value="${cas.server.url}/login?service=${cas.project.url}${adminPath}/cas" /><!-- <property name="loginUrl" value="${adminPath}/login" /> --><property name="successUrl" value="${adminPath}/index?login" /><property name="filters"><map><entry key="cas" value-ref="casFilter" /><entry key="logout"><bean class="org.apache.shiro.web.filter.authc.LogoutFilter"><property name="redirectUrl" value="${cas.server.url}/logout?service=${cas.project.url}${frontPath}"></property></bean></entry><!-- <entry key="authc" value-ref="formAuthenticationFilter" /> --></map></property><property name="filterChainDefinitions"><ref bean="shiroFilterChainDefinitions" /></property></bean><!-- CAS认证过滤器 --><bean id="casFilter" class="org.apache.shiro.cas.CasFilter"><property name="failureUrl" value="${frontPath}/login" /></bean><!-- 定义Shiro安全管理配置 --><bean id="securityManager" class="org.apache.shiro.web.mgt.DefaultWebSecurityManager"><property name="realm" ref="casAuthorizingRealm" /><property name="sessionManager" ref="sessionManager" /><property name="cacheManager" ref="shiroCacheManager" /></bean><bean id="casAuthorizingRealm" class="com.aligns.administrator.sys.security.CasAuthorizingRealm"> <property name="casServerUrlPrefix" value="${cas.server.url}" /> <property name="casService" value="${cas.project.url}${adminPath}/cas" /></bean><!-- 自定义会话管理配置 --><bean id="sessionManager"class="com.aligns.plat.core.security.shiro.session.SessionManager"><property name="sessionDAO" ref="sessionDAO" /><!-- 会话超时时间,单位:毫秒 --><property name="globalSessionTimeout" value="${session.sessionTimeout}" /><!-- 定时清理失效会话, 清理用户直接关闭浏览器造成的孤立会话 --><property name="sessionValidationInterval" value="${session.sessionTimeoutClean}" /><!-- <property name="sessionValidationSchedulerEnabled" value="false"/> --><property name="sessionValidationSchedulerEnabled" value="true" /><property name="sessionIdCookie" ref="sessionIdCookie" /><property name="sessionIdCookieEnabled" value="true" /></bean><!-- 指定本系统SESSIONID, 默认为: JSESSIONID 问题: 与SERVLET容器名冲突, 如JETTY, TOMCAT 等默认JSESSIONID, 当跳出SHIRO SERVLET时如ERROR-PAGE容器会为JSESSIONID重新分配值导致登录会话丢失! --><bean id="sessionIdCookie" class="org.apache.shiro.web.servlet.SimpleCookie"><constructor-arg name="name" value="jeesite.session.id" /></bean><!-- 自定义Session存储容器 --><!-- <bean id="sessionDAO" class="com.thinkgem.jeesite.common.security.shiro.session.JedisSessionDAO"><property name="sessionIdGenerator" ref="idGen" /><property name="sessionKeyPrefix" value="${redis.keyPrefix}_session_" /></bean> --><bean id="sessionDAO"class="com.aligns.plat.core.security.shiro.session.CacheSessionDAO"><property name="sessionIdGenerator" ref="idGen" /><property name="activeSessionsCacheName" value="activeSessionsCache" /><property name="cacheManager" ref="jedisCacheManager" /></bean> <!-- <bean id="jedisUtils" class="com.aligns.plat.utils.JedisUtils"></bean> --> <!-- 如果需要集群配置,则将SessionDao设置为jedis --> <!-- <bean id="sessionDAO"class="com.aligns.plat.core.security.shiro.session.JedisSessionDAO" ><property name="sessionIdGenerator" ref="idGen" /><property name="activeSessionsCacheName" value="activeSessionsCache" /><property name="cacheManager" ref="jedisCacheManager" /></bean> --><!-- 定义授权缓存管理器 --><!-- <bean id="shiroCacheManager" class="com.aligns.plat.core.common.security.shiro.cache.SessionCacheManager" /> --><bean id="shiroCacheManager" class="org.apache.shiro.cache.ehcache.EhCacheManager"><property name="cacheManager" ref="cacheManager" /></bean><bean id="jedisCacheManager" class="com.aligns.plat.core.security.shiro.cache.JedisCacheManager"></bean><!-- 保证实现了Shiro内部lifecycle函数的bean执行 --><bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor" /><!-- AOP式方法级权限检查 --><beanclass="org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator"depends-on="lifecycleBeanPostProcessor"><property name="proxyTargetClass" value="true" /></bean><beanclass="org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor"><property name="securityManager" ref="securityManager" /></bean></beans>
2.1.6单点登录的自定义relam(CasAuthorizingRealm)
/** * */package com.aligns.administrator.sys.security;import java.util.ArrayList;import java.util.Iterator;import java.util.List;import java.util.Map;import org.apache.shiro.authc.AuthenticationException;import org.apache.shiro.authc.AuthenticationInfo;import org.apache.shiro.authc.AuthenticationToken;import org.apache.shiro.authc.SimpleAuthenticationInfo;import org.apache.shiro.authz.AuthorizationInfo;import org.apache.shiro.authz.SimpleAuthorizationInfo;import org.apache.shiro.cas.CasAuthenticationException;import org.apache.shiro.cas.CasRealm;import org.apache.shiro.cas.CasToken;import org.apache.shiro.subject.PrincipalCollection;import org.apache.shiro.subject.SimplePrincipalCollection;import org.apache.shiro.util.CollectionUtils;import org.apache.shiro.util.StringUtils;import org.jasig.cas.client.authentication.AttributePrincipal;import org.jasig.cas.client.validation.Assertion;import org.jasig.cas.client.validation.TicketValidationException;import org.jasig.cas.client.validation.TicketValidator;import com.aligns.administrator.sys.entity.Menu;import com.aligns.administrator.sys.entity.Role;import com.aligns.administrator.sys.entity.User;import com.aligns.administrator.sys.security.SystemAuthorizingRealm.Principal;import com.aligns.administrator.sys.service.SystemService;import com.aligns.administrator.sys.utils.LogUtils;import com.aligns.administrator.sys.utils.UserUtils;import com.aligns.plat.core.Servlets;import com.aligns.plat.utils.SpringContextHolder;/** * 系统安全认证单点登录实现类 * * @author kefan * @version 2014-7-5 *///@Service// @DependsOn({"userDao","roleDao","menuDao"})public class CasAuthorizingRealm extends CasRealm {private SystemService systemService; public CasAuthorizingRealm() { super(); } /** * 认证 * */ protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException { CasToken casToken = (CasToken) token; if (token == null) return null; String ticket = (String) casToken.getCredentials(); if (!StringUtils.hasText(ticket)) return null; TicketValidator ticketValidator = ensureTicketValidator(); try { Assertion casAssertion = ticketValidator.validate(ticket, getCasService()); //casPrincipal 认证后的用户信息 AttributePrincipal casPrincipal = casAssertion.getPrincipal(); String userId = casPrincipal.getName(); //获取用户 User user = getSystemService().getUserByLoginName(userId); Map<String,Object> attributes = casPrincipal.getAttributes(); casToken.setUserId(userId); String rememberMeAttributeName = getRememberMeAttributeName(); String rememberMeStringValue = (String) attributes.get(rememberMeAttributeName); boolean isRemembered = rememberMeStringValue != null && Boolean.parseBoolean(rememberMeStringValue); if (isRemembered) casToken.setRememberMe(true); // 这里可以拿到Cas的登录账号信息,加载到对应权限体系信息放到缓存中... return new SimpleAuthenticationInfo(new Principal(user, false), ticket,getName()); } catch (TicketValidationException e) { throw new CasAuthenticationException((new StringBuilder()).append("Unable to validate ticket [") .append(ticket).append("]").toString(), e); } } /** * 授权 * */ protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) { Principal principal = (Principal) getAvailablePrincipal(principals); User user = getSystemService().getUserByLoginName(principal.getLoginName());if (user != null) {SimpleAuthorizationInfo info = new SimpleAuthorizationInfo();List<Menu> list = UserUtils.getMenuList();for (Menu menu : list){if (org.apache.commons.lang3.StringUtils.isNotBlank(menu.getPermission())){// 添加基于Permission的权限信息for (String permission : org.apache.commons.lang3.StringUtils.split(menu.getPermission(),",")){info.addStringPermission(permission);}}}// 添加用户权限info.addStringPermission("user");// 添加用户角色信息for (Role role : user.getRoleList()){info.addRole(role.getEnname());}// 更新登录IP和时间getSystemService().updateUserLoginInfo(user);// 记录登录日志LogUtils.saveLog(Servlets.getRequest(), "系统登录");return info;} else {return null;} } protected List<String> split(String s) { List<String> list = new ArrayList<String>(); String elements[] = StringUtils.split(s, ','); if (elements != null && elements.length > 0) { String arr$[] = elements; int len$ = arr$.length; for (int i$ = 0; i$ < len$; i$++) { String element = arr$[i$]; if (StringUtils.hasText(element)) list.add(element.trim()); } } return list; } protected void addRoles(SimpleAuthorizationInfo simpleAuthorizationInfo, List<String> roles) { String role; for (Iterator<String> i$ = roles.iterator(); i$.hasNext(); simpleAuthorizationInfo.addRole(role)) role = (String) i$.next(); } protected void addPermissions(SimpleAuthorizationInfo simpleAuthorizationInfo, List<String> permissions) { String permission; for (Iterator<String> i$ = permissions.iterator(); i$.hasNext(); simpleAuthorizationInfo .addStringPermission(permission)) permission = (String) i$.next(); } public SystemService getSystemService() {if (systemService == null){systemService = SpringContextHolder.getBean(SystemService.class);}return systemService;}}
3.需要注意的事项:
配置文件中配置的logout,为logoutFilter,redirectUrl为认证服务器注销之后的重定向地址,单点登录需要配置用于注销重定向,否则注销之后,页面会停留在单点登录服务器,不会调到我们自己的应用。修改认证服务器的cas-servlet,路径为WEB-INF/cas-servet.xml,把false改为true
0 0
- jeesite整合单点登录
- cas 单点登录修改认证方式 jeesite
- cas 单点登录修改认证方式 jeesite
- cas 单点登录修改认证方式 jeesite
- Jeesite单点登录集成Cas另加自定义登录验证
- Jeesite单点登录集成Cas另加自定义登录验证
- SpringBoot整合cas单点登录
- mvnForum同CAS整合实现单点登录
- 多站点整合-单点登录简单方案
- 整合UCenter+MediaWiki+Discuz实现单点登录
- 系统整合之单点登录(一)
- CAS3.5 单点登录 整合数据库认证
- SpringSecurity3整合CAS实现单点登录
- cas单点登录整合spring security
- SpringSecurity3整合CAS实现单点登录
- SpringSecurity3整合CAS实现单点登录
- Yii整合ucenter实现单点登录
- Session的监听以及单点登录整合
- Golang RPC调用例子程序(实现超时机制)
- android光照、加速度传感器
- windows下安装 Nodejs 并在 WebStorm 9.0.1 下搭建编译 LESS 环境
- Java中集合类详解,面试关得过
- androidstudio ALT+Enter 可以使用但有些包到不了的原因
- jeesite整合单点登录
- hbase伪分布式环境搭建
- Codeforces Round #142 (Div. 1) C. Triangles
- mybatis框架 流程分析
- Sosoapi本地项目搭建
- ListView用getItemViewType()区分不同item布局的时候出现ArrayIndexOutOfBoundsException
- 代码易错的例子
- 所有情况下全排列的实现
- Android Dialog与软键盘的正确打开方式