[1]刘姚. 基于Spring和OAuth2.0的第三方授权框架[J].计算机技术与发展,2017,27(03):167-170.
 LIU Yao. Investigation on Third Party Authorization System Based on Spring Security and OAuth2.0[J].,2017,27(03):167-170.
点击复制

 基于Spring和OAuth2.0的第三方授权框架()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年03期
页码:
167-170
栏目:
应用开发研究
出版日期:
2017-03-10

文章信息/Info

Title:
 Investigation on Third Party Authorization System Based on Spring Security and OAuth2.0
文章编号:
1673-629X(2017)03-0167-04
作者:
 刘姚
 南京邮电大学 通信与信息工程学院,
Author(s):
 LIU Yao
关键词:
 Web安全SpringSecurityOAuth2.0开放平台认证
Keywords:
 Web securitySpring SecurityOAuth2. 0open platform certification
分类号:
TP39
文献标志码:
A
摘要:
 OAuth2.0是一个开放标准的第三方授权协议,允许用户授权第三方平台获取在某一网站上存储的用户个人资源,而无需将用户名和密码提供给第三方平台.这个协议的主要作用就是定义了一个标准协议,允许一个Web或APP在用户授权下访问用户的隐私数据而无须了解用户的账号信息,这些数据可以存储在诸如微信、支付宝中.Spring Security For OAuth 2.0为OAuth2.0的软件实现提供了一个开源Java库,广泛用于基于Spring框架的Web站点上,与Spring Security框架无缝衔接,易于Web后端服务器的升级,简化了基于Web的OAuth2.0协议的开发.文中分析了OAuth2.0协议细则以及关键流程,重点阐述了Spring Security For OAuth 2.0的优点、应用以及服务器配置,并以此为基础快速构建OAuth2.0服务器软件平台.该协议库具有易于使用、易于维护与使用安全等特点,目前已经广泛应用在互联网以及金融等领域.
Abstract:
 OAuth2. 0 is a third party authorization protocol of open standard,and allows the user to authorize a third party to obtain a us-er’ s personal resources stored on a Web site without having to provide the user name and password to a third party platform. The main role of this agreement is to define a standard protocol that allows a Web or APP access the private data of the user in the case of author-ized,and the data can be stored in areas such as Alipay and WeChat. Spring Security For OAuth 2. 0 provides an open source Java library for OAuth2. 0 implementations widely used in Web sites based on the Spring framework and Spring Security framework for seamless,easy to upgrade for Web back-end,simplification of the development of Web-based OAuth 2. 0. The OAuth2. 0 protocol rules as well as the key process are analyzed,and the Spring Security For OAuth 2. 0 advantages,applications and server configuration are described,and as a foundation to quickly build the OAuth2. 0 server software platform. The protocol library has features of easy to use,easy to maintain and use security,now widely used in the Internet,as well as financial and other fields.

相似文献/References:

[1]王强,蔡皖东,姚烨.基于渗透测试的跨站脚本漏洞检测方法研究[J].计算机技术与发展,2013,(03):147.
 WANG Qiang,CAI Wan-dong,YAO Ye.Research on Cross-site Scripting Vulnerability Detection Method Based on Penetration Testing[J].,2013,(03):147.
[2]田睿智,茅兵,谢立.基于浏览器扩展的Drive-by Download防御方法[J].计算机技术与发展,2014,24(02):131.
 TIAN Rui-zhi,MAO Bing,XIE Li.Method of Preventing Drive-by Download Attack Based on Browser Extension[J].,2014,24(03):131.
[3]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(03):1.
[4]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(03):5.
[5]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(03):13.
[6]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(03):21.
[7]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(03):25.
[8]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(03):29.
[9]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(03):34.
[10]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(03):38.

更新日期/Last Update: 2017-05-18