1. <strong id="7actg"></strong>
    2. <table id="7actg"></table>

    3. <address id="7actg"></address>
      <address id="7actg"></address>
      1. <object id="7actg"><tt id="7actg"></tt></object>

        CAS實(shí)現(xiàn)SSO單點(diǎn)登錄案例(整合SpringSecurity)

        共 18266字,需瀏覽 37分鐘

         ·

        2021-03-15 09:25

        點(diǎn)擊上方藍(lán)色字體,選擇“標(biāo)星公眾號(hào)”

        優(yōu)質(zhì)文章,第一時(shí)間送達(dá)

        76套java從入門到精通實(shí)戰(zhàn)課程分享

        CAS介紹

        CAS是一個(gè)單點(diǎn)登錄框架,由耶魯大學(xué)的一個(gè)組織開發(fā)。CAS是一個(gè)開源項(xiàng)目,代碼目前是在github上管理。單點(diǎn)登錄:Single Sign On,簡(jiǎn)稱SSO,SSO使得在多個(gè)應(yīng)用系統(tǒng)中,用戶只需要登錄一次就可以訪問所有相互信任的應(yīng)用系統(tǒng)。通俗理解為一個(gè)應(yīng)用登錄了,其他被授權(quán)的應(yīng)用不用再登錄。之前也寫過一篇sso單點(diǎn)登錄,用redis實(shí)現(xiàn)的,有興趣可以翻翻

        cas下載地址:https://github.com/apereo/cas/releases


        cas服務(wù)搭建

        我們案例下載使用的是CAS4.2,采用HTTPS協(xié)議處理用戶請(qǐng)求。搭建HTTPS需要咱們生成對(duì)應(yīng)的證書信息。當(dāng)然也可以通過配置使其支持http協(xié)議,但畢竟http協(xié)議不安全,所以我們還是學(xué)一下如何搭建本地HTTPS服務(wù).


        1.生成秘鑰庫(kù)

        keytool -genkey -alias shemuel -keyalg RSA -keystore E:/javaee/cas/keystory/shemeul
        其中-alias后面的是密鑰庫(kù)別名,最后的shemeul是要生成的密鑰庫(kù)文件.

        命令運(yùn)行后密鑰庫(kù)就生成了,接著就是導(dǎo)出這個(gè)密鑰的證書,運(yùn)行如下命令:

        keytool -export -trustcacerts -alias shemuel -file E:/javaee/cas/keystory/shemuel.cer -keystore E:/javaee/cas/keystory/shemuel
        前面的路徑是要導(dǎo)出證書的位置,后面的路徑是之前密鑰庫(kù)的路徑

        將證書導(dǎo)入到JDK證書庫(kù)

        剛才的操作會(huì)根據(jù)我們的秘鑰庫(kù)生成一個(gè)證書,緊接著我們需要將該證書導(dǎo)入到JDK的證書庫(kù)里才能使用。

        keytool -import -trustcacerts -alias shemuel -file E:/javaee/cas/keystory/shemuel.cer -keystore "F:/Java/jdk1.8.0_131/jre/lib/security/cacerts"

        要求輸入密鑰庫(kù)口令:注意這個(gè)密鑰庫(kù)是jdk的密鑰庫(kù),口令密碼為:changeit


        2.tomcat發(fā)布cas服務(wù)端項(xiàng)目

        在githib上下載cas服務(wù)端項(xiàng)目 https://github.com/apereo/cas/releases


        • 解壓一個(gè)tomcat,放到D:\workspace\cas\目錄下,把剛才我們下載的cas解壓打開target目錄下有個(gè)cas.war 拷貝到tomcat的webapps目錄并解壓,刪除war包。


        • 下載的cas解壓目錄下還有一個(gè)文件target\war\work\org.jasig.cas\cas-server-webapp\WEB-INF\cas.properties,把他拷貝到webapps\cas\WEB-INF目錄下。


        • 修改spring-configuration\propertyFileConfigurer.xml,把location="file:/etc/cas/cas.properties"換成剛才cas.properties的絕對(duì)路徑。

            <util:properties id="casProperties" location="file:D:/workspace/cas/apache-tomcat-8.5.16/webapps/cas/WEB-INF/cas.properties" />

        修改tomcat的conf/server.xml,加入如下代碼

        <Connector port="443" protocol="org.apache.coyote.http11.Http11NioProtocol"
                maxThreads="150" SSLEnabled="true" scheme="https" secure="true"
                clientAuth="false" sslProtocol="TLS"
                keystoreFile="E:\javaee\cas\keystory\shemuel" 
                keystorePass="123456" />

        啟動(dòng)tomcat, bin目錄下的 startup.bat


        訪問 https://shemuel:8443/cas/login

        我這里的本地hosts配置了 127.0.0.1 對(duì)應(yīng) shemuel了,有興趣也可以配置一下.

        訪問后可能出現(xiàn)瀏覽器安全提示,因?yàn)槲覀兊淖C書是本地的,沒交錢所以會(huì)出現(xiàn)警告,添加個(gè)例外繼續(xù)訪問,看到如下界面就說明成功了

        登錄名:casuser 密碼:Mellon

        這是cas自帶的一個(gè)登錄用戶,我們可以配置數(shù)據(jù)庫(kù)信息,使用我們自己的數(shù)據(jù)庫(kù)表用戶登錄


        3.配置cas數(shù)據(jù)庫(kù)連接池

        • 打開webapps\cas\WEB-INF\deployerConfigContext.xml

        • 把32行的<alias name="acceptUsersAuthenticationHandler" alias="primaryAuthenticationHandler" /> 注釋掉。

        • 將如下代碼拷貝到deployerConfigContext.xml中

        <!--配置加密算法-->
          <bean id="MD5PasswordEncoder" class="org.jasig.cas.authentication.handler.DefaultPasswordEncoder" autowire="byName">
           <constructor-arg  value="MD5"/>
          </bean>
          
          <!--查詢數(shù)據(jù)所采用什么加密方式-->
          <bean id="queryDatabaseAuthenticationHandler" name="primaryAuthenticationHandler" class="org.jasig.cas.adaptors.jdbc.QueryDatabaseAuthenticationHandler">
           <property name="passwordEncoder" ref="MD5PasswordEncoder"/>
          </bean>
          
          <!--名字叫dataSource的Bean取別名叫queryDatabaseDataSource-->
          <alias name="dataSource" alias="queryDatabaseDataSource"/>
          
          <!--配置數(shù)據(jù)源-->
          <bean id="dataSource"
            class="com.mchange.v2.c3p0.ComboPooledDataSource"
            p:driverClass="com.mysql.jdbc.Driver"
            p:jdbcUrl="jdbc:mysql://127.0.0.1:3306/springsecurity?useUnicode=true&amp;characterEncoding=UTF-8&amp;zeroDateTimeBehavior=convertToNull"
            p:user="root"
            p:password="123456"
            p:initialPoolSize="6"
            p:minPoolSize="6"
            p:maxPoolSize="18"
            p:maxIdleTimeExcessConnections="120"
            p:checkoutTimeout="10000"
            p:acquireIncrement="6"
            p:acquireRetryAttempts="5"
            p:acquireRetryDelay="2000"
            p:idleConnectionTestPeriod="30"
            p:preferredTestQuery="select 1"/>
          <!--end  從數(shù)據(jù)庫(kù)中的用戶表中讀取 -->


        • 把如下jar包拷貝到lib下

        • 配置查詢語句

        修改cas.properties 220行,去掉注釋,修改如下:

        修改cas.properties 220行,去掉注釋,修改如下:

            cas.jdbc.authn.query.sql=select password from users where username=?

        由于此時(shí)我們指定的加密算法為md5了,所以我們需要重新增加一條md5加密的數(shù)據(jù)到數(shù)據(jù)庫(kù)去。

        INSERT INTO users(username,password,enabled)VALUES('itheima',(SELECT MD5('123456')),'true');


        重啟tomcat,用itheima登錄成功。


        CSA實(shí)現(xiàn)單點(diǎn)登錄功能

        新建一個(gè)maven工程,配置一下CAS相關(guān)過濾器,然后訪問首頁。

        pom依賴

            <dependency>
              <groupId>org.jasig.cas.client</groupId>
              <artifactId>cas-client-core</artifactId>
              <version>3.3.3</version>
            </dependency>
            <dependency>
           <groupId>javax.servlet</groupId>
           <artifactId>servlet-api</artifactId>
           <version>2.5</version>
           <scope>provided</scope>
         </dependency>
         <build>
          <plugins>
           <!-- 配置Tomcat插件 -->
           <plugin>
            <groupId>org.apache.tomcat.maven</groupId>
            <artifactId>tomcat7-maven-plugin</artifactId>
            <configuration>
             <port>70</port>
             <!-- http://127.0.0.1:{port}/{path} -->
             <path>/</path>
            </configuration>
           </plugin>

           <plugin>
            <groupId>org.apache.maven.plugins</groupId>
            <artifactId>maven-compiler-plugin</artifactId>
            <version>3.1</version>
            <configuration>
             <source>1.8</source>
             <target>1.8</target>
            </configuration>
           </plugin>
          </plugins>
         </build>

        web.xml

        <!-- 用于單點(diǎn)退出,該過濾器用于實(shí)現(xiàn)單點(diǎn)登出功能,可選配置 -->
          <listener>
            <listener-class>org.jasig.cas.client.session.SingleSignOutHttpSessionListener</listener-class>
          </listener>
          <!-- 該過濾器用于實(shí)現(xiàn)單點(diǎn)登出功能,可選配置。 -->
          <filter>
            <filter-name>CAS Single Sign Out Filter</filter-name>
            <filter-class>org.jasig.cas.client.session.SingleSignOutFilter</filter-class>
          </filter>
          <filter-mapping>
            <filter-name>CAS Single Sign Out Filter</filter-name>
            <url-pattern>/*</url-pattern>
          </filter-mapping>

          <!-- 該過濾器負(fù)責(zé)用戶的認(rèn)證工作,必須啟用它 -->
          <filter>
            <filter-name>CASFilter</filter-name>
            <filter-class>org.jasig.cas.client.authentication.AuthenticationFilter</filter-class>
            <init-param>
              <param-name>casServerLoginUrl</param-name>
               <!--這是cas 服務(wù)端登陸認(rèn)證地址 -->
              <param-value>https://shemuel:8443/cas/login</param-value>
             
            </init-param>
            <init-param>
              <param-name>serverName</param-name>
              <param-value>http://shemuel:70</param-value>
            </init-param>
          </filter>
          <filter-mapping>
            <filter-name>CASFilter</filter-name>
            <url-pattern>/*</url-pattern>
          </filter-mapping>
          
          
          <!--登陸成功后cas server會(huì)重定向到之前要訪問的頁面並攜帶一個(gè)ticket,該ticket需要重新進(jìn)行校驗(yàn)認(rèn)證。 以下過濾器負(fù)責(zé)對(duì)Ticket的校驗(yàn)工作,必須啟用它 -->
          <filter>
            <filter-name>CAS Validation Filter</filter-name>
            <filter-class>org.jasig.cas.client.validation.Cas20ProxyReceivingTicketValidationFilter</filter-class>
            <init-param>
              <param-name>casServerUrlPrefix</param-name>
              <param-value>https://shemuel:8443/cas</param-value>
            </init-param>
            <init-param>
              <param-name>serverName</param-name>
              <param-value>http://shemuel:70</param-value>
            </init-param>
          </filter>
          <filter-mapping>
            <filter-name>CAS Validation Filter</filter-name>
            <url-pattern>/*</url-pattern>
          </filter-mapping>
          <!-- 該過濾器負(fù)責(zé)實(shí)現(xiàn)HttpServletRequest請(qǐng)求的包裹, 比如允許開發(fā)者通過HttpServletRequest的getRemoteUser()方法獲得SSO登錄用戶的登錄名,可選配置。 -->
          <filter>
            <filter-name>CAS HttpServletRequest Wrapper Filter</filter-name>
            <filter-class>
              org.jasig.cas.client.util.HttpServletRequestWrapperFilter
            </filter-class>
          </filter>
          <filter-mapping>
            <filter-name>CAS HttpServletRequest Wrapper Filter</filter-name>
            <url-pattern>/*</url-pattern>
          </filter-mapping>

          <!-- 該過濾器使得開發(fā)者可以通過org.jasig.cas.client.util.AssertionHolder來獲取用戶的登錄名。 比如AssertionHolder.getAssertion().getPrincipal().getName()。 -->
          <filter>
            <filter-name>CAS Assertion Thread Local Filter</filter-name>
            <filter-class>org.jasig.cas.client.util.AssertionThreadLocalFilter</filter-class>
          </filter>
          <filter-mapping>
            <filter-name>CAS Assertion Thread Local Filter</filter-name>
            <url-pattern>/*</url-pattern>
          </filter-mapping>


        tomcat運(yùn)行,端口70,出現(xiàn)如下報(bào)錯(cuò)

        上面錯(cuò)誤的原因是因?yàn)镃AS默認(rèn)值接受HTTPS有IMAPS協(xié)議請(qǐng)求的認(rèn)證,我們需要把HTTP也給加上去。


        打開下載的cas項(xiàng)目: cas\WEB-INF\classes\services\HTTPSandIMAPS-10000001.json,修改第3行

        "serviceId" : "^(https|imaps)://.*",


        改成

        "serviceId" : "^(https|imaps|http)://.*",


        保存,并重新啟動(dòng)即可。


        拷貝casclient-demo1 模擬兩個(gè)客戶端

        拷貝casclien-demo1 改名casclient-demo2 部署,tomcat端口18083,進(jìn)行單點(diǎn)測(cè)試。一個(gè)站點(diǎn)登錄后另外一個(gè)站點(diǎn)就不需要登錄了。

        如果運(yùn)營(yíng)一旦出現(xiàn)如下錯(cuò)誤,請(qǐng)調(diào)整tomcat的JDK,和生成秘鑰的JDK保持一致,不要用SDK即可。

        java.lang.RuntimeException: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
         org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:407)
         org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:45)
         org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:200)
         org.jasig.cas.client.validation.AbstractTicketValidationFilter.doFilter(AbstractTicketValidationFilter.java:206)
         org.jasig.cas.client.authentication.AuthenticationFilter.doFilter(AuthenticationFilter.java:161)
         org.jasig.cas.client.session.SingleSignOutFilter.doFilter(SingleSignOutFilter.java:100)

         Root Cause
         
         javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
          sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
          sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1949)
          sun.security.ssl.Handshaker.fatalSE(Handshaker.java:302)
          sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296)
          sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1509)
          sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216)
          sun.security.ssl.Handshaker.processLoop(Handshaker.java:979)
          sun.security.ssl.Handshaker.process_record(Handshaker.java:914)
          sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1062)
          sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375)
          sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403)
          sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387)
          sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559)
          sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)
          sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1513)
          sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1441)
          sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:254)
          org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:393)
          org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:45)
          org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:200)
          org.jasig.cas.client.validation.AbstractTicketValidationFilter.doFilter(AbstractTicketValidationFilter.java:206)
          org.jasig.cas.client.authentication.AuthenticationFilter.doFilter(AuthenticationFilter.java:161)
          org.jasig.cas.client.session.SingleSignOutFilter.doFilter(SingleSignOutFilter.java:100)
         
         Root Cause
         
         sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
          sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:387)
          sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292)
          sun.security.validator.Validator.validate(Validator.java:260)
          sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324)
          sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:229)
          sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:124)
          sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1491)
          sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216)
          sun.security.ssl.Handshaker.processLoop(Handshaker.java:979)
          sun.security.ssl.Handshaker.process_record(Handshaker.java:914)
          sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1062)
          sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375)
          sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403)
          sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387)
          sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559)
          sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)
          sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1513)
          sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1441)
          sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:254)
          org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:393)
          org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:45)
          org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:200)
          org.jasig.cas.client.validation.AbstractTicketValidationFilter.doFilter(AbstractTicketValidationFilter.java:206)
          org.jasig.cas.client.authentication.AuthenticationFilter.doFilter(AuthenticationFilter.java:161)
          org.jasig.cas.client.session.SingleSignOutFilter.doFilter(SingleSignOutFilter.java:100)


        cas服務(wù)端和兩個(gè)客戶端都啟動(dòng)后,我們?cè)L問其中一個(gè)客戶端登錄后,另一個(gè)客戶端就不需要登錄了說明成功!

        至此簡(jiǎn)易的單點(diǎn)登錄系統(tǒng)就完成了,后面會(huì)介紹springsecurity 如何整合cas

        ————————————————

        版權(quán)聲明:本文為CSDN博主「Shemuel_Deng」的原創(chuàng)文章,遵循CC 4.0 BY-SA版權(quán)協(xié)議,轉(zhuǎn)載請(qǐng)附上原文出處鏈接及本聲明。

        原文鏈接:

        https://blog.csdn.net/qq_35249342/article/details/86488393





        粉絲福利:Java從入門到入土學(xué)習(xí)路線圖

        ??????

        ??長(zhǎng)按上方微信二維碼 2 秒


        感謝點(diǎn)贊支持下哈 

        瀏覽 59
        點(diǎn)贊
        評(píng)論
        收藏
        分享

        手機(jī)掃一掃分享

        分享
        舉報(bào)
        評(píng)論
        圖片
        表情
        推薦
        點(diǎn)贊
        評(píng)論
        收藏
        分享

        手機(jī)掃一掃分享

        分享
        舉報(bào)
        1. <strong id="7actg"></strong>
        2. <table id="7actg"></table>

        3. <address id="7actg"></address>
          <address id="7actg"></address>
          1. <object id="7actg"><tt id="7actg"></tt></object>
            麻酥酥福利视频 | 国产综合久久久777777 | 日韩一区二区三区中文高清电影 | 国产免费三片 | 波多野结衣无码中出 | 人人爽人人爽人人爽人片 | 欧美性极品少妇精品网站 | 国产aaa级片 | 超碰天天干 | 欧美视频一区二区 |