Tag

Single Sign-On

0 views collected around this technical thread.

Code Ape Tech Column
Code Ape Tech Column
Feb 27, 2025 · Information Security

Implementing Single Sign-On (SSO) with Ticket‑Based Authentication in Java

This article explains the concept of Single Sign-On, its advantages, and two practical implementations using ticket‑based authentication and encrypted user data exchange between Service A and Service B, complete with database schema, configuration files, and full Java code examples.

AuthenticationBackendEncryption
0 likes · 18 min read
Implementing Single Sign-On (SSO) with Ticket‑Based Authentication in Java
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 20, 2024 · Information Security

Understanding Single Sign-On (SSO): Principles, Process, and Application Scenarios

This article explains the fundamentals, architecture, workflow, and practical scenarios of Single Sign-On (SSO), illustrating how a centralized authentication server enables users to log in once and seamlessly access multiple trusted applications, while also offering resources for deeper study.

AuthenticationSSOSingle Sign-On
0 likes · 5 min read
Understanding Single Sign-On (SSO): Principles, Process, and Application Scenarios
Lobster Programming
Lobster Programming
Oct 23, 2024 · Backend Development

How to Enforce Single-Device Login with Session, Token, and JWT

This article explains three backend strategies—session‑cookie, token, and JWT—to ensure an account can only be active on one device at a time, detailing the workflow, data structures, and Redis integration needed to implement forced logout across multiple endpoints.

JWTRedisSession Management
0 likes · 6 min read
How to Enforce Single-Device Login with Session, Token, and JWT
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Aug 28, 2024 · Information Security

Understanding Single Sign-On (SSO): Principles, Implementation Steps, Challenges, and Applications

This article explains the concept of Single Sign‑On (SSO), outlines its implementation process—including user redirection, token generation, and cross‑system authentication—discusses challenges such as single point of failure, complexity, and cross‑domain issues, and highlights typical use cases in enterprise and e‑commerce environments.

AuthenticationSSOSingle Sign-On
0 likes · 6 min read
Understanding Single Sign-On (SSO): Principles, Implementation Steps, Challenges, and Applications
Top Architect
Top Architect
Jul 1, 2024 · Information Security

Understanding Single Sign-On (SSO) and CAS Authentication Flow

This article explains the concept, definitions, and three deployment types of Single Sign-On (SSO), introduces the Central Authentication Service (CAS) mechanism, and details step‑by‑step login and logout processes across multiple web applications, illustrating each flow with diagrams and examples.

AuthenticationCASSSO
0 likes · 12 min read
Understanding Single Sign-On (SSO) and CAS Authentication Flow
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Feb 26, 2024 · Information Security

Comprehensive Overview of Single Sign-On (SSO) and CAS Architecture

This article explains the fundamentals of Single Sign-On (SSO), why it is needed in distributed systems, details the components and workflow of the CAS (Central Authentication Service) implementation, and outlines common application scenarios such as e‑commerce, enterprise portals, education, and finance.

AuthenticationCASIdentity Management
0 likes · 7 min read
Comprehensive Overview of Single Sign-On (SSO) and CAS Architecture
Code Ape Tech Column
Code Ape Tech Column
Dec 19, 2023 · Information Security

Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms

This article explains the concept, advantages, and three implementation methods of Single Sign-On (SSO), then provides two complete practical examples—including architecture diagrams, step‑by‑step flows, and full Java code for ticket‑based and encrypted data‑based SSO—followed by supplementary RSA key generation notes and a brief promotional note.

AuthenticationBackendJava
0 likes · 18 min read
Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms
Java Architect Essentials
Java Architect Essentials
Oct 31, 2023 · Information Security

Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2

The article explains why multiple independent systems hurt user experience, reviews traditional session and cookie based authentication, discusses session sharing problems in clustered environments, and presents centralized Redis storage and CAS‑based single sign‑on solutions with code examples and a comparison to OAuth2.

CASJavaOAuth2
0 likes · 16 min read
Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2
JD Tech
JD Tech
Jul 17, 2023 · Information Security

Understanding CAS Single Sign-On: Architecture, Core Tickets, and Implementation Guide

This article explains the concepts, architecture, core tickets, and practical implementation steps of CAS-based Single Sign-On, including detailed API specifications, security considerations, and example code snippets for integrating SSO across multiple applications.

APIAuthenticationCAS
0 likes · 9 min read
Understanding CAS Single Sign-On: Architecture, Core Tickets, and Implementation Guide
Architects Research Society
Architects Research Society
Jun 15, 2023 · Information Security

Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases

Federated identity management enables users to access multiple applications across trusted domains using a single digital identity, detailing its core roles, benefits, inbound/outbound federation, account linking, just‑in‑time provisioning, home‑realm discovery, and its use as an IAM transition strategy.

IAMSingle Sign-Onaccount linking
0 likes · 15 min read
Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases
Top Architect
Top Architect
Mar 13, 2023 · Information Security

Understanding Single Sign‑On (SSO) and CAS Authentication Flows

This article explains the concept, background, and definition of Single Sign‑On (SSO), outlines three SSO deployment types, introduces the Central Authentication Service (CAS) with detailed ticket mechanisms, and provides step‑by‑step SSO and Single Logout (SLO) processes for multiple applications.

AuthenticationCASSSO
0 likes · 11 min read
Understanding Single Sign‑On (SSO) and CAS Authentication Flows
Top Architect
Top Architect
Nov 18, 2022 · Information Security

Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot

This article provides a comprehensive tutorial on implementing Single Sign-On using the Central Authentication Service (CAS), covering its concepts, features, architecture, environment setup, server and client configuration, and testing procedures with detailed code examples for Java developers.

AuthenticationBackendCAS
0 likes · 9 min read
Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot
Architect's Guide
Architect's Guide
Oct 15, 2022 · Information Security

Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation

This article explains traditional HTTP session handling, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including session replication, centralized Redis storage, and a complete CAS‑based single sign‑on implementation with Java code examples.

AuthenticationCASJava
0 likes · 14 min read
Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationJWTOAuth2.0
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Architecture Digest
Architecture Digest
Aug 5, 2022 · Information Security

Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation

This article explains traditional HTTP session handling, the problems of session sharing in clustered environments, two common session‑sharing strategies, and introduces single sign‑on (SSO) concepts with a detailed CAS‑based implementation using Spring Boot, Redis, and Java filters.

AuthenticationCASJava
0 likes · 14 min read
Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation
Architect
Architect
Aug 3, 2022 · Information Security

Understanding Session Mechanisms, Session Sharing, and SSO with CAS Implementation

This article explains the challenges of multiple system logins, reviews traditional HTTP session handling, presents session sharing solutions like replication and Redis‑based central storage, and details a CAS‑based single sign‑on implementation with code examples, while also comparing CAS to OAuth2.

AuthenticationCASJava
0 likes · 13 min read
Understanding Session Mechanisms, Session Sharing, and SSO with CAS Implementation
Top Architect
Top Architect
Jul 11, 2022 · Information Security

Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot

This article explains how to integrate the CAS (Central Authentication Service) single sign‑on solution into a Spring Boot backend by adding necessary dependencies, configuring a series of CAS filters, creating a custom MyAuthenticationFilter to handle AJAX requests, and demonstrating a Vue.js frontend that interacts with the authentication flow, complete with screenshots of the login, ticket validation, and logout processes.

AuthenticationBackendCAS
0 likes · 14 min read
Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot
IT Architects Alliance
IT Architects Alliance
Jun 3, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign-On using the CAS (Central Authentication Service) framework, covering the concepts of SSO and CAS, required development environment, server-side deployment, client configuration, and end‑to‑end testing with detailed code examples.

AuthenticationCASJava
0 likes · 8 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration
Selected Java Interview Questions
Selected Java Interview Questions
Jun 2, 2022 · Backend Development

Integrating CAS Single Sign-On with Spring Boot for Front‑Back End Separation

This article explains how to deploy a CAS server, configure the cas-client dependency, set up Spring Boot annotations and cookie handling, share sessions across multiple services, and resolve cross‑origin and authentication redirects for a Vue front‑end separated from legacy JSP back‑ends.

AuthenticationCASFront‑Back End Separation
0 likes · 10 min read
Integrating CAS Single Sign-On with Spring Boot for Front‑Back End Separation
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Oct 29, 2021 · Information Security

Understanding Single Sign-On (SSO): Why It Is Needed and How It Works

This article explains the necessity of Single Sign-On (SSO) in multi‑system environments, traces its origins from monolithic web applications to distributed clusters, and describes common implementation approaches for same‑domain and cross‑domain scenarios, including the use of a central authentication center such as CAS.

AuthenticationSSOSingle Sign-On
0 likes · 6 min read
Understanding Single Sign-On (SSO): Why It Is Needed and How It Works