Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/netbuffer/sso-demo
sso test single sign on,use spring-boot,sa-token,cookie domain,redis storage
https://github.com/netbuffer/sso-demo
cookie demo domain java javaweb jwt login permission redis restful restful-api sa-token spring spring-boot spring-mvc sso system tomcat website
Last synced: 14 days ago
JSON representation
sso test single sign on,use spring-boot,sa-token,cookie domain,redis storage
- Host: GitHub
- URL: https://github.com/netbuffer/sso-demo
- Owner: netbuffer
- Created: 2021-09-08T08:41:02.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2021-09-18T01:41:02.000Z (over 3 years ago)
- Last Synced: 2024-11-06T19:52:38.688Z (2 months ago)
- Topics: cookie, demo, domain, java, javaweb, jwt, login, permission, redis, restful, restful-api, sa-token, spring, spring-boot, spring-mvc, sso, system, tomcat, website
- Language: Java
- Homepage:
- Size: 126 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# sso-demo
![](https://img.shields.io/static/v1?label=jdk&message=1.8&color=blue)
![](https://img.shields.io/static/v1?label=sppring-boot&message=2.5.4&color=blue)
![](https://img.shields.io/static/v1?label=sa-token&message=1.26.0&color=green)
![](https://img.shields.io/static/v1?label=okhttps&message=3.1.1&color=blue)
> 基于 [sa-token](https://sa-token.dev33.cn/) 实现单点登录系统
* https://github.com/netbuffer/sso-demo
* https://gitee.com/netbuffer/sso-demo### step
1. edit C:\Windows\System32\drivers\etc\hosts
添加域名映射记录到hosts中
```
127.0.0.1 sso-server.com
127.0.0.1 sso-client-system1.com
127.0.0.1 sso-client-system2.com
```
2. 访问http://sso-client-system1.com:17001/ 页面显示未登录
![](lib/sso-client-system1-login.png)
点击登录按钮,跳转到sso-server认证中心
3. 重定向到[sso-server认证中心](http://sso-server.com:17000/sso/auth?redirect=http://sso-client-system1.com:17001/sso/login?back=http%3A%2F%2Fsso-client-system1.com%3A17001%2F)
![](lib/sso-server-login.png)
输入帐号密码点击登录,认证成功后会回跳到sso-client-system1应用
4. 此时回跳到sso-client-system1应用,sso-client-system1应用自身认证通过,回显登录成功
![](lib/sso-client-system1-login-success.png)
5. 访问http://sso-client-system2.com:17002/ 页面显示未登录
![](lib/sso-client-system2-login.png)
点击登录按钮,跳转到sso-server认证中心,此时sso-server检测到登录态,携带ticket直接回跳回来
6. 页面回跳回来,sso-client-system2应用自身解析出ticket参数,再调用认证中心的检测ticket接口校验,检测完成后认证成功,页面回显登录成功
![](lib/sso-client-system2-login-success.png)