构建和实现单点登录解决方案(CAS)

最近的任务是整理和优化公司一个项目的登录和权限部分,项目大大小小有10几个子系统必然涉及到SSO,项目本身的单点登录方案实现比较简单,可扩展性不强。于是看了部分开源的解决方案(其实主要是看了CAS,呵呵)。

 

下面就我体验CAS的单点登录方案,记录整个过程,做个备案。

 

1.准备工具

cas-server-3.5.2-release.zip

cas-client-java-2.1.1.zip

 

2.配置环境

计算机系统:winxP

计算机域名:xwtec-1531

数据库:oracle11g

web容器:tomcat6

JDK版本:jdk1.6.0_24

ip:192.168.1.150

 

3.CAS验证服务器搭建

先解压cas-server-3.5.2-release.zip到任意盘,将modules目录下的cas-server-webapp-3.5.2.war重命名为cas.war复制到tomcat的webapp目录下,启动tomcat

待tomcat启动成功后在浏览器地址栏输入http://192.168.1.150:8080/cas/login显示登录界面


构建和实现单点登录解决方案(CAS)_第1张图片
 输入用户名和密码可登录(默认输入相同字符串),至此验证服务器搭建完毕,接下来可定制自己的特定需求。

 

4.密码验证

密码的鉴权在配置文件/WEB-INFO/deployerConfigContext.xml中,如下

 

<property name="authenticationHandlers">
			<list>
				<!--jdbc鉴权认证-->
				<bean  class="org.jasig.cas.adaptors.jdbc.QueryDatabaseAuthenticationHandler">
					<property name="dataSource" ref="dataSource" />
					<property name="sql" value="select password from userinfo where username=?" />
					<property name="passwordEncoder" ref="passwordEncoderBean"/>
				</bean>  
				<!--
					| This is the authentication handler that authenticates services by means of callback via SSL, thereby validating
					| a server side SSL certificate.
					+
				<bean class="org.jasig.cas.authentication.handler.support.HttpBasedServiceCredentialsAuthenticationHandler"
					p:httpClient-ref="httpClient" />-->
				<!--
					| This is the authentication handler declaration that every CAS deployer will need to change before deploying CAS 
					| into production.  The default SimpleTestUsernamePasswordAuthenticationHandler authenticates UsernamePasswordCredentials
					| where the username equals the password.  You will need to replace this with an AuthenticationHandler that implements your
					| local authentication strategy.  You might accomplish this by coding a new such handler and declaring
					| edu.someschool.its.cas.MySpecialHandler here, or you might use one of the handlers provided in the adaptors modules.
					+
				<bean 
					class="org.jasig.cas.authentication.handler.support.SimpleTestUsernamePasswordAuthenticationHandler" />这里为默认的鉴权方式,即密码等于用户名-->
			</list>
		</property>

    我这里密码的鉴权采用jdbc的方式来验证,另外密码的加密方式采用MD5

<!-- Data source definition -->
	<bean id="dataSource" class="org.springframework.jdbc.datasource.DriverManagerDataSource">
		<property name="driverClassName">
			<value>oracle.jdbc.driver.OracleDriver</value>
		</property>
		<property name="url">
		<!--如果使用mysql数据库,应该加上后面的编码参数,否则可能导致客户端对TGT票据无法识别的问题-->
			<value>jdbc:oracle:thin:@localhost:1521:cring</value>    
		</property>
		<property name="username"><value>xw_uomp</value></property>
		<property name="password"><value>xw_uomp123</value></property>
	</bean>
	<bean id="passwordEncoderBean" class="org.jasig.cas.authentication.handler.DefaultPasswordEncoder">
		<!--cas server默认支持MD5和SHA1两种编码方式,如果需要其他的编码方式例如SHA256,512等,可自行实现org.jasig.cas.authentication.handler.PasswordEncoder接口-->
        <constructor-arg value="MD5" /> 
    </bean>

   

 至此我们重启TOMCAT,输入http://192.168.1.150:8080/cas/login  跳转上图的登录页面后输入userinfo表中自己预置的用户名和密码

 这里提下userinfo用的密码是MD5加密的,预置数据时可以参考下DefaultPasswordEncoder.java这个类(在cas-server-core.jar中,见附件auth.rar)

 
构建和实现单点登录解决方案(CAS)_第2张图片
 

 5.HTTPS验证

cmd命令行到c盘的根目录下

 

创建key

keytool -genkey -alias tomcatsso -keyalg RSA -keypass changeit -storepass changeit -keystore tomcatsso.keystore -validity 3600


构建和实现单点登录解决方案(CAS)_第3张图片
 
导出证书(服务端)
keytool -export -trustcacerts -alias tomcatsso -file tomcatsso.cer -keystore tomcatsso.keystore -storepass changeit


导入证书到信任库(客户端)
keytool -import -trustcacerts -alias tomcatsso -file tomcatsso.cer -keystore "C:\Program Files\Java\jdk1.6.0_24\jre\lib\security\cacerts" -storepass changeit

删除

keytool -delete -alias tomcatsso -keyalg RSA -keypass changeit -storepass changeit -keystore tomcatsso.keystore -validity 3600

 

配置tomcat

/conf/server.xml 添加如下行

    <Connector protocol="org.apache.coyote.http11.Http11NioProtocol" port="8443" minSpareThreads="5" maxSpareThreads="75" enableLookups="true" disableUploadTimeout="ture" 
			   acceptCount="100" SSLEnabled="true"
               maxThreads="200" scheme="https" secure="true"
               clientAuth="false" sslProtocol="TLS" keystoreFile="c:\tomcatsso.keystore" keystorePass="changeit"/>

 

至此HTTPS方式验证登陆搞定,https://xwtec-1531:8443/cas/login登陆OK

 

配置客户端A、B验证CAS单点登录


构建和实现单点登录解决方案(CAS)_第4张图片
 

web.xml 配置文件一样,如下:

<?xml version="1.0" encoding="UTF-8"?>
<web-app version="2.5" xmlns="http://java.sun.com/xml/ns/javaee"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://java.sun.com/xml/ns/javaee 
	http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd">
	<filter>
		<filter-name>CAS Filter</filter-name>
		<filter-class>edu.yale.its.tp.cas.client.filter.CASFilter</filter-class>
		<init-param>
			<param-name>edu.yale.its.tp.cas.client.filter.loginUrl</param-name>
			<param-value>https://xwtec-1531:8443/cas/login</param-value>
		</init-param>
		<init-param>
			<param-name>edu.yale.its.tp.cas.client.filter.validateUrl</param-name>
			<param-value>https://xwtec-1531:8443/cas/serviceValidate</param-value>
		</init-param>
		<init-param>
			<param-name>edu.yale.its.tp.cas.client.filter.serverName</param-name>
			<param-value>xwtec-1531:8080</param-value>
		</init-param>
	</filter>
	<filter-mapping>
		<filter-name>CAS Filter</filter-name>
		<url-pattern>/*</url-pattern>
	</filter-mapping>
	<welcome-file-list>
		<welcome-file>index.jsp</welcome-file>
	</welcome-file-list>
</web-app>

 分别在CASClientA和CASClientB的工程下的index.jsp中添加如下代码区分登录

<span>CASClientA:<%=request.getSession().getAttribute("edu.yale.its.tp.cas.client.filter.user") %></span>

 

 <span>CASClientB:<%=request.getSession().getAttribute("edu.yale.its.tp.cas.client.filter.user") %></span>

 

OK,全部完成了,测试的效果:

在地址栏输入http://xwtec-1531:8080/CASClientA 会被重定向到cas的登录页面

 

输入用户名和密码成功后再被跳转到index.jsp,显示


构建和实现单点登录解决方案(CAS)_第5张图片
 

然后在地址栏输入http://xwtec-1531:8080/CASClientB则不需要重新登录了直接跳转到index.jsp


构建和实现单点登录解决方案(CAS)_第6张图片
 

你可能感兴趣的:(单点登录)