登录获取token

http://127.0.0.1:9999/auth/oauth/token?scope=server&grant_type=password&userType=admin
1.header:
Authorization:Basic dGVzdDp0ZXN0

参数说明:
Authorization:Basic Base64.encry(client_id:client_secret)
client_id、client_secret来自sys_oauth_client_details表。
dGVzdDp0ZXN0就是通过Base64.encry(client_id:client_secret)加密获取

如:Base64.encry(test:test)) 或 https://enc.pig4cloud.com/生成

2.Body:
Content-Type:application/x-www-form-urlencoded
username:admin
password:Zx3kiOQWDCunfHwKI3aiRQ==

参数说明:
password:AES(明文密码)
如:AES('123456')=Zx3kiOQWDCunfHwKI3aiRQ==

 

 

刷新 token 请求接口

刷新 token 请求接口
http://127.0.0.1:9999/auth/oauth/token?scope=server&grant_type=refresh_token
Authorization:Basic dGFqaWE6dGFqaWE= ##Basic Base64.encry(client_id:client_secret)
refresh_token:5a058838-80e3-4ab5-ad28-d781e2609f77
注意:5a058838-80e3-4ab5-ad28-d781e2609f77来自于获取token接口返回的refresh_token字段

 

根据token请求url


url:http://localhost:8080/admin/role/page?current=1&size=20
application/json; charset=UTF-8
Authorization:Bearer 4f133126-ec7b-4788-89d3-6dc2f3df4192

注意:4f133126-ec7b-4788-89d3-6dc2f3df4192为用户token

 

Java AES加解密算法

@Test
public void testEnc() {
    // 构建前端对应解密AES 因子
    AES aes = new AES(Mode.CBC, Padding.ZeroPadding,
            new SecretKeySpec("tax".getBytes(), "AES"),
            new IvParameterSpec("tax".getBytes()));
    String password = aes.encryptBase64("123456", Charset.defaultCharset());
    System.out.println("加密password=" + password); //Zx3kiOQWDCunfHwKI3aiRQ==
}

@Test
public void testDec() {
    // 构建前端对应解密AES 因子
    AES aes = new AES(Mode.CBC, Padding.ZeroPadding,
            new SecretKeySpec("tax".getBytes(), "AES"),
            new IvParameterSpec("tax".getBytes()));
    String password = aes.decryptStr("Zx3kiOQWDCunfHwKI3aiRQ==", Charset.defaultCharset());
    System.out.println("解密password=" + password);
}

前端报文加密的业务文档

 

 

 

posted on 2021-05-06 20:20  Ruthless  阅读(3111)  评论(0编辑  收藏  举报