Method and device for user authentication
A user authentication and user technology, applied in the fields of user authentication and network security, can solve the problems of increased maintenance and tracking costs, no centralized management, unacceptable system-level restart, etc., and achieve the effect of increasing maintainability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The specific implementation manners of the present invention will be described below in conjunction with the accompanying drawings.
[0036] A typical system configuration according to the present invention includes: an authentication server and several SSH servers, and of course the present invention is also applicable to the situation of only one SSH server. The server of a specific protocol is configured on the authentication server, and the client of the specific protocol is correspondingly configured on all SSH servers to communicate with the server on the authentication server. The specific protocol can be, for example, a remote user The dial-up authentication protocol (Remote Authentication Dial In User Service referred to as RADIUS) can also be other protocols that can realize similar functions, such as DIAMETER or other custom TCP / UDP protocols to complete. For convenience of description, the following uses the RADIUS protocol as an example.
[0037] For each ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


