Access authority control method and reverse agent server
A technology of reverse proxy and control method, applied in the field of access authority control method and reverse proxy server, can solve the problems of complex management and difficult maintenance, and achieve the effects of high availability, low cost and convenient maintenance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] figure 1 A schematic flow chart showing an access authority control method according to an embodiment of the present invention. According to the access right control method of this embodiment, a reverse proxy server is set at the network layer, and the reverse proxy server is configured to control the user's right to access resources in the application server. Such as figure 1 As shown, the access control method mainly includes:
[0030] Step S110, the reverse proxy server receives the resource access request sent by the user, wherein the resource access request may include resource information to be accessed by the user and the user ID of the user;
[0031] Step S120, determining the user group to which the user belongs according to the user identifier;
[0032] Step S130, determining at least one accessible resource group that the user group can access;
[0033] Step S140, according to the resource information, determine the to-be-visited resource group to which...
Embodiment 2
[0043] The access authority control method according to the present embodiment is based on role access control (English: Role-BasedAccessControl, abbreviation: RBAC) and Nginx (enginex) reverse proxy service configuration strategy to implement authority control on network resource access. The following describes role access control and Nginx reverse proxy service in detail.
[0044] Access control means that according to the pre-set permission rules, system users can and can only perform operations within their authority on resources within their authority. In the traditional permission control management, the resource permissions are assigned by a global administrator, and the resources in the system are classified into levels and categories for management to ensure that each user can only access those resources that are marked to be accessible by him. This method coordinates and manages the allocation of system resources, but when there are a lot of system users and resource...
Embodiment 3
[0056] Figure 5 A schematic block diagram of a reverse proxy server according to an embodiment of the present invention is shown. The reverse proxy server 300 according to this embodiment is set at the network layer, can be connected to the user terminal 100 via the Internet 200, and is configured to control user access to the application server cluster 400 with the application server cluster 400 that provides application resources to the user terminal 100 Permissions for resources in .
[0057] The reverse proxy server 300 according to this embodiment may include: a receiving module 310 , a first determining module 320 , a second determining module 330 , a third determining module 340 and a judging module 350 .
[0058] Specifically, the receiving module 310 may be configured to receive a resource access request sent by a user, wherein the resource access request may include resource information to be accessed by the user and the user ID of the user; the first determining m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 