Container login method, device and system based on Docker
A login method and container technology, applied in the computer field, can solve problems such as difficult security guarantees, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] figure 1 It is a diagram of the application environment running by the Docker-based container login method in one embodiment. Such as figure 1 As shown, the application environment includes an entry server 110 and a Docker physical machine 120, wherein the entry server 110 and the Docker physical machine 120 communicate through a network.
[0030] The entry server 110 is generally the starting machine for logging in to the server, which can be a springboard machine. Multiple containers can run on the Docker physical machine 120, and each container corresponds to a different service. The entry server 110 establishes a connection with the Docker physical machine 120 according to the received command and enters the corresponding container on the Docker physical machine through the virtual terminal.
[0031] In one embodiment, figure 1 The internal structure of the entry server 110 in figure 2 As shown, the portal server 110 includes a processor, a storage medium, a me...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


