System, authentication server and method for controlling access permission

A technology for authentication server and access server, applied in transmission systems, electrical components, etc., can solve problems such as easy omission, confusion of password permissions, etc.

Inactive Publication Date: 2017-09-26
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the common authentication method is according to the machine, that is, after the user modifies the password (password) in the user information (user information includes user name and password) every time, all relevant machines need to modify the password of the user one by one and Adjust user information and user permissions according to the modified user information, password permission management is confusing and easy to miss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, authentication server and method for controlling access permission
  • System, authentication server and method for controlling access permission
  • System, authentication server and method for controlling access permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0054] figure 1 It is an architecture diagram of a system for controlling access rights in an embodiment of the present invention, such as figure 1 As shown, including: authentication server, access server and server cluster. in,

[0055] The authentication server is used to store all user information in a pre-established database; store all user permissions in the Lightweight Directory Access Protocol (LDAP) directory in a hierarchical tree structure; when receiving the user information sent by the access server , judge whether the received user information is an authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system, an authentication server and a method for controlling access permission. The method comprises the following steps: storing total user information in a pre-established database by the authentication server, and storing the total user permission in a lightweight directory access protocol (LDAP) catalogue according to a hierarchical dendritical structure; when the user information transmitted by an access server is received, judging whether the received user information is an authentication user or not by the authentication server; searching user permission corresponding to the user information in the LDAP catalogue by the authentication server and generating user credentials according to the searched user permission when the received user information is judged to be the authentication user; transmitting the generated user credentials to the access server and a cluster server by the authentication server so as to perform data interaction between a server cluster and the access server. According to the embodiment of the invention, the unified password management and centralized permission management can be realized.

Description

technical field [0001] Embodiments of the present invention relate to but are not limited to cloud computing technology, especially a system, authentication server and method for controlling access rights. Background technique [0002] With the popularization of cloud computing applications, the number of servers is increasing, and the number and correlation of virtual machines on the servers are becoming increasingly complex. Security issues accompany the entire life cycle of virtual machines, covering content throughout product design, development, Testing, operation and maintenance, infrastructure (such as Internet Data Center (IDC, Internet Data Center), intranet, extranet office network) and other aspects. [0003] A user logs in to an IDC online server to exchange data with the server cluster. Among them, reasonable, standardized, and unified user authority verification and management are required for the user authority of the IDC online server. Among them, the commo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/083H04L63/10H04L63/102
Inventor 许陆丹
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products