Unlock instant, AI-driven research and patent intelligence for your innovation.

Permission authentication method and system for Docker image registry

A technology of authority authentication and authentication method, applied in the field of Docker, which can solve the problems of insecure access to Docker images

Active Publication Date: 2018-04-20
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the above-mentioned defects of the prior art, the present invention provides a method and system for authenticating authority of a Docker image warehouse, which mainly solves the problem of insecure access to existing Docker images

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission authentication method and system for Docker image registry
  • Permission authentication method and system for Docker image registry
  • Permission authentication method and system for Docker image registry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Aiming at the requirements of the current image rights management, the present invention deploys the authentication program in the mirror warehouse of the cloud management area, and uses the mirror warehouse to designate the token server of the cloud management area to provide authentication services for users' access to the private Docker mirror warehouse and its mirror images. Whenever the mirror repository receives a request from a user in an availability zone to access the image, it instructs the client in the availability zone to send user information, image information accessed, and access actions to the cloud management zone through the proxy server in the availability zone. server, the token server decides whether to grant the user the requested access permission based on the user information.

[0043] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a permission authentication method and system for a Docker image registry. The permission authentication method for the Docker image registry comprises the steps of: firstly, when access to the image registry through a proxy server is refused, receiving unauthorized error information returned by the image registry; then, analyzing the unauthorized error information, generating a permission authentication request according to authentication method prompt information, sending the permission authentication request to the proxy server, and sending the permission authentication request to a token server by the proxy server, so that permission authentication is carried out; then, receiving a token returned by the token server in a cloud district, and sending an access request to the image registry by carrying the token; and, receiving an image returned by the image registry, so that the access operation to the private Docker image registry is completed. According to the permission authentication method and system for the Docker image registry disclosed by the invention, permission authentication is committed and verified by a third party; the permission is given according to a request token; therefore, the security of the image is improved; furthermore, an authentication component does not need to be set in each available area any longer; and thus, only the token server in the cloud district needs to be maintained.

Description

technical field [0001] The invention relates to the technical field of Docker, in particular to a permission authentication method and system for a Docker mirror warehouse. Background technique [0002] Docker (Docker is an open source application container engine that allows developers to package their applications and dependencies into a portable container, and then publish it to any popular Linux machine, and can also implement virtualization) provides container technology Several containers are allowed to run on the same host or virtual machine, and each container is an independent virtual environment or application. [0003] The container comes from the Docker image (image), and the image can be generated by the user (build) or submitted by the running container (commit). After the image is generated, it can be pushed (push) to the mirror warehouse (registry) for storage. It can also be pulled from the mirror warehouse to run the container locally. Docker provides an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/10H04L67/1095H04L67/56
Inventor 刘俊杰
Owner PING AN TECH (SHENZHEN) CO LTD