Permission authentication method and system for Docker image registry
A technology of authority authentication and authentication method, applied in the field of Docker, which can solve the problems of insecure access to Docker images
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] Aiming at the requirements of the current image rights management, the present invention deploys the authentication program in the mirror warehouse of the cloud management area, and uses the mirror warehouse to designate the token server of the cloud management area to provide authentication services for users' access to the private Docker mirror warehouse and its mirror images. Whenever the mirror repository receives a request from a user in an availability zone to access the image, it instructs the client in the availability zone to send user information, image information accessed, and access actions to the cloud management zone through the proxy server in the availability zone. server, the token server decides whether to grant the user the requested access permission based on the user information.
[0043] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


