User non-perception image bastion machine method and system
A non-sensing, bastion machine technology, applied in the field of network security, can solve problems such as adding steps to use, and achieve the effect of optimizing user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] Such as figure 1 As shown in or 2, the present invention discloses a user-insensitive image bastion machine method, and the system adopted includes a client, a management platform, a proxy server and WINDOWS assets; the client communicates with the management platform and the proxy server respectively, and the management platform Connect proxy server, the management platform is preset with accessible WINDOWS asset list information, the proxy server is provided with RDP service end, wherein RDP (Remote Desktop Protocol) Remote Desktop Protocol; method comprises the following steps:
[0026] Step 1, the user enters the user name and password to log in to the client
[0027] Step 2, after the client authentication is passed, obtain the accessible WINDOWS asset list information from the management platform for display;
[0028] Step 3, the user selects the actual WINDOWS asset and connects to the actual WINDOWS asset;
[0029] Step 4, the client redirects the access traff...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

