A system and method for implementing cascading authorization under a microservice architecture

A micro-service, implementation-level technology, applied in transmission systems, electrical components, etc., can solve problems such as unfriendliness, reduce the difficulty of use and operation, and improve user experience.

Active Publication Date: 2021-12-10
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such an operation is very unfriendly in terms of user habits and convenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for implementing cascading authorization under a microservice architecture
  • A system and method for implementing cascading authorization under a microservice architecture
  • A system and method for implementing cascading authorization under a microservice architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer, the present invention will be described in detail below in conjunction with the embodiments. It should be noted that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] The system for implementing cascade authorization under the microservice architecture includes microservice applications, metadata management centers and authorization authentication centers. Each microservice application has a built-in adapter; the microservice application is connected to the metadata through the built-in adapter Adapter Management center and authorized authentication center.

[0030] Under the microservice architecture, each relatively independent functional module will be a separate microservice application, and a large system will contain many microservice applications, rangi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention particularly relates to a system and method for realizing cascading authorization under the microservice architecture. The cascading authorization system under the microservice architecture includes microservice applications, metadata management centers, and authorization authentication centers. Each microservice application has a built-in Adapter. The microservice application is connected to the metadata management center and the authorization authentication center through a built-in adapter. The system and method for implementing cascading authorization under the microservice architecture solves the permission problem when the next request of the microservice architecture needs to be applied across multiple microservices. When authorizing, the user no longer needs to know the dependencies of the operation, and does not need to Each operation is authorized one by one, which greatly improves the user experience and reduces the difficulty of user use and operation.

Description

technical field [0001] The invention relates to the technical field of identity authentication and access control, in particular to a system and method for realizing cascade authorization under a microservice architecture. Background technique [0002] With the rise and widespread use of microservices, more and more applications have begun to adopt the microservice architecture. However, the authority control under the microservice architecture is quite different from that of traditional single applications. [0003] In a traditional monolithic application, calls between functional modules are in-process calls, and security does not need to be considered. Therefore, it is only necessary to do a permission check at the entrance of the external interface. [0004] However, under the microservice architecture, a user request may involve calls across multiple microservice applications. For example: user A has the authority to create a cloud host, and creating a cloud host also ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L67/10
Inventor 黄启庆刘可新唐晓东蔡卫卫高传集
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products