Supercharge Your Innovation With Domain-Expert AI Agents!

Cross-tenant authorization method and device, computer equipment and storage medium

A cross-tenant, tenant technology, applied in the field of network security

Inactive Publication Date: 2020-02-21
SHENZHEN TAIZHOU TECH CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a cross-tenant authorization method, device, computer equipment and storage medium, based on the functional authority and data authority control system designed based on the existing RBAC model, aiming to solve the problem of existing cross-tenant authorization existing problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-tenant authorization method and device, computer equipment and storage medium
  • Cross-tenant authorization method and device, computer equipment and storage medium
  • Cross-tenant authorization method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0043] It should be understood that when used in this specification and the appended claims, the terms "including" and "including" indicate the existence of the described features, wholes, steps, operations, elements and / or components, but do not exclude one or The existence or addition of multiple other features, wholes, steps, operations, elements, components, and / or collections thereof.

[0044] It should also be understood that the terms used in this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-tenant authorization method and device, computer equipment and a storage medium. The method is based on aA function authority and data authority control system designedfor an RBAC model and comprises: acquiring user information of a user a, wherein the identity of a current operation user is the user a of a tenant A; obtaining a switchable tenant list; switching tothe tenant B; performing service operation according to the identity of the current user b; recovering the user a of the tenant A; and performing service operation according to the identity of the current user a. By implementing the method disclosed by the invention, controllable cross-tenant operation authorization can be carried out on a system with complete data isolation in a multi-tenant system on the premise of meeting a security mechanism, and the requirements of various actual service scenes are met. The authorization switching between the tenants does not need to provide the user account of the authorizing party to the authorized party, only the personnel specified by the authorized party needs to complete the identity authentication, the data is completely kept under the controlof the authorizing party, and the process is safe and controllable.

Description

Technical field [0001] The present invention relates to the technical field of network security, in particular to a cross-tenant authorization method, device, computer equipment and storage medium. Background technique [0002] At present, in SaaS, PaaS and other types of multi-user information systems, in order to ensure the data security and independence of each user, the form of multi-tenant (user enterprise) is usually used to control data access in the system, except for public data and sharing In addition to data, users can only access data content that is clearly attributable to the current tenant, in order to achieve the unification of program logic and the relative isolation of customer data. Gree’s methods include isolation of data attributes (such as specific fields in data tables) and exclusive data sources (different Users or designated users use exclusive data sources) isolation and other methods. [0003] However, the problem is that in actual application scenarios,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 曾玄杰陈嘉嘉李云强徐祥林
Owner SHENZHEN TAIZHOU TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More