User ssh login authentication method

A login authentication, user technology, applied in the Internet field, to achieve the effect of reducing enterprise costs

Inactive Publication Date: 2020-06-23
SHANGHAI QINGGAN INTELLIGENT TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above-mentioned shortcoming of the prior art, the purpose of the present invention is to provide a user ssh login authentication method, which is used to solve the problem of manual verification for a large number of login accounts of the linux system in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User ssh login authentication method
  • User ssh login authentication method
  • User ssh login authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0029] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the compo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user ssh login authentication method. An AD domain server and an RADIUS server are built in a computer provided with a Windows server operating system, and the AD domain server and the RADIUS server are connected with the Windows server operating system. The method comprises the steps that a linux client sends an authentication request to an RADIUS server, and the authentication request is generated when a user logs in the linux client in an ssh login mode; the RADIUS server sends a login account of the authentication request to the AD domain server and receives feedback information; and when the feedback information is that the login account is correct, determining access permission configuration information of the login account, attaching the access permission configuration information to a linux client which configures the access permission after the verification is passed. According to the invention, centralized management of user ssh login can be carried out on linux clients in a large batch of cloud platforms; when login accounts of a plurality of linux clients log in, the AD domain server verifies correctness of the login accounts, and when the loginaccounts are correct, the RADIUS server automatically grants corresponding access permission without manual verification, so that enterprise cost is reduced.

Description

technical field [0001] The invention belongs to the field of the Internet and relates to an authentication method, in particular to a user SSH login authentication method. Background technique [0002] The Windows server operating system is a Windows-oriented server operating system, which is usually used in enterprises to manage computers in the enterprise. [0003] At present, most companies will purchase multiple computers for employees to use, especially for software or hardware developers. Usually, the computers are equipped with a Linux operating system, which is a set of Unix-like operating systems that are free to use and spread freely. Create multiple user accounts on a computer equipped with a Linux operating system. As a login account for logging into the Linux system, the login accounts held by employees in different positions usually need to have different access rights. For a large number of login accounts, if each computer or each login account is manually au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/104H04L63/20H04L67/10
Inventor 黄仕勤
Owner SHANGHAI QINGGAN INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products