A secret key management method and system for token authentication in an openstack system
A management method and secret key technology, which is applied in the field of secret key management, can solve problems such as system compatibility, communication reliability, and poor stability, and achieve the effects of improving stability and reliability, improving efficiency, and avoiding access delays
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] S1: Determine the master node and the common node when the node is started.
[0081] The node in this embodiment is a keystone node. The keystone service is deployed in multiple sections in the openstack system
[0082] S11: When the keystone service is started, according to the non-load balancing IP, a self-registering node is adopted in a service registration manner.
[0083] That is, when the keystone service starts, the keystone self-registers the endpoint, which is the other section in the subsequent steps.
[0084] Further, after adopting the service registration method to self-register the node, it also includes steps S12 and S13.
[0085] S12: Judge whether the openstack system includes multiple regions.
[0087] If the openstack system does not include multiple regions, but only has one region, step S14 is directly executed.
[0089] S14: Obtain the communication addresses of keystone services of all nodes.
[0090] S15: All nodes preempt the master node in chronol...
Embodiment 2
[0129] The key rotation module includes: a rotation unit, a list pulling unit, a notification unit and a synchronization unit. Among them, the rotation
[0130] The fault handling module includes: a second judgment unit, a third judgment unit, a yield unit, a second preemption unit, a pull
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

