Communication authentication method, device and equipment and storage medium
An authentication method and an authentication server technology, which are applied in the field of devices, communication authentication methods, equipment and storage media, and can solve problems such as difficult to meet, difficult to ensure cluster business reliability, and unable to realize multiple node docking authentication.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of this application.
[0041] In the current scenario where a client accesses a decentralized distributed architecture cluster based on the Kerberos protocol, it is often necessary for the client to make an authentication request to the nodes in the cluster through the authentication server (KDC) specified by the Kerberos protocol, and obtain the authentication request from the KDC. The service ticket (Service Ticket) of the feedback node, and then use the service ticket to authenticate...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


