Communication authentication method, device, equipment and storage medium
An authentication method and authentication server technology, applied in communication authentication methods, equipment, storage media, and device fields, can solve problems such as difficult to meet, unable to realize multi-node docking authentication, difficult to ensure cluster business reliability, etc., to ensure reliability Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. All other embodiments obtained by those of ordinary skill in the art based on the embodiments in the present application without creative work fall within the protection scope of the present application.
[0041] In the current scenario where the client accesses the decentralized distributed architecture cluster based on the Kerberos protocol, the client is often required to make an authentication request for the nodes in the cluster through the authentication server (KDC) specified by the Kerberos protocol, and obtain the authentication request from the KDC. The service ticket of the feedback node (Service Ticket), and then use the service ticket to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


