Application information configuration method and device
A technology of application information and application configuration, applied in the direction of program control devices, computer security devices, program control design, etc., can solve problems such as insecurity and easy leakage of sensitive information, and achieve the effect of improving security and solving easy leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] In this embodiment, a method for configuring application information is provided, figure 1 is a flowchart of a method for configuring application information according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:
[0026] Step S102, the framework program locates the corresponding confidential configuration file according to the user type, wherein the user type includes one of the following: production user, ordinary user;
[0027] Step S104, the framework program obtains the sensitive information identification of the application configuration from the application configuration file of the target application to be started;
[0028] Step S106, the framework program obtains the configuration item corresponding to the sensitive information identifier from the confidential configuration file, and exports the configuration item as an environment variable of the target application program;
[0029] Step S108...
Embodiment 2
[0045] In this embodiment, an application information configuration device is also provided, which is used to implement the above embodiments and preferred implementation modes, and those that have been explained will not be repeated here. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0046] image 3 is a structural block diagram of an application information configuration device according to an optional embodiment of the present invention, such as image 3 As shown, the device includes a positioning module 10 , a first acquiring module 20 , a second acquiring module 30 and a starting module 40 .
[0047] The positioning module 10 is configured to locate the corresponding confidential configurat...
Embodiment 3
[0053] In order to facilitate the understanding of the technical solutions provided by the present invention, the following will describe in detail in conjunction with embodiments of specific scenarios.
[0054] For the same application that needs to configure sensitive information (such as account password), it may run in different environments, such as development environment and production environment. And in different environments, the account information of the external service used by the application is different. Even in the development environment, the account and password information of external services used by different users are different.
[0055] Related technical solutions mostly use a centralized configuration server, such as apollo, where all information such as account passwords is stored on the central server, and applications use configurations in different environments by passing different startup parameters.
[0056] Using a centralized configuration ser...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


