A method and system for unified authority control of microservices based on user attributes

A technology of permission control and user attributes, applied in the direction of user identity/authority verification, transmission system, digital transmission system, etc., can solve the problem that the unity of microservice authentication and authentication cannot be guaranteed, and the authentication method cannot be applied to various authentication scenarios. , There are no problems such as general production-level out-of-the-box use, to avoid duplication of development work, standardize and centralize authority management, and reduce the difficulty of docking

Active Publication Date: 2022-05-03
JINLING INST OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. By following the mature monolithic application service architecture authentication scheme, it is possible to implement authentication and authentication logic for each business microservice system. However, this approach cannot guarantee the unity of authentication and authentication among various microservices and will bring great difficulties to the maintenance and expansion of the system
[0006] 2. It is also aimed at the authentication and authentication of microservices. With the development of multiple terminals such as web terminals, mobile terminals, and open platforms, there have been multiple connections between external application access, between users and services, and between services. authentication scenarios, the existing authentication methods cannot be applied to a variety of authentication scenarios
However, for many special customization needs, the entire community has not yet formed a general production-level out-of-the-box product
Specifically, the microservice authentication implemented through the integration of Spring Cloud Zuul and Oauth2 will lead to a large project size and not flexible enough; using the distributed Session solution will bring serious load problems or network overhead
[0008] 4. More and more enterprises and institutions choose to store, deliver and expand data by building cloud storage platforms or big data platforms, which brings some data security issues, such as illegal user intrusion, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for unified authority control of microservices based on user attributes
  • A method and system for unified authority control of microservices based on user attributes
  • A method and system for unified authority control of microservices based on user attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be explained in further detail below with reference to the drawings and detailed description.

[0081] The embodiment of the invention discloses a micro-service unified authority control method and system based on user attributes, which are applied to manage distributed micro-services and provide unified identity authentication and fine-grained resource authentication for micro-services. At present, the distributed micro-service architecture is mostly aimed at multi-users and multi-scenarios, with many types of users and huge numbers; There are many micro-services, difficult management, inconsistent interfaces, heavy burden of expansion and maintenance, etc. The micro-service unified authentication and authentication scheme formed by the invention provides a standardized authority control interface at the gateway layer, which is co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and system for unified authority control of microservices based on user attributes. The method includes: storing user attribute information through authority control microservices; selecting objects and policy requirements that require authorization, and creating access control through authority control microservices strategy to realize the dynamic configuration of permissions; when the gateway receives the identity authentication request sent by the client, it forwards it to the permission control microservice, and generates an authentication authentication token after verification and returns it to the client; when the client requests to use any resource of the business microservice, The gateway receives resource request information and authentication tokens, and forwards them to the authority control microservice, completes resource authentication by parsing the authentication parameters, releases the resource request to the business microservice after success, executes the corresponding operation, and returns the result. The present invention completes unified authority control of business microservices through authority control microservices, refines the granularity of authority access control, improves dynamics, and thereby improves the security of authority management.

Description

Technical field [0001] The invention relates to the field of microservices and authority control, in particular to a unified authority control method and system for microservices based on user attributes. technical background [0002] Micro-service technology architecture is a new type of software architecture. Under micro-service architecture, an application will be split into several or even hundreds of micro-services, and each micro-service needs to authenticate access and resources. If authentication and authentication logic are carried out for each business microservice system, it will not only fail to guarantee the unity of authentication and authentication, but also bring great burden to the maintenance and expansion of the system. [0003] With the emergence of various authentication scenarios such as web, mobile and open platforms, the traditional authentication and authentication logic under the single application architecture can't guarantee the reasonable applicabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40H04L67/06H04L67/30G06F21/31
CPCH04L9/3213H04L63/10H04L67/025H04L67/06H04L67/30G06F21/31
Inventor 王洪欣张燕徐尚瑜严冬苗丽娟
Owner JINLING INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products