File transmission method and device, electronic equipment and storage medium
A file transfer and file technology, applied in the field of information security, can solve problems such as cumbersome steps, keytab file generation errors, and inability to realize the secondary delivery of Keytab files, so as to reduce the difficulty of operation and improve the efficiency of delivery
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] figure 1 It is a flow chart of a file transfer method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of batch delivery of security authentication files in a large data cluster scenario. The method can be executed by a file transfer device, which can Implemented in hardware and / or software, see figure 1 , the method provided in the embodiment of the present invention specifically includes the following steps:
[0027] Step 110: Obtain at least one request information requesting to issue a security authentication file, where the request information includes at least request terminal information and a request path.
[0028] Wherein, the security authentication file may be a file for verifying the identity of the user. When the user accesses the service server, the security authentication file may be used for identity authentication, and the security authentication file may be composed of security individual information and a p...
Embodiment 2
[0037] figure 2 It is a flow chart of another file transfer method provided by Embodiment 2 of the present invention. The embodiment of the present invention is based on the embodiment of the above invention. Refer to figure 2 , the file transfer method provided by the embodiment of the present invention specifically includes the following steps:
[0038] Step 210: Obtain at least one request information requesting to issue a security authentication file, where the request information includes at least requesting terminal information and a requesting path.
[0039] Further, on the basis of the foregoing embodiments of the invention, the requesting terminal information includes at least one of a Principal security individual and a terminal identifier.
[0040] Wherein, the Principal security individual may be a user under the Kerberos protocol, and the terminal identifier may be a computer name or a computer number.
[0041] In the embodiment of the present invention, the R...
Embodiment 3
[0070] Figure 4 It is a schematic structural diagram of a file transfer device provided in Embodiment 3 of the present invention, which can execute the software installation method provided in any embodiment of the present invention, and has corresponding functional modules and beneficial effects for executing the method. The device can be implemented by software and / or hardware, and specifically includes: a request acquisition module 301 , a file search module 302 and a file delivery module 303 .
[0071] The request obtaining module 301 is configured to obtain at least one request information requesting to issue a security certification file, wherein the request information includes at least request terminal information and a request path.
[0072] The file search module 302 is configured to search locally for corresponding security certification files according to the requesting terminal information, and obtain each of the security certification files according to the sear...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


