Authorization method and device, authorization platform and storage medium

An authorization device and platform technology, which is applied in the field of data security, can solve problems such as network incompatibility, inability to authorize bastion machines, and inability to communicate with authorization servers, so as to achieve the effect of improving flexibility and security

Pending Publication Date: 2022-01-28
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if multiple bastion hosts are deployed in different regions, the network between different bastion hosts is not connected, and the authorization server cannot communicate with the bastion host, the authorization server cannot authorize the bastion host.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and device, authorization platform and storage medium
  • Authorization method and device, authorization platform and storage medium
  • Authorization method and device, authorization platform and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.

[0023] In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.

[0024] figure 1 It is a schematic diagram of an authorization system provided by an embodiment of the present disclosure, and the authorization system may include an authorization server, a bastion host, and an authorization platform.

[0025] Among them, the authorization server and the bastio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to an authorization method and device, an authorization platform and a storage medium. The method comprises the steps that a first authorization request of a bastion host is received through an authorization platform, wherein the authorization request comprises a unique identifier of the bastion host and information of an authorization range; the authorization platform sends the first authorization request of the bastion host to an authorization server, so that the authorization server performs authorization verification based on the unique identifier of the bastion host and the information of the authorization range; and then the authorization platform receives an authorization notification returned by the authorization server after the authorization verification is passed and sends the authorization notification to the bastion host. According to the scheme provided by the invention, the bastion host and the authorization server under different networks are linked by setting the authorization platform capable of communicating with the bastion host and the authorization server under different networks, so that authorization and unified management of the bastion host under different network environments are realized, and the flexibility and security of authorization management are improved.

Description

technical field [0001] The embodiments of the present disclosure relate to the technical field of data security, and in particular to an authorization method, device, authorization platform, and storage medium. Background technique [0002] As a security audit system, the bastion host is usually used in a specific network to ensure that the network and data are not invaded and destroyed by external and internal users. The bastion host is mainly used to manage assets, so the number of manageable assets is the most important value of the bastion host, and the number of manageable assets is determined by authorization. [0003] In related technologies, the bastion host can be authorized through an authorization server, and in this case, the bastion host and the authorization server must be in the same network environment. However, if multiple bastion hosts are deployed in different regions, the network between different bastion hosts is not connected, and the authorization ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/08H04L63/10
Inventor 刘振超段文泽
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products