Supercharge Your Innovation With Domain-Expert AI Agents!

Access control method for bastion host in multi-cloud environment

An access control and bastion machine technology, applied in the field of data security, can solve problems such as difficult management of permissions and chaotic operation and maintenance

Pending Publication Date: 2022-05-13
江苏银承网络科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, for enterprises that provide Internet + services, there are hundreds of cloud servers at every turn. Development, testing, operation and maintenance and security personnel all need to log in to the server for operation. When more and more devices need to be operated and maintained, When the personnel involved in maintenance become more and more diverse, the authority becomes more difficult to manage. Without a good mechanism, it is easy to cause confusion in operation and maintenance;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for bastion host in multi-cloud environment
  • Access control method for bastion host in multi-cloud environment
  • Access control method for bastion host in multi-cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] It is easy to understand that, according to the technical solution of the present invention, those skilled in the art can propose multiple structural modes and implementation modes that can be replaced without changing the essence and spirit of the present invention. Therefore, the following specific embodiments and drawings are only exemplary descriptions of the technical solution of the present invention, and should not be regarded as the entirety of the present invention or as a limitation or restriction on the technical solution of the present invention.

[0029] Such as figure 1 and image 3 As shown, the present invention provides a bastion host access control method in a multi-cloud environment, including:

[0030] S1, deploy jumpserver open source springboard system

[0031] First, download the jumpserver installation package and perform manual deployment; it should be noted that the specific implementation methods for downloading the jumpserver installation p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a bastion host access control method in a multi-cloud environment. The bastion host access control method comprises the following steps: deploying a jumpserver open source springboard system; adding a network domain, and configuring a middle springboard machine system; running the script to execute the transmission of the public key file, and forbidding the user name password login of the machine at the same time; according to the method, the cloud servers completing key docking are accessed to the web end of the jumpserver open-source springboard machine system in batches, so that users on a machine where the jumpserver open-source springboard machine system is located log in the machine through a unified web end, and user unauthorized operation caused by different user identity permissions is avoided. The control console sets command alarm, notifies a system administrator at the first time for operation commands with potential safety hazards, and configures modes of command log auditing, machine login auditing and operation video recording at the same time, and has the advantages that after the cloud server accesses the bastion host, only secret key login is supported, and hackers are prevented from directly logging in the machine through a remote computer.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a bastion machine access control method in a multi-cloud environment. Background technique [0002] With the rapid development of information security, the security of enterprise systems is an important focus of enterprises when choosing a service construction platform. With the rapid rise of domestic public clouds, the cost of providing customized services for enterprises is gradually reduced. The number of servers on the cloud It is also increasing with the expansion of business. [0003] At the same time, enterprises will also deploy hot standby services in different public clouds. Server login or access in a multi-cloud environment has become a problem that must be solved for companies to protect information security and avoid production accidents at this stage. [0004] At present, for enterprises that provide Internet + services, there are hundreds of cloud servers a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/083H04L63/101H04L63/104H04L67/02
Inventor 周锋
Owner 江苏银承网络科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More