Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation execution method, springboard machine, cluster authentication server and bastion machine system

A technology for authenticating servers and operating execution, which is applied in the field of computer networks, can solve problems such as low security, and achieve the effect of improving security

Active Publication Date: 2020-02-14
上海翌旭网络科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing bastion host system has the problem of low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation execution method, springboard machine, cluster authentication server and bastion machine system
  • Operation execution method, springboard machine, cluster authentication server and bastion machine system
  • Operation execution method, springboard machine, cluster authentication server and bastion machine system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] As stated in the background technology, the bastion host system in the prior art includes a springboard machine and a server cluster. The bastion host system does not allow users to directly log in to the servers in the server cluster for operation. In order to operate on the servers in the server cluster.

[0048] Among them, when the user logs in to the springboard machine, he inputs the corresponding user name and password information, and the springboard machine authenticates the user based on the user name and password entered by the user; when the user's identity verification passes, the user can perform the corresponding operation The instruction is sent to the springboard machine, and then the springboard machine forwards the user's operation instruction to the target server in the server cluster, so that the target server performs the corresponding operation.

[0049] It can be seen from the description that the above scheme only uses a fixed username and passw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation execution method, a jump host, a cluster authentication server and a bastion host system. The method comprises the following steps: receiving the login information of a user sent by a client; carrying out dual identity authentication to the user based on the login information of the user; when the dual identity authentication is successful, receiving the operation information of a target server in a server cluster sent by the client; and sending the operation information to the server cluster to ensure that the cluster authentication server in the server cluster carries out identity authentication to the user, enabling the user to jump to login the corresponding target server in the server cluster when the cluster authentication server carries out successful identity authentication to the user, and executing the above corresponding operation to the corresponding target server. According to the above scheme, the security of the bastion host system can be increased.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and in particular relates to an operation execution method, a springboard machine, a cluster authentication server and a bastion machine system. Background technique [0002] The bastion host, that is, in a specific network environment, in order to protect the network and data from intrusion and damage from external and internal users, various technical means are used to collect and monitor the system status of each component in the network environment in real time, Security incidents and network activities for centralized alarm, timely processing and audit determination. [0003] The existing bastion machine system does not allow users to directly log in to the target server in the server cluster to directly operate. Users can only operate the servers in the server cluster after passing the springboard machine authentication. [0004] However, the existing bastion host system has the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0815H04L63/083H04L63/0876H04L67/1095
Inventor 陈培培朱金华康凯
Owner 上海翌旭网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products