CN111327578A - User ssh login authentication method - Google Patents

User ssh login authentication method Download PDF

Info

Publication number
CN111327578A
CN111327578A CN201811542810.4A CN201811542810A CN111327578A CN 111327578 A CN111327578 A CN 111327578A CN 201811542810 A CN201811542810 A CN 201811542810A CN 111327578 A CN111327578 A CN 111327578A
Authority
CN
China
Prior art keywords
login
server
login account
ssh
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811542810.4A
Other languages
Chinese (zh)
Inventor
黄仕勤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qinggan Intelligent Technology Co Ltd
Original Assignee
Shanghai Qinggan Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qinggan Intelligent Technology Co Ltd filed Critical Shanghai Qinggan Intelligent Technology Co Ltd
Priority to CN201811542810.4A priority Critical patent/CN111327578A/en
Publication of CN111327578A publication Critical patent/CN111327578A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention provides a user ssh login authentication method, which is characterized in that an AD domain server and an RADIUS server are built in a computer provided with a Windows server operating system, and the method comprises the following steps: the authentication request is generated by logging in the linux client in an ssh login mode by a user; and the RADIUS server sends the login account of the authentication request to the AD domain server and receives feedback information, when the feedback information is that the login account is correct, the access authority configuration information of the login account is determined, the access authority configuration information is attached to a verification passing message and sent to the linux client, and the linux client configures the access authority. By the method and the system, centralized management of ssh login of the user can be performed for the linux clients in the mass cloud platform, the correctness of the login account is verified by the AD domain server when login accounts of a plurality of linux clients perform login, the corresponding access right is automatically granted by the RADIUS server when the login account is correct, manual verification is not needed, and the enterprise cost is reduced.

Description

User ssh login authentication method
Technical Field
The invention belongs to the field of Internet, relates to an authentication method, and particularly relates to a ssh login authentication method for a user.
Background
The Windows server operating system is a Windows-oriented server operating system, and is generally applied to enterprises to manage computers in the enterprises.
At present, most of the public can purchase a plurality of computers for employees to use, and particularly software or hardware developers usually carry a Linux operating system on the computers, wherein the Linux operating system is a set of Unix-like operating systems which can be freely used and spread. The method comprises the steps that a plurality of user accounts are created in a computer with a Linux operating system and used as login accounts for logging in a Linux system, and login accounts held by employees in different positions generally need to have different access rights.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention aims to provide a ssh login authentication method for a user, which is used for solving the problem of manual verification of login accounts of a large number of linux systems in the prior art.
In order to achieve the above and other related objects, the present invention provides a method for authenticating user ssh login, wherein an AD domain server and a RADIUS server are built in a computer having a Windows server operating system, and the method for authenticating user ssh login is applied to the RADIUS server, and comprises: receiving an authentication request sent by a linux client, wherein the authentication request comprises a login account; the login account is obtained by inputting when the linux client logs in a ssh login mode; sending the login account to an AD domain server and receiving feedback information of the AD domain server, if the feedback information is that the login account is correct, executing step S3, and if the feedback information is that the login account is wrong, executing step S4; determining the access authority configuration information of the login account, and attaching the access authority configuration information to a linux client through verification and message sending; and sending a verification failure message to the linux client.
In an embodiment of the present invention, the Windows Server operating system preferably adopts a Windows Server2008R2 operating system.
In an embodiment of the present invention, in step S1, before receiving the authentication request sent by the linux client, the firewall of the computer on which the RADIUS server is installed needs to be closed.
In an embodiment of the invention, in step S1, before receiving the authentication request sent by the linux client, the 1812 port and the 1813 port of the RADIUS server need to be opened.
In an embodiment of the present invention, in step S3, the determining, by the RADIUS server, the access right of the login account specifically includes:
step S31, determining the ssh user group where the login account is located according to the login account;
step S32, generating a connection request according to the ssh user group where the login account is located,
and step S33, matching the generated connection request with a preset network policy to acquire the access right corresponding to the login account.
The invention also provides a user ssh login authentication method, which is applied to the AD domain server and comprises the following steps: step S50, receiving an authentication request from the linux client forwarded from the RADIUS client; step S51, inquiring whether there is the same preset account in the AD database according to the login account in the authentication request, if yes, executing step S52, if no, executing step S53; step S52, generating the correct feedback information of the login account and sending the correct feedback information to the RADIUS server; in step S53, feedback information of the login account error is generated and sent to the RADIUS server.
In an embodiment of the invention, before the step S50, the method further includes a step S60: a plurality of ssh user groups are preset in an AD database of an AD domain server, and a plurality of preset accounts are preset in each ssh user group.
In an embodiment of the present invention, the dial-in attribute of the preset account is set as "controlling access through NPS network policy".
The invention also provides a user ssh login authentication method, which is applied to the linux client and comprises the following steps: step S60, acquiring a login account input by a user when logging in the linux client; step S61, the login account is added into the authentication request and sent to the RADIUS server; step S62, when receiving the verification success message sent by the RADIUS server, configuring the access authority of the login account according to the access authority configuration information in the verification success message; and step S63, when receiving the authentication failure message sent by the RADIUS server, the linux client fails to log in.
In an embodiment of the present invention, the linux client has a pam _ radius installed therein.
As described above, the ssh login authentication method of the user according to the present invention has the following advantages:
by the user ssh login authentication method, centralized management of user ssh login can be performed for the linux clients in the mass cloud platform, when login accounts of the plurality of linux clients perform login, the AD domain server verifies the correctness of the login account, when the login account is correct, the RADIUS server automatically grants the corresponding access right according to the user group in which the login account is located, manual verification is not needed, and enterprise cost is reduced.
Drawings
Fig. 1 is a flowchart of an RADIUS server in the ssh login authentication method of the user according to the present invention.
Fig. 2 is a flowchart of the AD domain server in the ssh login authentication method of the user according to the present invention.
FIG. 3 is a flowchart of the linux client in the ssh login authentication method of the user according to the present invention.
Fig. 4 is a schematic diagram of a system structure of the ssh login authentication method of the present invention.
Description of the element reference numerals
S1-S4
S50-S53
S60-S63
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
The user ssh login authentication method provided by the invention is suitable for a computer provided with a Windows server operating system, and an AD domain server and a RADIUS server need to be set up in advance before the computer executes the user ssh login authentication method. In this embodiment, the Windows Server operating system preferably adopts a Windows Server2008R2 operating system.
The specific process of building the AD domain server comprises the following steps: the ActiveDirectory domain service is added through the server management of the computer, and if the NET Framework is not installed in the computer, the NET Framework needs to be installed in the adding process. After the installation preparation of the AD domain server is completed, the AD domain server installation guide is operated to complete the deployment of the AD domain server. In this embodiment, the AD domain server belongs to a first domain controller in an intranet, and therefore in the configuration process, deployment configuration selection "newly establish a domain in a new forest" is performed and the newly established domain is named, and meanwhile, a forest function level is set, and the forest function level is selected according to the AD domain server to be added subsequently. After the AD domain server is installed, the AD domain server takes effect after the computer is required to be restarted.
In this embodiment, in the validated AD domain server, multiple ssh user groups may be created in an AD database of the AD pre-controller, where the created ssh user groups serve as authentication groups for which the RADIUS server receives login accounts input by users when logging in a linux client in an ssh login manner, multiple preset accounts are preset in each ssh user group, and meanwhile, to control the access authority of each ssh user group, an account dial-in attribute in the ssh user group is set to "control access through NPS network policy", so that the user group may access the network through NPS network policy.
Building the RADIUS server comprises the following steps: firstly, an NPS network policy server is set up in a computer: after adding the network policy and the access service through the computer server manager, selecting a network policy server for installation.
Subsequently, the RADIUS server configures ssh login authentication, which specifically includes:
(1) the created shared key information includes the shared secret template name and the shared secret as a common key, so that the common key can be manually entered with different repetition when a RADIUS client is added later. In an embodiment, the shared secret is set to testing;
and (3) creating the RADIUS client, and setting a client identification name and a client server IP address of the RADIUS client so as to prepare for the subsequent connection of the linux client and the RADIUS server.
In this embodiment, the client identification name is set to test, the client server IP address is 10.172.10.150, and it is determined that the RADIUS client uses the shared secret identical to the shared secret key information; the "vendor name" is set to "RARIUS Standard".
(2) Establishing and configuring a connection request strategy for matching a connection request allowing the RADIUS client, specifically comprising:
establishing a connection request policy, and specifying a name of the connection request policy and a type of a network server, wherein the type of the network server is set to be 'unpecified', and the name of the connection request policy is set to be sshlogin in the embodiment;
adding the IP address of the client server of the RADIUS client to a specified condition as a matching condition, so that the RADIUS client can be allowed to perform identity authentication;
(3) the method comprises the following steps of establishing and configuring a network strategy for respectively setting corresponding access authorities for ssh user groups in an AD domain server, specifically:
establishing a network policy, and specifying a network policy name and a connection type, wherein the type of the network server is set as 'unpecified', and the network policy name is set as sshlogin in the embodiment;
specifying an applicable ssh user group under the network policy;
setting the access right of the network policy, wherein the access right is designated as an authorized access right in the embodiment; therefore, all preset accounts in the ssh user group have the access right.
In addition, configuring the network policy further includes: the configured identity authentication method is 'unencrypted identity authentication', the radius attribute is set as a service-type attribute, and the attribute value of the service-type attribute is logic.
Furthermore, after the AD domain server and the RADIUS server are built in the computer, the linux client needs to be configured, so that when a user logs in the linux client, an input login account can be uploaded to the RADIUS server for verification.
Meanwhile, in order to ensure that the linux client can send the login account to the RADIU server for verification, pam _ RADIUs needs to be installed on the linux client, and the specific process includes:
downloading pam _ radius1.3.17, and installing a pam-level package;
decompressing the pam _ radius1.3.17 packet, executing make to obtain pam _ radius _ auth.so;
so file copy to/lib/security/catalogue, if the system of Linux customer end is 32 bit system then copy to 32 bit system catalogue, if the system of Linux customer end is 64 bit system then copy to 64 bit system catalogue;
so/lib/security/# 32-bit System directory
So/lib64/security/# 64-bit System directory
Create/etc/raddb/directory, copy the page _ radius _ auth. conf into/etc/raddb/directory and rename as server:
mkdir-p/etc/raddb
cp pam_radius_auth.conf/etc/raddb/server
editing/etc/raddb/server file, filling in correct freeradius service IP address and shared key information, where the shared key information of freeradius service is the same as the shared secret, and the IP address of freeradius service is the same as the client server IP address of the RADIUS client, and in this embodiment, the set IP address and shared key information of freeradius service are as follows:
Figure BDA0001908601800000051
10.172.10.150 is taken as an example, namely, the frereradias service is installed in the configuration RADIUS client;
editing/etc/pam.d/sshd files, adding the following codes at the beginning of the sshd file:
auth sufficient pam_radius_auth.so;
the login account of the linux client is mainly directed to the RADIUS server for verification.
The login account of the linux client is created on the linux client by a user, a user password does not need to be created during creation, the created login account can be the same as or different from a preset account in the AD domain server, and only under the same condition, the specific login authority and the corresponding access authority of the login account are provided.
Through the process, the mutual connection between the linux client-RADIUS server-AD domain server is completed.
Referring to fig. 1, a method for ssh login authentication of a user provided by the present invention is applied to an RADIUS server, and includes:
step S1, receiving an authentication request sent by a linux client, wherein the authentication request comprises a login account; the login account is obtained by inputting when the linux client logs in a ssh login mode;
step S2, sending the login account to the AD domain server and receiving the feedback information of the AD domain server, if the feedback information is that the login account is correct, executing step S3, and if the feedback information is that the login account is wrong, executing step S4;
step S3, determining the access authority configuration information of the login account, and attaching the access authority configuration information to a verification passing message to send a linux client;
and step S4, sending a verification failure message to the linux client.
Further, in step S1, before receiving the authentication request sent by the linux client, the firewall of the computer itself on which the RADIUS server is installed needs to be closed, or the 1812 port and the 1813 port of the RADIUS server need to be opened.
Further, in step S3, the determining, by the RADIUS server, the access right of the login account specifically includes:
step S31, determining the ssh user group where the login account is located according to the login account;
step S32, generating a connection request according to the ssh user group where the login account is located,
step S33, matching the generated connection request with a preset network policy to obtain an access right corresponding to the login account, where the obtained corresponding access right is the access right of the login account.
Referring to fig. 2, the present invention provides a method for ssh login authentication of a user, which is applied to an AD domain server and includes:
step S50, receiving an authentication request from the linux client forwarded from the RADIUS client;
step S51, inquiring whether there is the same preset account in the AD database according to the login account in the authentication request, if yes, executing step S52, if no, executing step S53;
step S52, generating the correct feedback information of the login account and sending the correct feedback information to the RADIUS server;
in step S53, feedback information of the login account error is generated and sent to the RADIUS server.
Further, step S60 is also included before step S50: a plurality of ssh user groups are pre-stored in an AD database of an AD domain server, and each ssh user group is pre-provided with a plurality of preset accounts.
Further, in order to ensure that the AD domain server is connected with the RADIUS, the dial-in attribute of the preset account is set as 'access is controlled through NPS network policy'.
Because the AD domain server also has a log file, a user can quickly check the login records of all login accounts through the log file. Meanwhile, the corresponding access authority of each account can be checked in the computer.
Referring to fig. 3, a method for authenticating ssh login of a user is applied to a linux client, and includes:
step S60, acquiring a login account input by a user when logging in the linux client;
step S61, the login account is added into the authentication request and sent to the RADIUS server;
step S62, when receiving the verification success message sent by the RADIUS server, configuring the access authority of the login account according to the access authority configuration information in the verification success message;
and step S63, when receiving the authentication failure message sent by the RADIUS server, the linux client fails to log in.
By the user ssh login authentication method, centralized management of user ssh login can be performed for linux clients in a large batch of cloud platforms, when login accounts of a plurality of linux clients perform login, the AD domain server verifies the correctness of the login accounts, and when the login accounts are correct, the RADIUS server automatically grants corresponding access rights according to user groups where the login accounts are located.
In conclusion, the present invention effectively overcomes various disadvantages of the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (10)

1. A user ssh login authentication method is characterized in that an AD domain server and a RADIUS server are built in a computer provided with a Windows server operating system, and the user ssh login authentication method is applied to the RADIUS server and comprises the following steps:
step S1, receiving an authentication request sent by a linux client, wherein the authentication request comprises a login account; the login account is obtained by inputting when the linux client logs in a ssh login mode;
step S2, sending the login account to the AD domain server and receiving the feedback information of the AD domain server, if the feedback information is that the login account is correct, executing step S3, and if the feedback information is that the login account is wrong, executing step S4;
step S3, determining the access authority configuration information of the login account, and attaching the access authority configuration information to a verification passing message to send a linux client;
and step S4, sending a verification failure message to the linux client.
2. The method of claim 1, in which the Windows Server operating system preferably employs the Windows Server2008R2 operating system.
3. The method of claim 1, wherein in step S1, before receiving the authentication request sent by the linux client, the firewall of the computer on which the RADIUS server is installed is closed.
4. The method according to claim 1, wherein in step S1, before receiving the authentication request sent by the linux client, the 1812 port and the 1813 port of the RADIUS server need to be opened.
5. The user ssh login authentication method according to claim 3 or 4, wherein in step S3, the determining, by the RADIUS server, the access right of the login account specifically includes:
step S31, determining the ssh user group where the login account is located according to the login account;
step S32, generating a connection request according to the ssh user group where the login account is located,
and step S33, matching the generated connection request with a preset network policy to acquire the access right corresponding to the login account.
6. A user ssh login authentication method is applied to an AD domain server and comprises the following steps:
step S50, receiving an authentication request from the linux client forwarded from the RADIUS client;
step S51, inquiring whether there is the same preset account in the AD database according to the login account in the authentication request, if yes, executing step S52, if no, executing step S53;
step S52, generating the correct feedback information of the login account and sending the correct feedback information to the RADIUS server;
in step S53, feedback information of the login account error is generated and sent to the RADIUS server.
7. The user ssh login authentication method of claim 6, further comprising, before the step S50, the step S60: a plurality of ssh user groups are preset in an AD database of an AD domain server, and a plurality of preset accounts are preset in each ssh user group.
8. The method of claim 7, wherein the dial-in attribute of the pre-defined account is set to "Access controlled by NPS network policy".
9. A user ssh login authentication method is applied to a linux client, and comprises the following steps:
step S60, acquiring a login account input by a user when logging in the linux client;
step S61, the login account is added into the authentication request and sent to the RADIUS server;
step S62, when receiving the verification success message sent by the RADIUS server, configuring the access authority of the login account according to the access authority configuration information in the verification success message;
and step S63, when receiving the authentication failure message sent by the RADIUS server, the linux client fails to log in.
10. The user ssh login authentication method of claim 9, wherein a pam _ radius is installed in the linux client.
CN201811542810.4A 2018-12-17 2018-12-17 User ssh login authentication method Pending CN111327578A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811542810.4A CN111327578A (en) 2018-12-17 2018-12-17 User ssh login authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811542810.4A CN111327578A (en) 2018-12-17 2018-12-17 User ssh login authentication method

Publications (1)

Publication Number Publication Date
CN111327578A true CN111327578A (en) 2020-06-23

Family

ID=71169517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811542810.4A Pending CN111327578A (en) 2018-12-17 2018-12-17 User ssh login authentication method

Country Status (1)

Country Link
CN (1) CN111327578A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726422A (en) * 2020-07-02 2020-09-29 浪潮卓数大数据产业发展有限公司 Tool and method for controlling windows rapid deployment in batches
CN112115492A (en) * 2020-08-21 2020-12-22 麒麟软件有限公司 User data encryption and isolation method and system based on Linux operating system
CN112182563A (en) * 2020-09-28 2021-01-05 邢韬 Linux system Bash safety protection method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1783780A (en) * 2004-12-04 2006-06-07 华为技术有限公司 Method and device for realizing domain authorization and network authority authorization
CN104468550A (en) * 2014-11-28 2015-03-25 华为技术有限公司 User login method for Windows desktop, device and system
CN106230683A (en) * 2016-07-29 2016-12-14 北京北信源软件股份有限公司 A kind of method and system of the certification dynamic vlan switching that links
CN106331003A (en) * 2015-06-23 2017-01-11 中国移动通信集团重庆有限公司 Method and device for accessing application portal system on cloud desktop
CN106534219A (en) * 2016-12-31 2017-03-22 中国移动通信集团江苏有限公司 Security authentication method and device for desktop cloud portal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1783780A (en) * 2004-12-04 2006-06-07 华为技术有限公司 Method and device for realizing domain authorization and network authority authorization
CN104468550A (en) * 2014-11-28 2015-03-25 华为技术有限公司 User login method for Windows desktop, device and system
CN106331003A (en) * 2015-06-23 2017-01-11 中国移动通信集团重庆有限公司 Method and device for accessing application portal system on cloud desktop
CN106230683A (en) * 2016-07-29 2016-12-14 北京北信源软件股份有限公司 A kind of method and system of the certification dynamic vlan switching that links
CN106534219A (en) * 2016-12-31 2017-03-22 中国移动通信集团江苏有限公司 Security authentication method and device for desktop cloud portal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LINUX512: "ssh登录使用radius服务器认证配置方法", 《HTTPS://WWW.IT610.COM/ARTICLE/1187411760538296320.HTM》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726422A (en) * 2020-07-02 2020-09-29 浪潮卓数大数据产业发展有限公司 Tool and method for controlling windows rapid deployment in batches
CN112115492A (en) * 2020-08-21 2020-12-22 麒麟软件有限公司 User data encryption and isolation method and system based on Linux operating system
CN112182563A (en) * 2020-09-28 2021-01-05 邢韬 Linux system Bash safety protection method

Similar Documents

Publication Publication Date Title
JP6556943B2 (en) Single sign-on method for appliance secure shell
CN107172054B (en) Authority authentication method, device and system based on CAS
US8839234B1 (en) System and method for automated configuration of software installation package
JP4712389B2 (en) Equipment access control system
CN112597472B (en) Single sign-on method, device and storage medium
US7904952B2 (en) System and method for access control
EP1914658B1 (en) Identity controlled data center
CN107122674B (en) Access method of oracle database applied to operation and maintenance auditing system
US10681023B2 (en) Self-service portal for provisioning passwordless access
US7581111B2 (en) System, method and apparatus for transparently granting access to a selected device using an automatically generated credential
CN111327578A (en) User ssh login authentication method
US9619631B1 (en) Role-based permissions for accessing computing resources
WO2022011055A2 (en) A System and Method for Simplifying User Authentication and Authorization Workflows
US10162950B2 (en) Methods and apparatus for using credentials to access computing resources
US20040049677A1 (en) Authorization and security management system and method
KR101627078B1 (en) Apparatus and method for managing password
US9027107B2 (en) Information processing system, control method thereof, and storage medium thereof
JP7099198B2 (en) Management equipment, management systems and programs
CN106856471B (en) AD domain login authentication method under 802.1X
CN116627595A (en) Virtual machine creation method and related components
WO2023079411A1 (en) User device authentication gateway module
CN116707849A (en) Cloud service access authority setting method and cloud management platform for enclave instance
JP2018041347A (en) Authentication system
KR20020020520A (en) operation method of system for perform login and system for the same
US20200364192A1 (en) Efficient and automatic database patching using elevated privileges

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200623