CN113922986B - Multi-terminal authority management method and equipment - Google Patents

Multi-terminal authority management method and equipment Download PDF

Info

Publication number
CN113922986B
CN113922986B CN202111057388.5A CN202111057388A CN113922986B CN 113922986 B CN113922986 B CN 113922986B CN 202111057388 A CN202111057388 A CN 202111057388A CN 113922986 B CN113922986 B CN 113922986B
Authority
CN
China
Prior art keywords
data
terminal
login
page
entering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111057388.5A
Other languages
Chinese (zh)
Other versions
CN113922986A (en
Inventor
顾章华
毕伟
于可新
杨建雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Youfei Baoke Information Technology Co ltd
Original Assignee
Nanjing Youfei Baoke Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Youfei Baoke Information Technology Co ltd filed Critical Nanjing Youfei Baoke Information Technology Co ltd
Priority to CN202111057388.5A priority Critical patent/CN113922986B/en
Publication of CN113922986A publication Critical patent/CN113922986A/en
Application granted granted Critical
Publication of CN113922986B publication Critical patent/CN113922986B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a multi-terminal authority management method and equipment, wherein the method comprises the following steps: after entering a terminal page of the system, acquiring cached encrypted login data based on a token of a terminal entry address; entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage; and storing the dynamic routing data into the session storage and entering a successful login page of the terminal, thereby solving the problem of different standard specifications of menu components, menu items, authentication modes and authority control under the multi-terminal environment of the SaaS system, improving the menu fusion efficiency and reducing the cost.

Description

Multi-terminal authority management method and equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and apparatus for managing rights of multiple terminals.
Background
The SaaS provider builds all network infrastructure, software and hardware operation platforms required by informatization for enterprises and is responsible for a series of services such as implementation in the early stage, maintenance in the later stage and the like, and the enterprises can use the information system through the Internet without purchasing software and hardware, building a machine room and recruiting IT personnel. SaaS is a software layout model, and the application of the software layout model is specially designed for network delivery, so that users can conveniently host, deploy and access through the Internet.
The SaaS system generally uses a system to maintain authority data of the whole system in a set of login, menu and authority management modes, so that different templates and different systems cannot share the same data, and a user needs to independently maintain a user entrance when entering different systems, so that development efficiency is low, and the same problem is easy to take multiple times to solve.
Therefore, how to solve the technical problems that the permission data of the SaaS system are not uniform and the running cost is high in a multi-terminal process is a technical problem to be solved at present.
Disclosure of Invention
The invention provides a multi-terminal authority management method which is applied to a SaaS software server system and is used for solving the technical problems of non-uniform permission data and high operation cost of the SaaS system in the prior art when multiple terminals exist.
The method comprises the following steps:
after entering a terminal page of the system, acquiring cached encrypted login data based on a token of a terminal entry address;
entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage;
and storing the dynamic routing data into the session storage, and entering a successful login page of the terminal.
In some embodiments of the present application, before the token based on the terminal entry address obtains the cached encrypted login data, the method further includes:
and configuring the association relation between the menu items and the terminals, the opening mode of the menu items and the positioning mode of pages corresponding to the menu items.
In some embodiments of the present application, the token based on the terminal entry address obtains cached encrypted login data, specifically:
judging whether the token exists at the terminal entry address or not;
if yes, checking the token and acquiring the cached encrypted login data;
if not, the terminal page jumps to a preset unified login page to log in.
In some embodiments of the present application, the token is checked, and the cached encrypted login data is obtained, which specifically includes:
when the token is checked to pass, obtaining the cached encrypted login data;
when the token check fails, the terminal page jumps to a preset unified login page
In some embodiments of the present application, the entry page corresponding to the terminal is entered based on the dynamic routing data in the encrypted login data and the routing data in the session storage, specifically:
judging whether dynamic routing data in the encrypted login data exists or not;
if yes, the user directly jumps to enter a successful login page of the terminal through the page of the terminal;
if not, entering a login page corresponding to the terminal based on the routing data in the session storage.
In some embodiments of the present application, entering a login page corresponding to the terminal based on the routing data in the session storage is specifically:
if the route data in the session storage exists, creating the dynamic route data according to diff algorithm, storing the dynamic route data in the session storage, and entering a successful page of terminal login;
and if the routing data in the session storage does not exist, the terminal page jumps to a preset unified login page to log in.
In some embodiments of the present application, the dynamic routing data is created according to diff algorithm, specifically:
screening menu information which can be accessed by a current user from a local menu according to code codes through diff algorithm;
matching authority data of the user through the accessible menu information;
each authority data is generated into corresponding dynamic routing data, so that the current user can only access the configured address data, and the other addresses are uniformly redirected to 404 pages.
In some embodiments of the present application, the authority data of the user is matched through the accessible menu information, specifically:
flattening the authority tree transmitted by the background;
placing each node in the background tree into a temp object;
traversing the front-end routing tree by depth priority, and then filtering out the routing node corresponding to the authority data of the user by judging whether the current node exists in the temp object.
In some embodiments of the present application, the method further comprises:
and after entering the successful login page of the terminal, acquiring the authority data of the current page through a preset instruction.
Correspondingly, the invention also provides multi-terminal authority management equipment, which comprises:
the acquisition module is used for acquiring cached encrypted login data based on a token of a terminal entry address after entering a terminal page of the system;
the first login module is used for entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage;
and the second login module is used for storing the dynamic routing data into the session storage and entering a successful login page of the terminal.
By applying the technical scheme, after entering a terminal page of the system, the encrypted login data of the cache is obtained based on a token of a terminal entry address; entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage; and storing the dynamic routing data into the session storage and entering a successful login page of the terminal, thereby solving the problem of different standard specifications of menu components, menu items, authentication modes and authority control under the multi-terminal environment of the SaaS system, improving the menu fusion efficiency and reducing the cost.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a flow diagram of a multi-terminal rights management method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a multi-terminal rights management device according to an embodiment of the present invention;
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The embodiment of the application provides a multi-terminal authority management method, which is applied to a SaaS software serviceization system, as shown in fig. 1, and comprises the following steps:
step S101, after entering a terminal page of the system, obtaining cached encrypted login data based on a token of a terminal entry address.
In this embodiment, as described in the background art, the SaaS system generally uses a system to log in, menu, and authority management to maintain authority data of the whole system, so that different templates and different systems cannot share the same data, and a user needs to separately maintain a user entry when entering different systems, which results in low development efficiency and easy and similar problems to take multiple times to solve. Therefore, in the present solution, a multi-terminal rights management method is provided to solve the above-mentioned problems.
When entering a terminal page, the obtaining terminal obtains cached encrypted login data based on token at an entry address, so that user information leakage is prevented, current user history login information can be prevented from being broken, a unified authentication mode of each terminal and a corresponding entry address are defined by special personnel configuration in different terminals, wherein the authentication mode supports an authorization code mode, an authorization code simple mode, a password authorization mode and a client mode, and when entering the terminal page, the special encrypted login data of the terminal is firstly obtained.
In order to obtain encrypted login data, in some embodiments of the present application, before obtaining cached encrypted login data based on a token of a terminal entry address, the method further includes:
and configuring the association relation between the menu items and the terminals, the opening mode of the menu items and the positioning mode of pages corresponding to the menu items.
Specifically, the developer maintains and configures the fusion menu and menu items, including the association relation between the menu items and each system, the opening mode (jump or new creation) of the menu items, and the positioning mode (route or relative address or absolute address) of the pages corresponding to the menu items, where the specific configuration mode is not limited, and the corresponding relation is preset, so that the subsequent authentication and the determination of the authority data of the user are facilitated.
In order to obtain encrypted login data, in some embodiments of the present application, the token based on the terminal entry address obtains cached encrypted login data, which specifically includes:
judging whether the token exists at the terminal entry address or not;
if yes, checking the token and acquiring the cached encrypted login data;
if not, the terminal page jumps to a preset unified login page to log in.
When entering a terminal page, acquiring the cached encrypted login data of the terminal at an entry address based on token, judging whether the token exists at the entry address of the terminal or not because the token does not exist possibly, if the token does not exist, turning the page to a unified login page, logging in the unified login page after the failure of the verification, uniformly entering the login address and attaching a current jump link to the condition that the login address is not logged in or the login information is invalid, generally, developing a set of login authentication mode for each terminal, and if the terminals are very many, adopting a unified authentication mode, namely not needing to develop authentication for each terminal, enabling a user to enter different terminals by using the same login address in a uniformly configured mode, checking the token, and acquiring the cached encrypted login data.
In order to obtain encrypted login data, in some embodiments of the present application, the token is checked, and the cached encrypted login data is obtained, which specifically includes:
when the token is checked to pass, obtaining the cached encrypted login data;
and when the token check fails, the terminal page jumps to a preset unified login page.
Specifically, whether the token is successfully checked is also required to be checked, if the check fails, the page is transferred to a unified login page to log in, and if the check succeeds, encrypted login data of the user is obtained.
Step S102, entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage.
In this embodiment, after the encrypted login data is obtained, the login page corresponding to the terminal is further entered according to the dynamic routing data in the encrypted login data and the routing data in the session storage, and the login process and the login steps are different according to the difference between the dynamic routing data and the routing data in the session storage.
In order to enter a login page corresponding to the terminal, in some embodiments of the present application, the entry page corresponding to the terminal is entered based on the dynamic routing data in the encrypted login data and the routing data in the session storage, specifically:
judging whether dynamic routing data in the encrypted login data exists or not;
if yes, the user directly jumps to enter a successful login page of the terminal through the page of the terminal;
if not, entering a login page corresponding to the terminal based on the routing data in the session storage. In this embodiment, first, whether dynamic routing data in the encrypted login data exists is determined, if yes, terminal page skip is performed, the dynamic routing data is stored in the session storage, a successful login page of the terminal is entered, corresponding permission is displayed to a user, and if not, the user needs to enter a login page corresponding to the terminal further based on the routing data in the session storage.
In order to enter a login page corresponding to the terminal, in some embodiments of the present application, the entering the login page corresponding to the terminal based on the routing data in the session storage is specifically:
if the route data in the session storage exists, creating the dynamic route data according to diff algorithm, storing the dynamic route data in the session storage, and entering a successful page of terminal login;
and if the routing data in the session storage does not exist, the terminal page jumps to a preset unified login page to log in.
Specifically, if the routing data in the session storage exists, the dynamic routing data is created according to diff algorithm, and the dynamic routing data is stored in the session storage and enters a successful page of terminal login.
The cost of rendering the real DOM is large, sometimes we modify some data, and rendering directly onto the real DOM causes redrawing and rearrangement of the whole DOM tree. We want to update only the small block dom that we modified, instead of the whole dom, diff algorithm helps us achieve this. The essence of the diff algorithm is: the difference between the two objects is found out in order to make the node multiplexing as possible. The object referred to herein is simply virtual dom tree in vue, i.e., js object is used to represent the dom structure in a page.
If the route data in the session storage does not exist either, the terminal page jumps to a preset unified login page for login, the unified login page is equivalent to a guest page or logs in after verification failure, a login address is unified for the condition that login information fails or login addresses are attached to current jump links, and generally, a set of login authentication mode needs to be developed for each terminal under the condition that the terminals are very many, and for the condition that the terminals do not need to develop authentication, a user can enter different terminals by using the same login address through a unified configuration mode, if the login address exists, the token is verified, and the cached encrypted login data is acquired.
To create the dynamic routing data, in some embodiments of the present application, the dynamic routing data is created according to a diff algorithm, specifically:
screening menu information which can be accessed by a current user from a local menu according to code codes through diff algorithm;
matching authority data of the user through the accessible menu information;
each authority data is generated into corresponding dynamic routing data, so that the current user can only access the configured address data, and the other addresses are uniformly redirected to 404 pages.
Specifically, screening menu information which can be accessed by a current user from a local menu according to code codes through diff algorithm; matching authority data of the user through the accessible menu information; and generating corresponding dynamic routing data for each authority data so that the current user can only access the configured address data, uniformly redirecting other addresses to a 404 page, and displaying an interface and an authority button corresponding to the authority data to the user after entering a login success page.
In order to match the authority data of the user, in some embodiments of the present application, the authority data of the user is matched through the accessible menu information, specifically:
flattening the authority tree transmitted by the background;
placing each node in the background tree into a temp object;
traversing the front-end routing tree by depth priority, and then filtering out the routing node corresponding to the authority data of the user by judging whether the current node exists in the temp object.
Specifically, flattening the authority tree transmitted from the background; placing each node in the background tree into a temp object; traversing the front-end routing tree by depth priority, and then filtering out the routing node corresponding to the authority data of the user by judging whether the current node exists in the temp object.
Step S103, storing the dynamic routing data into the session storage, and entering a terminal login success page.
And performing terminal page skip, storing the dynamic routing data into the session storage, and entering a terminal login success page.
In some embodiments of the present application, the method further comprises:
and after entering the successful login page of the terminal, acquiring the authority data of the current page through a preset instruction.
Specifically, after entering a successful login page of the terminal, acquiring the permission data of the current page through a preset instruction, and displaying an interface or permission buttons and the like corresponding to the permission data to a user.
By applying the technical scheme, after entering a terminal page of the system, the encrypted login data of the cache is obtained based on a token of a terminal entry address; entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage; and storing the dynamic routing data into the session storage and entering a successful login page of the terminal, thereby solving the problem of different standard specifications of menu components, menu items, authentication modes and authority control under the multi-terminal environment of the SaaS system, improving the menu fusion efficiency and reducing the cost.
In order to further explain the technical idea of the invention, the technical scheme of the invention is described with specific application scenarios.
The embodiment of the application also provides a multi-terminal authority management device, as shown in fig. 2, which comprises:
an obtaining module 201, configured to obtain cached encrypted login data based on a token of a terminal entry address after entering a terminal page of the system;
the first login module 202 is configured to enter a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage;
and the second login module 203 is configured to store the dynamic routing data in the session storage and enter a terminal login success page.
By applying the technical scheme, after entering a terminal page of the system, the encrypted login data of the cache is obtained based on a token of a terminal entry address; entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage; and storing the dynamic routing data into the session storage and entering a successful login page of the terminal, thereby solving the problem of different standard specifications of menu components, menu items, authentication modes and authority control under the multi-terminal environment of the SaaS system, improving the menu fusion efficiency and reducing the cost.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, one of ordinary skill in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not drive the essence of the corresponding technical solutions to depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (8)

1. The multi-terminal authority management method is characterized by being applied to a software-service SaaS system, and comprises the following steps:
after entering a terminal page of the system, obtaining cached encrypted login data based on a token of a terminal entry address;
entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage;
storing the dynamic routing data into the session storage, and entering a successful login page of a terminal;
the method comprises the steps of entering a login page corresponding to the terminal based on dynamic routing data in the encrypted login data and routing data in session storage, wherein the login page specifically comprises the following steps:
judging whether dynamic routing data in the encrypted login data exists or not;
if yes, the user directly jumps to enter a successful login page of the terminal through the page of the terminal;
if not, entering a login page corresponding to the terminal based on the routing data in the session storage;
the method comprises the steps of entering a login page corresponding to the terminal based on routing data in session storage, wherein the login page specifically comprises the following steps:
if the route data in the session storage exists, creating the dynamic route data according to diff algorithm, storing the dynamic route data in the session storage, and entering a successful page of terminal login;
and if the routing data in the session storage does not exist, the terminal page jumps to a preset unified login page to log in.
2. The method of claim 1, further comprising, prior to obtaining the cached encrypted login data based on the token of the terminal entry address:
and configuring the association relation between the menu items and the terminals, the opening mode of the menu items and the positioning mode of pages corresponding to the menu items.
3. The method of claim 1, wherein the cached encrypted login data is obtained based on a token of a terminal entry address, specifically:
judging whether the token exists at the terminal entry address or not;
if yes, checking the token and acquiring the cached encrypted login data;
if not, the terminal page jumps to a preset unified login page to log in.
4. The method of claim 3, wherein the token is verified and the cached encrypted login data is obtained, in particular:
when the token is checked to pass, obtaining the cached encrypted login data;
and when the token check fails, the terminal page jumps to a preset unified login page.
5. The method according to claim 1, wherein the dynamic routing data is created according to a diff algorithm, in particular:
screening the menu information which can be accessed by the current user from the local menu according to the code through diff algorithm;
matching authority data of the user through the accessible menu information;
each authority data is generated into corresponding dynamic routing data, so that the current user can only access the configured address data, and the other addresses are uniformly redirected to 404 pages.
6. The method according to claim 5, wherein rights data of the user are matched by the accessible menu information, in particular:
flattening the authority tree transmitted by the background;
placing each node in the background tree into a temp object, wherein the temp object is a temporary object;
traversing the front-end routing tree by depth priority, and then filtering out the routing node corresponding to the authority data of the user by judging whether the current node exists in the temp object.
7. The method of claim 1, wherein the method further comprises:
and after entering the successful login page of the terminal, acquiring the authority data of the current page through a preset instruction.
8. A multi-terminal rights management device, the device comprising:
the acquisition module is used for acquiring cached encrypted login data based on a token of a terminal entry address after entering a terminal page of the system;
the first login module is used for entering a login page corresponding to the terminal based on the dynamic routing data in the encrypted login data and the routing data in the session storage;
the second login module is used for storing the dynamic routing data into the session storage and entering a successful login page of the terminal;
the second login module is specifically configured to:
judging whether dynamic routing data in the encrypted login data exists or not;
if yes, the user directly jumps to enter a successful login page of the terminal through the page of the terminal;
if not, entering a login page corresponding to the terminal based on the routing data in the session storage;
wherein, the second login module is further configured to:
if the route data in the session storage exists, creating the dynamic route data according to diff algorithm, storing the dynamic route data in the session storage, and entering a successful page of terminal login;
and if the routing data in the session storage does not exist, the terminal page jumps to a preset unified login page to log in.
CN202111057388.5A 2021-09-09 2021-09-09 Multi-terminal authority management method and equipment Active CN113922986B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111057388.5A CN113922986B (en) 2021-09-09 2021-09-09 Multi-terminal authority management method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111057388.5A CN113922986B (en) 2021-09-09 2021-09-09 Multi-terminal authority management method and equipment

Publications (2)

Publication Number Publication Date
CN113922986A CN113922986A (en) 2022-01-11
CN113922986B true CN113922986B (en) 2024-02-09

Family

ID=79234303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111057388.5A Active CN113922986B (en) 2021-09-09 2021-09-09 Multi-terminal authority management method and equipment

Country Status (1)

Country Link
CN (1) CN113922986B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051631A (en) * 2012-12-21 2013-04-17 国云科技股份有限公司 Unified security authentication method for PaaS (Platform as a Service) platform and SaaS (Software as a Service) application system
CN105430102A (en) * 2015-12-28 2016-03-23 东软集团股份有限公司 Integration method and system of SaaS (Software as a Service) website and third-party system and device thereof
WO2021017128A1 (en) * 2019-07-29 2021-02-04 深圳壹账通智能科技有限公司 Login token generation method and apparatus, login token verification method and apparatus, and server
CN112507320A (en) * 2020-12-10 2021-03-16 东莞市盟大塑化科技有限公司 Access control method, device, system, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051631A (en) * 2012-12-21 2013-04-17 国云科技股份有限公司 Unified security authentication method for PaaS (Platform as a Service) platform and SaaS (Software as a Service) application system
CN105430102A (en) * 2015-12-28 2016-03-23 东软集团股份有限公司 Integration method and system of SaaS (Software as a Service) website and third-party system and device thereof
WO2021017128A1 (en) * 2019-07-29 2021-02-04 深圳壹账通智能科技有限公司 Login token generation method and apparatus, login token verification method and apparatus, and server
CN112507320A (en) * 2020-12-10 2021-03-16 东莞市盟大塑化科技有限公司 Access control method, device, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113922986A (en) 2022-01-11

Similar Documents

Publication Publication Date Title
CN106612290B (en) Cross-domain single sign-on method oriented to system integration
US10320776B2 (en) Protection of application passwords using a secure proxy
EP3511821A1 (en) Method and system for managing access to artifacts in a cloud computing environment
KR102080156B1 (en) Auto Recharge System, Method and Server
CN108289098A (en) Right management method and device, server, the medium of distributed file system
CN112528262A (en) Application program access method, device, medium and electronic equipment based on token
JP6967074B2 (en) Protecting your web server from malicious client applications
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
US20220253297A1 (en) Automated deployment of changes to applications on a cloud computing platform
US20200233699A1 (en) Platform-based change management
US20180324174A1 (en) Saml sso ux improvements
CN110221949A (en) Automate operation management method, apparatus, equipment and readable storage medium storing program for executing
CN102945337A (en) On-line self-help management method and system of Subversion user password
CN106254319A (en) A kind of light application log-in control method and device
CN111200593A (en) Application login method and device and electronic equipment
CN110324209A (en) Micro services system monitoring method, apparatus, electronic equipment and computer-readable medium
US11170080B2 (en) Enforcing primary and secondary authorization controls using change control record identifier and information
CN111191200A (en) Page display method and device and electronic equipment
EP3772686A1 (en) Automatic restore for a failed virtual computing session
CN113922986B (en) Multi-terminal authority management method and equipment
CN112491940B (en) Request forwarding method and device of proxy server, storage medium and electronic equipment
US20150121517A1 (en) Bundle-to-bundle authentication in modular systems
CN114553608A (en) Method and device for accessing cloud platform
CN116097259A (en) Computer file metadata segmentation security system
CN112464225A (en) Request processing method, request processing device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant