CN116319832A - Method, terminal and control system for AD domain account asset disaster recovery - Google Patents

Method, terminal and control system for AD domain account asset disaster recovery Download PDF

Info

Publication number
CN116319832A
CN116319832A CN202310257178.3A CN202310257178A CN116319832A CN 116319832 A CN116319832 A CN 116319832A CN 202310257178 A CN202310257178 A CN 202310257178A CN 116319832 A CN116319832 A CN 116319832A
Authority
CN
China
Prior art keywords
asset
account
domain controller
module
domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310257178.3A
Other languages
Chinese (zh)
Inventor
李帅臻
杨常城
李佳峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongan Wangxing Technology Co ltd
Original Assignee
Beijing Zhongan Wangxing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongan Wangxing Technology Co ltd filed Critical Beijing Zhongan Wangxing Technology Co ltd
Priority to CN202310257178.3A priority Critical patent/CN116319832A/en
Publication of CN116319832A publication Critical patent/CN116319832A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The application relates to a method, a terminal and a control system for disaster recovery of account assets in a user AD domain, wherein the method comprises the following steps: an account number asset synchronization request is sent to a domain controller by utilizing an asset synchronization module; according to the account asset synchronization request, the domain controller sends account credentials to an asset synchronization module; the asset synchronization module analyzes the account credentials and then sends analysis results to the asset recovery module; and the asset recovery module backs up the analysis result, and when the domain controller is down, the asset recovery module sends the backup data to the domain controller. Multiple servers with the same configuration are not required to be distributed in the AD domain of the enterprise, so that the requirement and cost for building the disaster recovery system of the AD domain of the enterprise are reduced, and the phenomenon that the AD and account asset information cannot be recovered in time when the servers are down can be prevented.

Description

Method, terminal and control system for AD domain account asset disaster recovery
Technical Field
The disclosure relates to the technical field of disaster recovery, in particular to a method, a terminal and a control system for disaster recovery of an AD domain account asset.
Background
In order to realize continuous management of enterprise business, the construction of disaster recovery systems is important to avoid economic loss caused by disaster to the maximum extent. Specifically, in an enterprise AD (Active Directory) domain, a disaster recovery system generally includes a plurality of servers, where each server has the same function and is provided with the same configuration. When the main server fails, the service can be continuously provided by switching to other servers, so that the service can be recovered as soon as possible when the disaster occurs, and the key data and the system are protected.
Because a plurality of servers are possible to be down at the same time, the phenomenon that AD and account asset information cannot be recovered in time is easy to occur, and the cost required by the plurality of servers is high.
Disclosure of Invention
In order to solve the above problems, the application provides a method, a terminal and a control system for disaster recovery of an account number asset in an AD domain, so as to solve the above problems.
In a first aspect of the present application, a method for disaster recovery of account assets in an AD domain is provided, including the following steps:
an account number asset synchronization request is sent to a domain controller by utilizing an asset synchronization module;
according to the account asset synchronization request, the domain controller sends account credentials to the asset synchronization module;
the asset synchronization module analyzes the account credentials and then sends analysis results to an asset recovery module;
and the asset recovery module backs up the analysis result, and when the domain controller is down, the asset recovery module sends backup data to the domain controller.
As an optional embodiment of the present application, optionally, sending, by the asset synchronization module, an account asset synchronization request to the domain controller includes:
presetting an RPC protocol;
and the asset synchronization module sends an account asset synchronization request to the domain controller through the RPC protocol, and waits for the response of the domain controller.
As an optional embodiment of the present application, optionally, the asset synchronization request includes a user name to be synchronized, a user attribute to be returned, and a returned message version.
As an optional embodiment of the present application, optionally, according to the account asset synchronization request, the domain controller sends account credentials to the asset synchronization module, including:
the domain controller receives the account asset synchronization request and checks a message version in the account asset synchronization request;
after the inspection is completed, constructing a corresponding structure body according to the message version;
and the domain controller inquires account credentials according to the user name to be synchronized and the user attribute to be returned in the asset synchronization request, and sends the account credentials to an asset synchronization module.
As an optional embodiment of the present application, optionally, after the asset synchronization module parses the account credential, the sending the parsing result to an asset recovery module includes:
the asset synchronization module receives the response of the domain controller and obtains account credentials;
after analyzing the account credentials, extracting a user password field;
and sending the user password field to the asset recovery module.
As an optional embodiment of the present application, optionally, the asset recovery module backs up the parsing result, and when the domain controller is down, sends backup data to the domain controller through the asset recovery module, including:
the asset recovery module receives the analysis result and then locally performs backup to obtain backup data;
and when the domain controller is down, the asset recovery module sends the backup data to the domain controller to realize the import of the backup account number asset.
As an optional embodiment of the present application, optionally, before sending the account number asset synchronization request to the domain controller by using the asset synchronization module, the method further includes:
and receiving a modification request of user account information by using an authentication module, synchronizing the modification request to the domain controller, and backing up a modified result to the asset recovery module.
In a second aspect of the present application, a terminal is provided, configured to implement a method for disaster recovery of an account number asset in an AD domain according to any one of the foregoing embodiments, where the method includes:
the asset synchronization module is configured to send an asset synchronization request to the domain controller, receive account credentials sent by the domain controller, analyze the account credentials and send analysis results to the asset recovery module;
and the asset recovery module is configured to backup the analysis result and send backup data to the domain controller when the domain controller is down.
As an optional embodiment of the present application, optionally, further comprising:
and the authentication module is configured to receive a modification request of user account information, synchronize the modification request to the domain controller and back up a modified result to the asset recovery module.
In a third aspect of the present application, there is provided a control system comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method for AD domain account number asset disaster recovery of any of the above when executing the executable instructions.
The invention has the technical effects that:
according to the method and the device, the account number assets stored in the domain controller are acquired through the asset synchronization module, the account number assets are backed up to the asset recovery module, when the domain controller is down or other faults occur, the backed up account number assets can be reintroduced into the domain controller through the asset recovery module, AD and account number asset information can be recovered, a plurality of servers with the same configuration are not required to be distributed in an AD domain of an enterprise, the requirements and the cost of building the AD domain disaster recovery system of the enterprise are reduced, and meanwhile, the phenomenon that the AD and the account number asset information cannot be recovered in time when the server is down can be prevented. Specifically, the asset synchronization module is responsible for communicating with the domain controller, sending an account asset synchronization request to the domain controller, and the domain controller responds to the asset synchronization module according to the account asset synchronization request and sends account credentials to the domain controller. After the account credentials are received by the asset synchronization module, the account credentials need to be analyzed, and the analyzed results are sent to the asset recovery module for backup, so that backup data can be reintroduced into the domain controller when the domain controller is down, and the enterprise AD and account asset information can be recovered in time. According to the method, no additional newly-built server is needed, and the cost of purchasing equipment, configuring a system, testing the system and training personnel is greatly reduced.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features and aspects of the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating a method of the present invention for AD domain account asset disaster recovery;
fig. 2 shows a schematic flow chart of an implementation of the method for AD domain account number asset disaster recovery according to the present invention.
Detailed Description
Various exemplary embodiments, features and aspects of the disclosure will be described in detail below with reference to the drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In addition, numerous specific details are set forth in the following detailed description in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements, and circuits well known to those skilled in the art have not been described in detail in order not to obscure the present disclosure.
Example 1
As shown in fig. 1 and fig. 2, in a first aspect of the present application, a method for disaster recovery of an AD domain account asset is provided, including the following steps:
s100, an account asset synchronization request is sent to a domain controller by utilizing an asset synchronization module;
s200, according to the account asset synchronization request, the domain controller sends account credentials to the asset synchronization module;
s300, after the account credentials are analyzed by the asset synchronization module, an analysis result is sent to an asset recovery module;
and S400, the asset recovery module backs up the analysis result, and when the domain controller is down, the asset recovery module sends the backup data to the domain controller.
In this embodiment, the account number asset stored in the domain controller is acquired through the asset synchronization module, the account number asset is backed up to the asset recovery module, when the domain controller is down or other faults occur, the backed up account number asset can be reintroduced into the domain controller through the asset recovery module to recover the AD and account number asset information, a plurality of servers with the same configuration are not required to be distributed in the AD domain of the enterprise, the requirement and cost for building the AD domain disaster recovery system by the enterprise are reduced, and meanwhile, the phenomenon that the AD and account number asset information cannot be recovered in time when the server is down can be prevented. Specifically, the asset synchronization module is responsible for communicating with the domain controller, sending an account asset synchronization request to the domain controller, and synchronizing user assets in the domain within each detection period to ensure that detection is not missed, and it is noted that the detection period can be set by an enterprise according to construction requirements, and is not limited. The domain controller responds to the asset synchronization module according to the account asset synchronization request and sends account credentials to the asset synchronization module, wherein the asset synchronization module and the domain controller perform asset synchronization through RPC (Remote Procedure Call, remote procedure call protocol) to achieve the purpose of account asset synchronization. Further, after the account credentials are received by the asset synchronization module, the account credentials need to be analyzed, and the analyzed results are sent to the asset recovery module to be backed up, so that backup data can be reintroduced into the domain controller when the domain controller is down, and the enterprise AD and account asset information can be recovered in time. According to the method, no additional newly-built server is needed, and the cost of purchasing equipment, configuring a system, testing the system and training personnel is greatly reduced.
As an optional embodiment of the present application, optionally, sending, by the asset synchronization module, an account asset synchronization request to the domain controller includes:
presetting an RPC protocol;
and the asset synchronization module sends an account asset synchronization request to the domain controller through the RPC protocol, and waits for the response of the domain controller.
Further, the asset synchronization request includes a user name to be synchronized, a user attribute to be returned, and a returned message version.
In this embodiment, the communication between the asset synchronization module and the domain controller is implemented by using the RPC protocol, so as to achieve the purpose of synchronizing the account asset stored in the domain controller. Specifically, an asset synchronization module sends an account asset synchronization request to a domain controller through an RPC protocol, wherein the asset synchronization request comprises a user name request to be synchronized and a user attribute request to be returned, the domain controller acquires the user name requested by the asset synchronization module according to the request, and after inquiring according to the designated user name, the domain controller returns an inquiry result to the asset synchronization module to realize the demand response to the asset synchronization module.
As an optional embodiment of the present application, optionally, according to the account asset synchronization request, the domain controller sends account credentials to the asset synchronization module, including:
the domain controller receives the account asset synchronization request and checks a message version in the account asset synchronization request;
for example, a set of response messages supported by the domain controller is predefined within the domain controller: REPL_MSG_V7, REPL_MSG_V8, REPL_MSG_V9, when the asset synchronization module sets RPC function input parameter to 9, the domain controller constructs a response structure body REPL_MSG_V9 according to the read request pdwOutVersion parameter;
and the domain controller inquires account credentials according to the user name to be synchronized and the user attribute to be returned in the asset synchronization request, and sends the account credentials to an asset synchronization module.
In this embodiment, the account asset synchronization request further includes a returned message version, after the domain controller receives the asset account synchronization request sent by the asset synchronization module, the domain controller first needs to check the message version in the synchronization request, determines the message version to be returned, and then queries the password and other attributes according to the user name to be synchronized and the user attribute to be returned specified in the account asset synchronization request, so that the asset synchronization module can obtain the account credentials stored in the domain controller.
As an optional embodiment of the present application, optionally, after the asset synchronization module parses the account credential, the sending the parsing result to an asset recovery module includes:
the asset synchronization module receives the response of the domain controller and obtains account credentials;
after analyzing the account credentials, extracting a user password field;
and sending the user password field to the asset recovery module.
In this embodiment, after the asset synchronization module receives the account credential sent by the domain controller, the account credential needs to be parsed, and the user password field extracted by parsing are sent to the asset recovery module for local backup.
As an optional embodiment of the present application, optionally, the asset recovery module backs up the parsing result, and when the domain controller is down, sends backup data to the domain controller through the asset recovery module, including:
the asset recovery module receives the analysis result and then locally performs backup to obtain backup data;
and when the domain controller is down, the asset recovery module sends the backup data to the domain controller to realize the import of the backup account number asset.
In this embodiment, the asset synchronization module sends the resolved result to the asset recovery module, and the asset recovery module performs backup locally, so that when the domain controller is down, the locally backed-up account asset can be reintroduced into the domain controller through the asset recovery module, thereby ensuring that the service can be recovered as soon as possible.
As an optional embodiment of the present application, optionally, before sending the account number asset synchronization request to the domain controller by using the asset synchronization module, the method further includes:
and receiving a modification request of user account information by using an authentication module, synchronizing the modification request to the domain controller, and backing up a modified result to the asset recovery module.
In this embodiment, when the user modifies account information, the authentication module is used to synchronize the modification request to the domain controller. Specifically, in the process of modifying account information, a user inputs modified content in an authentication module, the authentication module communicates with a domain controller through an LDAP protocol and a SAMR protocol, synchronizes a modification request to the domain controller, and simultaneously backs up a modified result in an asset recovery module. The domain controller is an authentication server in the AD domain and is responsible for managing and authenticating the user credentials in the domain, and when the user needs to modify account information, the authentication module indirectly authenticates the domain controller, so that frequent authentication requests are prevented from being sent to the domain controller, and the pressure of the domain controller is effectively relieved.
It should be noted that, although the RPC protocol is described above as an example, those skilled in the art will appreciate that the present disclosure should not be limited thereto. In fact, the user can flexibly set according to the actual application scene, and can synchronize through other protocols, so long as the technical functions of the application can be realized according to the technical method.
It should be apparent to those skilled in the art that the implementation of all or part of the above-described embodiments of the method may be implemented by a computer program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, and the program may include the steps of the embodiments of the control methods described above when executed.
It will be appreciated by those skilled in the art that implementing all or part of the above-described embodiment methods may be implemented by a computer program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, and the program may include the embodiment flow of each control method as described above when executed. The storage medium may be a magnetic disk, an optical disc, a Read-only memory (ROM), a random access memory (RandomAccessMemory, RAM), a flash memory (flash memory), a hard disk (HDD), or a Solid State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
Example 2
Based on the implementation principles of embodiment 1, in a second aspect of the present application, a terminal is provided, configured to implement a method for AD domain account asset disaster recovery as set forth in any one of the foregoing, where the method includes:
the asset synchronization module is configured to send an asset synchronization request to the domain controller, receive account credentials sent by the domain controller, analyze the account credentials and send analysis results to the asset recovery module;
and the asset recovery module is configured to backup the analysis result and send backup data to the domain controller when the domain controller is down.
Further, the method further comprises the following steps:
and the authentication module is configured to receive a modification request of user account information, synchronize the modification request to the domain controller and back up a modified result to the asset recovery module.
The application provides a terminal for realizing the asset disaster recovery method, which specifically comprises an asset synchronization module and an asset recovery module, wherein the asset synchronization module is configured to send an asset synchronization request to a domain controller, receive account credentials sent by the domain controller, analyze the account credentials and send analysis results to the asset recovery module, and the asset synchronization module is configured to backup analysis results and send backup data to the domain controller when the domain controller is down. It should be noted that, the terminal of the application realizes the purpose of backing up the resource credentials in the domain controller through the cooperation of the asset synchronization module and the asset recovery module, so that the backed up credentials are reintroduced into the domain controller when the domain controller is down, a plurality of servers are not required to be distributed in the domain for disaster recovery construction, the phenomenon that AD and account information cannot be recovered due to the fact that the multi-server is down can be prevented, the purpose of backing up the account asset can be realized only by installing the terminal of the application, and the requirement and cost for building an AD domain disaster recovery system by enterprises are reduced. Meanwhile, the asset synchronization module and the asset recovery module can synchronize user assets in the domain in each detection period, and detection omission is avoided. Furthermore, when the user modifies account information, the authentication module inputs modified content, and the authentication module communicates with the domain controller through the LDAP protocol and the SAMR protocol to synchronize the modification request to the domain controller, so that frequent sending of authentication requests to the domain controller is avoided, and the pressure of the domain controller can be effectively relieved.
The modules or steps of the invention described above may be implemented in a general-purpose computing device, they may be centralized in a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by a computing device, such that they may be stored in a memory device and executed by a computing device, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Example 3
Still further, a third aspect of the present application provides a control system, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method for AD domain account number asset disaster recovery of any of the above when executing the executable instructions.
Embodiments of the present disclosure control a system that includes a processor and a memory for storing processor-executable instructions. Wherein the processor is configured to implement any of the methods for AD domain account number asset disaster recovery described above when executing the executable instructions.
Here, it should be noted that the number of processors may be one or more. Meanwhile, in the control system of the embodiment of the present disclosure, an input device and an output device may be further included. The processor, the memory, the input device, and the output device may be connected by a bus, or may be connected by other means, which is not specifically limited herein.
The memory is a computer-readable storage medium that can be used to store software programs, computer-executable programs, and various modules, such as: a program or a module corresponding to a method for disaster recovery of an account number asset in an AD domain in an embodiment of the disclosure. The processor executes various functional applications and data processing of the control system by running software programs or modules stored in the memory.
The input device may be used to receive an input number or signal. Wherein the signal may be a key signal generated in connection with user settings of the device/terminal/server and function control. The output means may comprise a display device such as a display screen.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvement of the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. A method for disaster recovery of an AD domain account asset, comprising the steps of:
an account number asset synchronization request is sent to a domain controller by utilizing an asset synchronization module;
according to the account asset synchronization request, the domain controller sends account credentials to the asset synchronization module;
after the account credentials are analyzed by the asset synchronization module, the analysis result is sent to the asset recovery module;
and the asset recovery module backs up the analysis result, and when the domain controller is down, the asset recovery module sends backup data to the domain controller.
2. The method for AD domain account asset disaster recovery of claim 1, wherein sending an account asset synchronization request to a domain controller using an asset synchronization module comprises:
presetting an RPC protocol;
and the asset synchronization module sends an account asset synchronization request to the domain controller through the RPC protocol, and waits for the response of the domain controller.
3. The method for AD domain account number asset disaster recovery of claim 2 wherein said asset synchronization request comprises a user name to be synchronized, a user attribute to be returned and a returned message version.
4. A method for AD domain account asset disaster recovery as defined in claim 3, wherein said domain controller sending account credentials to said asset synchronization module in accordance with said account asset synchronization request, comprising:
the domain controller receives the account asset synchronization request and checks a message version in the account asset synchronization request;
after the inspection is completed, constructing a corresponding structure body according to the message version;
and the domain controller inquires account credentials according to the user name to be synchronized and the user attribute to be returned in the asset synchronization request, and sends the account credentials to an asset synchronization module.
5. The method for AD domain account number asset disaster recovery of claim 4 wherein the asset synchronization module, after parsing the account credentials, sends the parsing result to an asset recovery module, comprising:
the asset synchronization module receives the response of the domain controller and obtains account credentials;
after analyzing the account credentials, extracting a user password field;
and sending the user password field to the asset recovery module.
6. The method for disaster recovery of AD domain account number assets according to claim 5, wherein the asset recovery module backs up the parsing result, and when the domain controller is down, sends backup data to the domain controller through the asset recovery module, comprising:
the asset recovery module receives the analysis result and then locally performs backup to obtain backup data;
and when the domain controller is down, the asset recovery module sends the backup data to the domain controller to realize the import of the backup account number asset.
7. The method for AD domain account asset disaster recovery of claim 6, further comprising, prior to sending an account asset synchronization request to a domain controller using an asset synchronization module:
and receiving a modification request of user account information by using an authentication module, synchronizing the modification request to the domain controller, and backing up a modified result to the asset recovery module.
8. A terminal for implementing the method for AD domain account number asset disaster recovery as claimed in any one of claims 1-7, comprising:
the asset synchronization module is configured to send an asset synchronization request to the domain controller, receive account credentials sent by the domain controller, analyze the account credentials and send analysis results to the asset recovery module;
and the asset recovery module is configured to backup the analysis result and send backup data to the domain controller when the domain controller is down.
9. A terminal according to claim 8, further comprising:
and the authentication module is configured to receive a modification request of user account information, synchronize the modification request to the domain controller and back up a modified result to the asset recovery module.
10. A control system, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method for AD domain account number asset provisioning of any of claims 1 to 7 when executing the executable instructions.
CN202310257178.3A 2023-03-08 2023-03-08 Method, terminal and control system for AD domain account asset disaster recovery Pending CN116319832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310257178.3A CN116319832A (en) 2023-03-08 2023-03-08 Method, terminal and control system for AD domain account asset disaster recovery

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310257178.3A CN116319832A (en) 2023-03-08 2023-03-08 Method, terminal and control system for AD domain account asset disaster recovery

Publications (1)

Publication Number Publication Date
CN116319832A true CN116319832A (en) 2023-06-23

Family

ID=86802731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310257178.3A Pending CN116319832A (en) 2023-03-08 2023-03-08 Method, terminal and control system for AD domain account asset disaster recovery

Country Status (1)

Country Link
CN (1) CN116319832A (en)

Similar Documents

Publication Publication Date Title
US20180367610A1 (en) Data storage method and server applicable to distributed server cluster
US20100199127A1 (en) Synchronizing replicas of a database
CN112860451A (en) Multi-tenant data processing method and device based on SaaS
CN111400777B (en) Network storage system, user authentication method, device and equipment
US11429633B2 (en) Data processing system with synchronization of local directory information to cloud system
CN109361525B (en) Method, device, control terminal and medium for restarting distributed deployment of multiple services
CN111277639A (en) Method and device for maintaining data consistency
CN113342547B (en) Remote service calling method and device, electronic equipment and readable storage medium
CN112650812A (en) Data fragment storage method and device, computer equipment and storage medium
CN104954482A (en) Configuration management system and method
CN107872492B (en) Method and device for supporting multi-user editing of data object at server
CN105933379A (en) Business processing method, device and system
CN112039910B (en) Method, system, equipment and medium for unified management of authentication and authority
CN116319832A (en) Method, terminal and control system for AD domain account asset disaster recovery
CN110798358A (en) Distributed service identification method and device, computer readable medium and electronic equipment
CN116016561A (en) Data synchronization method and device
WO2022227719A1 (en) Data backup method and system, and related device
CN115629909A (en) Service data processing method and device, electronic equipment and storage medium
US11290318B2 (en) Disaster recovery of cloud resources
CN110958287A (en) Operation object data synchronization method, device and system
CN111240933B (en) Method, system, device and medium for monitoring performance data of multiple data centers
CN114979234A (en) Session control sharing method and system in distributed cluster system
CN112241332B (en) Interface compensation method and device
CN111787067A (en) Multi-bank-enterprise direct connection remote service calling and managing method
CN111241200A (en) sSQLite database-based main and standby synchronous processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination