CN1744599A - JAAS and AspeclJ based group management system authentication and authority method - Google Patents

JAAS and AspeclJ based group management system authentication and authority method Download PDF

Info

Publication number
CN1744599A
CN1744599A CN 200510044822 CN200510044822A CN1744599A CN 1744599 A CN1744599 A CN 1744599A CN 200510044822 CN200510044822 CN 200510044822 CN 200510044822 A CN200510044822 A CN 200510044822A CN 1744599 A CN1744599 A CN 1744599A
Authority
CN
China
Prior art keywords
authentication
authorization
logic
program
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510044822
Other languages
Chinese (zh)
Other versions
CN1744599B (en
Inventor
李景山
邓必山
王守昊
董小社
伍卫国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Inspur Electronic Information Industry Co Ltd
Original Assignee
Langchao Electronic Information Industry Co Ltd
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Langchao Electronic Information Industry Co Ltd, Xian Jiaotong University filed Critical Langchao Electronic Information Industry Co Ltd
Priority to CN 200510044822 priority Critical patent/CN1744599B/en
Publication of CN1744599A publication Critical patent/CN1744599A/en
Application granted granted Critical
Publication of CN1744599B publication Critical patent/CN1744599B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

In the method, JAAS program separates logic of authentication and authorization from system program. Using AspectJ program compiler interlaces authorization logic with general logic of cluster management system. Using cooperation between JAAS and AspectJ programs implements techniques of authentication and authorization at method level and node level in cluster. The method provides flexible and convenient mechanism to carry out different operations for appointed different users. Separating security logic from management logic of general cluster management system, the method realizes flexible configuration of authentication and authorization. Thus, developing function of general management system is independent from the security mechanism. The invention also solves own security issue of software of management system.

Description

A kind of method of the cluster management system authentication and authorization based on JAAS and AspectJ
1, technical field
The present invention relates to a kind of Computer Applied Technology, the safe practice in the cluster management specifically, or relate to a kind of method of the cluster management system authentication and authorization based on JAAS and AspectJ.
2, background technology
A group of planes is exactly by high performance network or local area network that one sets of computer system (node) is interconnected, the computer cluster system of the high-performance with single system mapping of formation, high available, enhanced scalability, high performance price ratio.Because it is with respect to the high availability of traditional large-scale computer and the advantage of low price, become a kind of popular trend with group of planes structure supercomputer or superserver.But Network of Workstation is loosely organized, node independence is strong, network connect complicated, and, along with the increase of nodal point number, to a group of planes administer and maintain the more and more difficult of change, increased the TCO of system.
In order to administer and maintain Network of Workstation, popular mode is to build one deck operating system software again to manage a whole group of planes on the operating system of each node computer at present, is referred to as PC cluster or is called cluster management system.Cluster management system is the part of Network of Workstation software, almost is in the top layer of systems soft ware, and it plays managerial role to soft, the hardware of a whole group of planes, for the system manager and the end user of a group of planes provides service.Basic characteristics of Network of Workstation are " whole systems present to the user be the reflection of triangular web ", the control support of management system overall processes such as the planning that cluster management comprises on the single control desk a group of planes for the realization of this target should be provided at, installation, configuration, monitoring, regular maintenance, start and close.Cluster management system should provide multi-functional, the easy use of a cover, extendible practicability management tool, helps the keeper to monitor the operating state of a whole group of planes, guarantees efficient, the stable operation of Network of Workstation.
Because management system can be managed soft, the hardware resource of a whole group of planes, when the management system convenience is provided, also increased the risk of system safety aspect, if there is not the administrative mechanism of user's authentication and authorization, the user of management system is the resource of operating system arbitrarily, brings infringement for the safety of system.The management function of a group of planes is abundant unusually, administration order reaches up to a hundred, while is according to user's requirement, may add new management function at any time, new authentication method, change the authority of different user on different node, these flexibilities that require for management system authentication and mandate are very large challenges.
3, summary of the invention
For the method and the closely-coupled problem of management function that exist in the present cluster management about authentication and authorization, problem for the function weave in of the exploitation of Functions of Management System and authentication and authorization, the personnel of development management function need embed the logic of authentication and authorization in the code of oneself, and because the node of group of planes particularity independently, each administration order has different authority problems on different nodes.At the problems referred to above, the present invention proposes a kind of method based on authentication and authorization in the cluster management system of JAAS and AspectJ with the java language development, this method can be utilized the technical characteristic of JAAS and AspectJ, need in common administration order, not embed the authentication and authorization code, just can implementation method rank and other authentication of node level and access control, realized the service logic of management system and the loose couplings of security logic, simplified the development of Management System complexity, demand for security more flexibly is provided.
Purpose of the present invention is put forward a kind of method based on authentication and authorization in the cluster management system of JAAS (Java Authentication AuthorizationService) and AspectJ, this method can be utilized JAAS and AspectJ characteristic, need in common administration order, not embed the authentication and authorization code, just can implementation method rank and other authentication of node level and access control, realized the service logic of management system and the loose couplings of security logic.
Cooperatively interact by JAAS program and AspectJ program the logic of authentication and authorization is separated from system program, and utilize the configuration file configure user authentication and authorization information of JAAS program, and utilize the AspectJ compiler that the generic logic weave in of authorization logic and cluster management system is carried out authentication and authorization to the user, this method may further comprise the steps:
A, JAAS program are that each node in the Network of Workstation is provided with different identifiers respectively, are that accessed system resource is distinguished by unit with node in the Network of Workstation then;
B, JAAS program are that cluster management system setting user is by name unique by the entity of distinguishing authentication with the user, by the software that calls cluster management system the user are carried out distinguishing authentication;
C, the user authentication information that utilizes the JAAS program and authorization message configurability are separated user's authentication and authorization logic variation from the logic of general management system;
D, utilize the technique of compiling of AspectJ program that authorization check is injected in the general operational approach, utilize node sign, user ID and incision method name information to finish execution scope check incision method.
It is that the resource units sign is distinguished resource that the JAAS program is also utilized the node group of forming with some nodes in the Network of Workstation.
Utilize the configuration file configure user of JAAS program the user to be carried out authentication and authorization in the different management function of different node execution, such as: means such as interpolation/deletion user, start/shutdown, network configuration are carried out authentication and authorization to the user.
Context, node title, method name that the JAAS program utilizes the user to login, inspection different user are carried out the authority of different operating the user are carried out authentication and authorization on different node.
Utilize the configuration file of JAAS program to realize multiple authentication method and delegated strategy separating from the general-purpose system programmed logic, promptly not in the logic writing system program of authentication and authorization, but the logic of authentication and authorization is write in the configuration file, read configuration file by system program, according to the authentication and authorization that the requirement of configuration file is correlated with, the coupling of deactivation system management logic and multiple authentication and authorization logic.
The AspectJ program is utilized the programming technique of Aspect Oriented Programming, separate concrete general-purpose system management logic and security logic, the authentication and authorization logic is separated from concrete system management function, removed the coupling of each concrete system management function and Certificate Authority.
4, embodiment
In the method for the invention, utilize the configuration file of JAAS program to realize multiple authentication method and delegated strategy separating from the general-purpose system programmed logic, promptly not in the logic writing system program of authentication and authorization, but the logic of authentication and authorization is write in the configuration file, read configuration file by system program, according to the authentication and authorization that the requirement of configuration file is correlated with, the coupling of deactivation system management logic and multiple authentication and authorization logic.
In the method for the invention, the AspectJ program is utilized the programming technique of Aspect Oriented Programming, separate concrete general-purpose system management logic and security logic, the authentication and authorization logic is separated from concrete system management function, removed the coupling of each concrete system management function and Certificate Authority.
Embodiment
1) in advance for each node in the group of planes is provided with different identifiers respectively, can be machine name, IP address etc., note be nodeName;
2) user of management system is with the unique differentiation of user name in the group of planes, and note is userName
3) utilize JAAS, realize the flexible configuration of authentication and authorization, authentication is confirmed whether validated user of user by checking user password; Authorize, confirm whether the user can carry out associative operation; Concrete configuration is as follows:
A, configure user authentication document, the LoginModule class name that the bright login of document is used, such is used to finish user's certification work, and the configuration of this document meets the policy definition file format of JAAS;
As:
MySecurity{
MyLoginModule?required;
};
This configuration file has defined with MyLoginModule and has been responsible for the authenticated user identity, and such can use the method for various authenticated user, goes to check whether the user can be certified.
B, configure user operating right file, form is as follows:
grant?MyPrincipal″User1″
{
permission?NodePermission″nodeName1″;
permission?NodePermission″nodeName2″;
permission?MethodPermission″void?shutDown(String,
LoginContext)″;
permission?MethodPermission″void?addUser(String,LoginContext)″;
};
This document has been realized at different user (as User1) by the strategy file that JAAS provides, on different node (as nodeName1), has been carried out the purpose of different operating (as shutDown).Defined user User1 from strategy file and can carry out shutDwon (shutdown command) as above at nodeName1 and nodeName2.ShutDown (String, LoginContext) parameter of the String type in is the title of node, as nodeName1, the parameter place of LoginContext type is the login context of login user, is used to preserve user's identity information.
4) utilize definition of AspectJ aspect and AspectJ compiler, the authentication and authorization logic is come out from common management system logical separation, concrete steps are as follows:
A, definition cutting point MyAuthorization, this MyAuthorization is defined as
public?aspect?MyAuthorization
{
// definition cutting point; Node is used to distinguish the user for the title of the node of operation, lc for the context environmental of user's login
pointcut?Authorization(String?node,LoginContextlc)(args(node,lc)&&execution(**(..));
// following the program segment of execution before the method for incision is carried out:
before(String?node,LoginContext?lc):Authorization(node,lc)
{
The name of the method that // acquisition is cut
String methodName
thisJoinPointStaticPart.getSignature().toString();
// login environment, node name and method name according to the user, carry out scope check:
String?methodName=
thisJoinPointStaticPart.getSignature().toString();
Subject.doAsPrivileged(lc.getSubject(),newAuthPrivilegedAction(node,methodName));
}
}
Above code sample, pointcut Authorization place code has been realized the definition of incision method, before (String node, LoginContext lc) locates to have defined and before the method for carrying out incision, carry out the Subject.doAsPrivileged action, whether can carry out this method according to user, node and the checking of method name.
B, this MyAuthorization and relevant general service logic class are utilized the compiling of AspectJ compiler, authentication logic is interweaved in general service logic.
Utilize the crosscut technology of AspectJ, by a and two steps of b, we needn't be as embedding Subject.doAsPrivileged (lc.getSubject () in concrete service logic in the shutDown method, newAuthPrivilegedAction (node, methodName)) such authorization code, can indicate the title of the method that we will cut by definition aspect MyAuthorization, utilize authorization logic the AspectJ compiler to be injected into and to carry out in the method for authorization logic.
Precondition is, is injected into the title that will comprise the node of String type in the parameter of method, is used for importing into the node title, checks the authority whether manner of execution on this node is arranged; The parameter of LoginContext type is used for passing to the context environmental that the authorization check function provides user's login.
By technical scheme of the present invention as seen, the present invention utilizes JAAS and AspectJ technology to realize a kind of authentication and authorization method at cluster management system.This method utilizes JAAS to realize the flexible configuration in method rank and node level security of authentication and authorization.Utilize AspectJ to realize general management logic and security logic loose couplings, can be implemented in the convenient authorization check that adds in the general management method, solved the authentication and authorization problem of cluster management system self well.

Claims (6)

1, a kind of method of the cluster management system authentication and authorization based on JAAS and AspectJ program, it is characterized in that cooperatively interacting the logic of authentication and authorization is separated from system program by JAAS program and AspectJ program, and utilize the configuration file configure user authentication and authorization information of JAAS program, and utilize the AspectJ compiler that the generic logic weave in of authorization logic and cluster management system is carried out authentication and authorization to the user, this method may further comprise the steps:
A, JAAS program are that each node in the Network of Workstation is provided with different identifiers respectively, are that accessed system resource is distinguished by unit with node in the Network of Workstation then;
B, JAAS program are that cluster management system setting user is by name unique by the entity of distinguishing authentication with the user, by the software that calls cluster management system the user are carried out distinguishing authentication;
C, the user authentication information that utilizes the JAAS program and authorization message configurability are separated user's authentication and authorization logic variation from the logic of general management system;
D, utilize the technique of compiling of AspectJ program that authorization check is injected in the general operational approach, utilize node sign, user ID and incision method name information to finish execution scope check incision method.
2, authentication and authorization method as claimed in claim 1, it is characterized in that it is that the resource units sign is distinguished resource that the JAAS program is also utilized the node group of forming with some nodes in the Network of Workstation.
3, authentication and authorization method as claimed in claim 1, it is characterized in that utilizing the configuration file configure user of JAAS program the user to be carried out authentication and authorization in the different management function of different node execution, such as: means such as interpolation/deletion user, start/shutdown, network configuration are carried out authentication and authorization to the user.
4, authentication and authorization method as claimed in claim 1, it is characterized in that: context, node title, method name that the JAAS program utilizes the user to login, inspection different user are carried out the authority of different operating the user are carried out authentication and authorization on different node.
5, authentication and authorization method as claimed in claim 1, it is characterized in that utilizing the configuration file of JAAS program to realize multiple authentication method and delegated strategy separating from the general-purpose system programmed logic, promptly not in the logic writing system program of authentication and authorization, but the logic of authentication and authorization is write in the configuration file, read configuration file by system program, according to the authentication and authorization that the requirement of configuration file is correlated with, the coupling of deactivation system management logic and multiple authentication and authorization logic.
6, authentication and authorization method as claimed in claim 1, it is characterized in that the AspectJ program utilizes the programming technique of Aspect Oriented Programming, separate concrete general-purpose system management logic and security logic, the authentication and authorization logic is separated from concrete system management function, removed the coupling of each concrete system management function and Certificate Authority.
CN 200510044822 2005-09-27 2005-09-27 JAAS and AspeclJ based group management system authentication and authority method Expired - Fee Related CN1744599B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510044822 CN1744599B (en) 2005-09-27 2005-09-27 JAAS and AspeclJ based group management system authentication and authority method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510044822 CN1744599B (en) 2005-09-27 2005-09-27 JAAS and AspeclJ based group management system authentication and authority method

Publications (2)

Publication Number Publication Date
CN1744599A true CN1744599A (en) 2006-03-08
CN1744599B CN1744599B (en) 2010-04-28

Family

ID=36139793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510044822 Expired - Fee Related CN1744599B (en) 2005-09-27 2005-09-27 JAAS and AspeclJ based group management system authentication and authority method

Country Status (1)

Country Link
CN (1) CN1744599B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100409626C (en) * 2006-10-09 2008-08-06 西安交通大学 Warning method in large size cluster management monitor system based on AOP technology
CN103841117A (en) * 2014-03-21 2014-06-04 北京京东尚科信息技术有限公司 JAAS login method and server based on Cookie mechanism

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7089584B1 (en) * 2000-05-24 2006-08-08 Sun Microsystems, Inc. Security architecture for integration of enterprise information system with J2EE platform
CN1189822C (en) * 2001-11-07 2005-02-16 华为技术有限公司 Abnormal logic business simulating test device
US7610618B2 (en) * 2003-02-24 2009-10-27 Bea Systems, Inc. System and method for authenticating a subject
US7313820B2 (en) * 2003-12-29 2007-12-25 International Business Machines Corporation Method and system for providing an authorization framework for applications

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100409626C (en) * 2006-10-09 2008-08-06 西安交通大学 Warning method in large size cluster management monitor system based on AOP technology
CN103841117A (en) * 2014-03-21 2014-06-04 北京京东尚科信息技术有限公司 JAAS login method and server based on Cookie mechanism
CN103841117B (en) * 2014-03-21 2017-06-06 北京京东尚科信息技术有限公司 A kind of JAAS login methods and server based on Cookie mechanism

Also Published As

Publication number Publication date
CN1744599B (en) 2010-04-28

Similar Documents

Publication Publication Date Title
US7823186B2 (en) System and method for applying security policies on multiple assembly caches
US10104053B2 (en) System and method for providing annotated service blueprints in an intelligent workload management system
CN1320483C (en) System and method for implementing journaling in a multi-node environment
JP5356221B2 (en) Convert role-based access control policies to resource authorization policies
US7908610B2 (en) Multi-threaded business programming library
US20100220584A1 (en) Systems and methods for automatically generating system restoration order for network recovery
US20100223608A1 (en) Systems and methods for generating reverse installation file for network restoration
US20070005956A1 (en) Remote certificate management
CN113114498A (en) Architecture system of trusted block chain service platform and construction method thereof
CN101739282B (en) Method, device and system for managing virtual machine
CN100351828C (en) File access method based on a distributed file storage system
CN1851724A (en) Business data operation coutrol method and business system
CN103997502A (en) Safety enhanced model designing method based on cloud computing data center
CN1633085A (en) An access control method based on non-grade inter-role mapping
CN1744599A (en) JAAS and AspeclJ based group management system authentication and authority method
CN1157660C (en) Multiple-user safety operation document system and method
CN1946035A (en) Method for managing net element data configuration and net element
CN1204712C (en) Method for implementing cross-domain file sharing
CN1581144A (en) Digital certificate local identification method and system
CN1235151C (en) Method of control system safety management
CN1787456A (en) Method for controlling five layer resource access based on extending role
KR102034883B1 (en) A security orchestration system
CN1519712A (en) Method for running threaded/process in-local/remote based on task/leading routines and ageney components
CN111199056A (en) Grading authentication method based on intelligent contract in block chain
CN1275148C (en) Non-functional characteristic assembling method in member software

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100428

Termination date: 20160927