Security policy matching authentication method and system
The invention relates to the technical field of security policy matching, and particularly discloses a security policy matching authentication method and system, and the method comprises the steps: obtaining the identity information of a user during one-time login, and building a hosting policy and...
Saved in:
Main Authors | , , , , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
23.06.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention relates to the technical field of security policy matching, and particularly discloses a security policy matching authentication method and system, and the method comprises the steps: obtaining the identity information of a user during one-time login, and building a hosting policy and an inline policy according to the identity information of the user; establishing a temporary user authentication strategy chain according to the trusteeship strategy and the inline strategy, matching the temporary user authentication strategy chain with the identity authentication strategy chain stored in the database, and if the inline strategy matching between the temporary user authentication strategy chain and the identity authentication strategy chain fails and the trusteeship strategy matching authentication succeeds, establishing a temporary password strategy; once temporary login is allowed, and the lowest access strategy is opened. The temporary user authentication strategy chain is established through the |
---|---|
Bibliography: | Application Number: CN202310189511 |