WO2023071305A1 - 云数据库资源的处理方法及装置、电子设备、存储介质 - Google Patents

云数据库资源的处理方法及装置、电子设备、存储介质 Download PDF

Info

Publication number
WO2023071305A1
WO2023071305A1 PCT/CN2022/106267 CN2022106267W WO2023071305A1 WO 2023071305 A1 WO2023071305 A1 WO 2023071305A1 CN 2022106267 W CN2022106267 W CN 2022106267W WO 2023071305 A1 WO2023071305 A1 WO 2023071305A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
target
database
cloud
information
Prior art date
Application number
PCT/CN2022/106267
Other languages
English (en)
French (fr)
Inventor
杨楠
Original Assignee
青岛海尔科技有限公司
海尔智家股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 青岛海尔科技有限公司, 海尔智家股份有限公司 filed Critical 青岛海尔科技有限公司
Publication of WO2023071305A1 publication Critical patent/WO2023071305A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Definitions

  • the present disclosure relates to the technical field of database operation and maintenance, and in particular to a method and device for processing cloud database resources, electronic equipment, and a storage medium.
  • cloud databases of different types and environments usually belong to different cloud vendors, and the database servers of different cloud vendors do not support each other enough. Therefore, the services provided by each cloud vendor need to create corresponding sub-accounts, so for multi-cloud scenarios, it is necessary to create a large number of sub-accounts. In the process of cloud database operation and maintenance, administrators need to constantly switch accounts to log in to use and manage databases in different environments and services from different vendors.
  • the present disclosure provides a cloud database resource processing method and device, electronic equipment, and a storage medium, so as to solve the problem that cloud database resource management is too cumbersome based on the prior art.
  • the first aspect of the present disclosure provides a method for processing cloud database resources, including: obtaining user authentication information, and authenticating the user authentication information; if the user authentication information passes the authentication, from the background Acquiring the items that the user has authority from the database, and feeding them back to the user; responding to the user's item selection operation, querying the cloud resource information of the target item belonging to the target database type from the background database; wherein, the The target item and the target database type are respectively the item and database type selected by the user; the cloud resource information queried is fed back to the user; in response to the user's cloud resource selection operation, obtain the user's The address corresponding to the selected target cloud resource and the cloud account information to which the target cloud resource belongs; using the cloud account information to which the target cloud resource belongs as a parameter to send an authorization request to the authorization server to trigger the authorization server to request to return a security order card; the address corresponding to the target cloud resource is spliced with the security token to obtain a secret-free login address, which is fed back to the user; where
  • a second aspect of the present disclosure provides a cloud database resource processing device, including: an authentication information acquisition unit configured to acquire user authentication information; an authentication unit configured to authenticate the user's authentication information;
  • the item query unit is configured to obtain the items that the user has authority from the background database and feed back to the user if the authentication information of the user passes the authentication;
  • the resource query unit is configured to respond to the user The project selection operation of querying the cloud resource information of the target project belonging to the target database type from the background database; wherein, the target project and the target database type are respectively the project and the database type selected by the user;
  • resource The feedback unit is configured to feed back the queried cloud resource information to the user;
  • the resource information acquisition unit is configured to respond to the user's cloud resource selection operation and obtain the information corresponding to the target cloud resource selected by the user.
  • the authorization request unit is configured to use the cloud account information to which the target cloud resource belongs as a parameter to send an authorization request to the authorization server to trigger the authorization server to request to return a security order card;
  • a splicing unit configured to splice the address corresponding to the target cloud resource with the security token to obtain a password-free login address, and feed it back to the user; wherein, the password-free login address is used for password-free login Secretly access the service corresponding to the target cloud resource.
  • a third aspect of the present disclosure provides an electronic device, including: a memory and a processor; wherein, the memory is configured to store a program; the processor is configured to execute the program, and when the program is executed, specifically It is set to realize the processing method of cloud database resources as described in any one of the above.
  • a fourth aspect of the present disclosure provides a computer storage medium configured to store a computer program, and when the computer program is executed, configured to implement the cloud database resource processing method described in any one of the above.
  • the present disclosure provides a method for processing cloud database resources, which acquires authentication information of a user and authenticates the authentication information of the user. If the authentication information of the user passes the authentication, the items with authority of the user are obtained from the background database and fed back to the user for selection. In response to the user's project selection operation, the cloud resource information of the target project belonging to the target database type selected by the user is queried from the background database, and the queried cloud resource information is fed back to the user selection. Then, in response to the user's cloud resource selection operation, the address corresponding to the target cloud resource selected by the user and the cloud account information to which the target cloud resource belongs are obtained, and the cloud account information to which the target cloud resource belongs is used as a parameter to send an authorization request to the authorization server.
  • Trigger the authorization server to request to return the security token, and then splice the address corresponding to the target cloud resource with the security token to obtain the password-free login address, and feed it back to the user.
  • the user can directly use the password-free login address for password-free access
  • the service corresponding to the target cloud resource In this way, only one login is required to select cloud resources of any type of database, and obtain a password-free login address to access cloud resources, making the management of cloud resources more convenient.
  • FIG. 1 is a working diagram of a cloud database operation and maintenance platform provided by an embodiment of the present disclosure
  • FIG. 2 is a flow chart of a method for processing cloud database resources provided by an embodiment of the present disclosure
  • FIG. 3 is a flow chart of authenticating user authentication information provided by an embodiment of the present disclosure
  • Fig. 4 is a flow chart of a method for obtaining the address corresponding to the target cloud resource and the cloud account information to which the target cloud resource belongs according to an embodiment of the present disclosure
  • FIG. 5 is a flow chart of a method for synchronizing database resources provided by an embodiment of the present disclosure
  • FIG. 6 is a schematic structural diagram of a processing device for cloud database resources provided by an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of a resource information acquisition unit provided by an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of an authentication unit provided by an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure.
  • relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, without necessarily requiring or implying any relationship between these entities or operations. an actual relationship or order.
  • the term “comprises”, “comprises” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements but also items not expressly listed other elements, or also include elements inherent in such a process, method, article, or apparatus.
  • an element defined by the phrase “comprising a " does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.
  • the present disclosure provides a method for processing cloud database resources, so as to solve the problem of too complicated management of cloud database resources based on the prior art.
  • an embodiment of the present disclosure provides a cloud database operation and maintenance platform, which specifically includes a front end and a back end.
  • the backend includes a platform server, a background database, a cloud authorization server, and a cloud resource server.
  • the front end is set to respond to the user's operation, interact with the platform server, and access the cloud resource server through the password-free login address after finally obtaining the password-free login address.
  • the front end is set to send the user's login request to the platform server for authentication, and obtain the user item authority returned by the platform server after the authentication is passed, and provide it to the user for selection. Then, send the item and database type selected by the user to the platform server to obtain corresponding cloud resources for the user to choose. Subsequently, the cloud resource selected by the user is sent to the platform server to obtain the password-free login address of the cloud resource server corresponding to the cloud resource selected by the user. Finally, use the secret-free login address to access the corresponding cloud resource server to obtain the cloud resource selected by the user.
  • the platform server is mainly set to respond to requests and information sent by the front end, and returns corresponding information to the front end by interacting with the background database, cloud authorization server, and cloud resource server.
  • the login request is authenticated through the user information stored in the background database, and when the authentication is passed, the user item authority is retrieved from the background database and fed back to the front end.
  • the source resources corresponding to the item and database type in the background server are fed back to the front end.
  • the cloud resource server corresponding to the cloud resource access the cloud resource server corresponding to the cloud resource to obtain the redirection address of the cloud resource server.
  • obtain the cloud account information of the cloud resource server from the background database and use the cloud account information as a parameter to send a request to the cloud authorization server to obtain the security token returned by the cloud authorization server.
  • the redirection address and the security token are spliced together to obtain the password-free login address, and the password-free login address is fed back to the front end.
  • the background database is mainly set to store information required in the maintenance process, such as user information, cloud account information, and so on.
  • the subsequent database may specifically use MySQL.
  • the cloud authorization server is mainly configured to return a corresponding historical security token (token) when receiving an authorization request sent by the platform server.
  • the cloud resource server is set to provide cloud resources, and the user accesses the cloud resources in the cloud resource server through the front-end using the password-free login address.
  • a method for processing cloud database resources provided by an embodiment of the present disclosure includes the following steps:
  • S201 Acquire authentication information of a user, and perform authentication on the authentication information of the user.
  • the authentication information may specifically include the account number and password of the user, and the like.
  • the platform server obtains the user's authentication information, and uses the account number and password of each user stored in the background database to authenticate the currently obtained user authentication information.
  • a manner of authenticating user authentication information includes:
  • step S302 in order to avoid reducing unnecessary workload, it is first checked whether the format of the user's authentication information meets the format requirements, and step S302 is executed only when it is detected that the user's authentication information meets the format requirements.
  • a prompt message indicating that there is a problem with the format can be fed back to the user through the front end.
  • step S303 is performed at this time, if no information consistent with the user's authentication information is found, then it is determined that the user's authentication information is incorrect. correct.
  • step S203 is performed.
  • the information of each project that the user has authority is obtained from the background database, and the information of the project is fed back to the front end, and provided to the user for selection through the user interface of the front end.
  • the target item and the target database type are respectively the item and the database type selected by the user.
  • the user is also provided with corresponding and selectable database types.
  • the item selected by the user is determined as the target item, and the database type selected by the user is determined as the target database type.
  • the resource table of the target database type is queried from the background database, and the cloud resource information belonging to the A project is determined from the resource table. For example, if the user selects project A and a relational database, then the cloud resource information of the relational database of project A is returned.
  • the queried cloud resource information is fed back to the front end, and the front end provides the cloud resource information to the user for selection through a user interface.
  • the address corresponding to the target cloud resource is the address of the target resource in the cloud resource server.
  • the address corresponding to the target cloud resource is obtained, and the cloud account information to which the target cloud resource belongs is queried from the background database.
  • the cloud account information can be AccessKey ID and AccessKey Secret.
  • the target cloud resource includes a target database service and a target database instance.
  • the specific implementation of step S206, as shown in FIG. 4 includes:
  • the cloud resources selected by the user include database services and database instances.
  • the saved address of the target database service is not necessarily the current address in the cloud resource server, it is necessary to access the target database server in the cloud resource server from the view, and the cloud resource server will return the redirection address ( Uniform Resource Locator Uniform Resource Locator, referred to as url).
  • the obtained address corresponding to the target cloud resource is a redirection address
  • the corresponding step S208 in the embodiment of the present disclosure is:
  • the redirection address is spliced with the security token to obtain a secret-free login address.
  • the cloud account information stored in the background database may be stored in an encrypted manner, thereby ensuring the security of the cloud account information. Therefore, after obtaining the cloud account information, it is necessary to decrypt the cloud account information first, and then use the decrypted cloud account information as a parameter to initiate an authorization request to the cloud authorization server. At this point, the login service in the authorization server will return a temporary security token.
  • the password-free login address is used for password-free access to services corresponding to the target cloud resources.
  • the address obtained by splicing the security token and the address corresponding to the target cloud resource contains the security token, so when using this address to access, you can log in without password for access. Therefore, after obtaining the password-free login address, the password-free login address is fed back to the front end and provided to the user, and the user directly accesses the target cloud resource through the front-end using the password-free login address.
  • it may further include a method for synchronizing database resources, specifically as shown in FIG. 5 , including the following steps:
  • the database resources can be synchronized to the back-end database of the platform every day through a scheduled task, so as to realize the entry and update of cloud resource information.
  • a scheduled task can be initiated.
  • multiple threads are called for resource synchronization.
  • Each database type of each cloud vendor corresponds to a thread.
  • Each cloud vendor is used as the target vendor, and the corresponding thread is used to execute this method.
  • obtain the cloud master account information of the target scenario which may specifically include AccessKey ID and AccessKey Secret.
  • the cloud master account information since the cloud master account information is usually encrypted and stored, it needs to be decrypted, and then use the decrypted cloud master account information to construct a corresponding database service access connection. For example, if you are accessing an RDS database, build the corresponding RDS SDK client.
  • the database service of the target manufacturer is invoked, and the database instance list of the database to be synchronized is returned by the database service.
  • the database instance list includes information such as instance information, projects, and corresponding cloud account identifiers.
  • the project to which the instance belongs will be determined, so that the information will be stored under the corresponding project.
  • An embodiment of the present disclosure provides a method for processing cloud database resources, which acquires authentication information of a user and authenticates the authentication information of the user. If the authentication information of the user passes the authentication, the items with authority of the user are obtained from the background database and fed back to the user for selection. In response to the user's project selection operation, the cloud resource information of the target project belonging to the target database type selected by the user is queried from the background database, and the queried cloud resource information is fed back to the user selection. Then, in response to the user's cloud resource selection operation, the address corresponding to the target cloud resource selected by the user and the cloud account information to which the target cloud resource belongs are obtained, and the cloud account information to which the target cloud resource belongs is used as a parameter to send an authorization request to the authorization server.
  • Trigger the authorization server to request to return the security token, and then splice the address corresponding to the target cloud resource with the security token to obtain the password-free login address, and feed it back to the user.
  • the user can directly use the password-free login address for password-free access
  • the service corresponding to the target cloud resource In this way, only one login is required to select cloud resources of any type of database, and obtain a password-free login address to access cloud resources, making the management of cloud resources more convenient.
  • FIG. 6 Another embodiment of the present disclosure provides an apparatus for processing cloud database resources, as shown in FIG. 6 , including:
  • the authentication information obtaining unit 601 is configured to obtain user authentication information.
  • the authenticating unit 602 is configured to authenticate the authentication information of the user.
  • the project query unit 603 is configured to obtain the project that the user has authority from the background database and feed it back to the user if the authentication information of the user passes the authentication,
  • the resource query unit 604 is configured to query the cloud resource information of the target project belonging to the target database type from the background database in response to the user's project selection operation.
  • the target project and the target database type are respectively the project and the database type selected by the user.
  • the resource feedback unit 605 is configured to feed back the queried cloud resource information to the user.
  • the resource information acquiring unit 606 is configured to, in response to the user's cloud resource selection operation, acquire the address corresponding to the target cloud resource selected by the user and the cloud account information to which the target cloud resource belongs.
  • the authorization request unit 607 is configured to send an authorization request to the authorization server with the cloud account information to which the target cloud resource belongs as a parameter, so as to trigger the authorization server to request to return the security token.
  • the splicing unit 608 is configured to splice the address corresponding to the target cloud resource with the security token to obtain a secret-free login address, and feed it back to the user.
  • the password-free login address is used for password-free access to services corresponding to the target cloud resources.
  • the target cloud resource includes a target database service and a target database instance.
  • the resource information acquisition unit in the embodiment of the present disclosure includes:
  • the access unit 701 is configured to send an access request for attempting to access the target database service to the cloud resource server where the target database service is located.
  • the address obtaining unit 702 is configured to obtain the redirection address returned by the cloud resource server.
  • the account information query unit 703 is configured to query the cloud account information to which the target database instance belongs from the background database.
  • the splicing unit in the embodiment of the present disclosure splices the address corresponding to the target cloud resource with the security token, and obtains the password-free login address, it is set as:
  • the authentication unit as shown in FIG. 8 , includes:
  • the format verification unit 801 is configured to detect whether the user's authentication information meets the format requirements.
  • the judging unit 802 is configured to judge whether the user's authentication information is correct based on the user information stored in the background database if it is detected that the user's authentication information meets the format requirements.
  • the determining unit 803 is configured to determine that the user's authentication information has passed the authentication if it is determined that the user's authentication information is correct.
  • the device for processing cloud database resources provided in another embodiment of the present disclosure further includes:
  • the main account information obtaining unit is configured to obtain the cloud main account information of the target vendor.
  • the construction unit is configured to use the decrypted cloud master account information to construct a database service access connection corresponding to the target vendor.
  • the invoking unit is configured to use the database service corresponding to the target vendor to access the connection, and invoke the target vendor's database service to obtain a database instance list of the target vendor's database to be synchronized.
  • the processing unit is configured to write the information in the database instance list into the database.
  • FIG. 9 Another embodiment of the present disclosure provides an electronic device, as shown in FIG. 9 , including:
  • the memory 901 is configured to store programs.
  • the processor 902 is configured to execute the program stored in the memory 901, and when the program is executed, it is specifically configured to implement the cloud database resource processing method provided in any one of the above embodiments.
  • Another embodiment of the present disclosure provides a computer storage medium configured to store a computer program.
  • the computer program When executed, it is configured to implement the cloud database resource processing method provided in any one of the above embodiments.
  • Computer storage media including permanent and non-permanent, removable and non-removable media, may be implemented by any method or technology for information storage.
  • Information may be computer readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic A magnetic tape cartridge, tape magnetic disk storage or other magnetic storage device, or any other non-transmission medium, configured to store information that can be accessed by a computing device.
  • computer-readable media excludes transitory computer-readable media, such as modulated data signals and carrier waves.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本公开提供了一种云数据库资源的处理方法及装置、电子设备、存储介质,其中,所述方法包括:获取用户的认证信息,并对用户的认证信息进行鉴权;若通过鉴权,则从后台数据库中获取用户具有权限的项目,并反馈给用户,响应用户的项目选择操作,从后台数据库中查询出属于用户选择的目标数据库类型的目标项目的云资源信息;将查询出的云资源信息反馈给用户;响应用户的云资源选择操作,获取用户选择的目标云资源对应的地址以及目标云资源所属的云账号信息;将目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发授权服务器请求返回安全令牌;将目标云资源对应的地址与安全令牌进行拼接,得到免密登陆地址,并反馈给用户。

Description

云数据库资源的处理方法及装置、电子设备、存储介质
本公开要求于2021年10月28日提交中国专利局、申请号为202111262883.X、发明名称“云数据库资源的处理方法及装置、电子设备、存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。
技术领域
本公开涉及数据库运维技术领域,特别涉及一种云数据库资源的处理方法及装置、电子设备、存储介质。
背景技术
由于不同类型不同环境下的云数据库通常会属于不同的云厂商,而不同的云厂商的数据库服务器对彼此的支持程度都不够。所以各个云厂商提供的服务都需要创建相应的子账户,所以对于多云的场景就需要创建大量的子账户。在云数据库运维的过程中,管理人员需要不断切换账号进行登录,以使用不同环境的数据库和不同厂商的服务,并对其进行管理。
由于需要创建大量的子账户,不仅需要对大量的子账户进行关联,并且在运维时需要不断的切换账户,从而访问不同的云资源,因此可见基于现有技术进行对云资源进行管理过于繁琐,效率相对较低。
发明内容
基于上述现有技术的不足,本公开提供了一种云数据库资源的处理方法及装置、电子设备、存储介质,以能解决基于现有技术对云数据库资源的管理过于繁琐的问题。
为了实现上述目的,本公开提供了以下技术方案:
本公开第一方面提供了一种云数据库资源的处理方法,包括:获取用户的认 证信息,并对所述用户的认证信息进行鉴权;若所述用户的认证信息通过鉴权,则从后台数据库中获取所述用户具有权限的项目,并反馈给所述用户;响应所述用户的项目选择操作,从所述后台数据库中查询出属于目标数据库类型的目标项目的云资源信息;其中,所述目标项目和所述目标数据库类型分别为所述用户选择的项目以及数据库类型;将查询出的所述云资源信息反馈给所述用户;响应所述用户的云资源选择操作,获取所述用户选择的目标云资源对应的地址以及所述目标云资源所属的云账号信息;将所述目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发所述授权服务器请求返回安全令牌;将所述目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址,并反馈给所述用户;其中,所述免密登陆地址用于免密访问所述目标云资源对应的服务。
本公开第二方面提供了一种云数据库资源的处理装置,包括:认证信息获取单元,被设置为获取用户的认证信息;鉴权单元,被设置为对所述用户的认证信息进行鉴权;项目查询单元,被设置为若所述用户的认证信息通过鉴权,则从后台数据库中获取所述用户具有权限的项目,并反馈给所述用户;资源查询单元,被设置为响应所述用户的项目选择操作,从所述后台数据库中查询出属于目标数据库类型的目标项目的云资源信息;其中,所述目标项目和所述目标数据库类型分别为所述用户选择的项目以及数据库类型;资源反馈单元,被设置为将查询出的所述云资源信息反馈给所述用户;资源信息获取单元,被设置为响应所述用户的云资源选择操作,获取所述用户选择的目标云资源对应的地址以及所述目标云资源所属的云账号信息;授权请求单元,被设置为将所述目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发所述授权服务器请求返回安全令牌;拼接单元,被设置为将所述目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址,并反馈给所述用户;其中,所述免密登陆地址用于免密访问所述目标云资源对应的服务。
本公开第三方面提供了一种电子设备,包括:存储器和处理器;其中,所述存储器被设置为存储程序;所述处理器被设置为执行所述程序,所述程序被执行时,具体被设置为实现如上述任意一项所述的云数据库资源的处理方法。
本公开第四方面提供了一种计算机存储介质,被设置为存储计算机程序,所述计算机程序被执行时,被设置为实现如上述任意一项所述的云数据库资源的处理方法。
本公开提供了一种云数据库资源的处理方法,获取用户的认证信息,并对用户的认证信息进行鉴权。若所述用户的认证信息通过鉴权,则从后台数据库中获取所述用户具有权限的项目,并反馈给用户选择。响应用户的项目选择操作,从后台数据库中查询出属于用户选择的目标数据库类型的目标项目的云资源信息,并将查询出的云资源信息反馈给用户选择。然后,响应用户的云资源选择操作,获取用户选择的目标云资源对应的地址以及目标云资源所属的云账号信息,并将目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发授权服务器请求返回安全令牌,进而将目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址,并反馈给所述用户,用户可以直接利用免密登陆地址免密访问目标云资源对应的服务。从而实现了只需要一次登录,就可以选择任意类型的数据库的云资源,并获得免密登陆地址对云资源进行访问,使得对云资源的管理更加的便捷。
附图说明
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本公开实施例提供的云数据库运维平台的工作示意图;
图2为本公开实施例提供的一种云数据库资源的处理方法的流程图;
图3为本公开实施例提供的一种对用户的认证信息进行鉴权的流程图;
图4为本公开实施例提供的一种获取目标云资源对应的地址以及目标云资源 所属的云账号信息的方式的流程图;
图5为本公开实施例提供的一种同步数据库资源的方法的流程图;
图6为本公开实施例提供的一种云数据库资源的处理装置的结构示意图;
图7为本公开实施例提供的一种资源信息获取单元的结构示意图;
图8为本公开实施例提供的一种鉴权单元的结构示意图;
图9为本公开实施例提供的一种电子设备的结构示意图。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
在本公开中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
本公开提供了一种云数据库资源的处理方法,以能解决基于现有技术对云数据库资源的管理过于繁琐的问题。
可选地,为了实现本公开提供的云数据库资源的处理方法,本公开实施例提供了一种云数据库运维平台,具体包括前端和后端。
其中,如图1所示,后端包括平台服务器、后台数据库、云授权服务器、云资源服务器。
其中,前端被设置为响应用户的操作,与平台服务器进行交互,在最终得到免密登陆地址后,通过免密登陆地址访问云资源服务器。
具体如图1所示,前端被设置为向平台服务器发送用户的登陆请求,以进行鉴权,并在鉴权通过后获得平台服务器返回的用户项目权限,提供给用户进行选择。然后,将用户选择项目和数据库类型发送给平台服务器,以获得相应的云资源,提供给用户选择。后续,将用户选择的云资源发送给平台服务器,以获得用户选择的云资源对应的云资源服务器的免密登陆地址。最后利用免密登陆地址访问相应的云资源服务器,以获得用户选择的云资源。
平台服务器,主要被设置为响应前端发送的请求和信息,通过与后台数据库、云授权服务器、云资源服务器进行交互,向前端返回相应的信息。
具体的,同样如图1所示,通过后台数据库中存储的用户信息对登陆请求间鉴权,并在鉴权通过时从后台数据库中后续用户项目权限并反馈给前端。在接收到前端选择的项目和数据库类型时,从后台服务器中与该项目和数据库类型对应的源资源反馈给前端。在接收到前端发送的用户选择的云资源时,访问该云资源对应的云资源服务器,以获得云资源服务器的重定向地址。然后从后台数据库中获取该云资源服务器的云账号信息,并利用云账号信息作为参数,向云授权服务器发送请求,以获得云授权服务器返回的安全令牌。最后将重定向地址和安全令牌进行拼接得到免密登陆地址,并将免密登陆地址反馈给前端。
后台数据库主要被设置为存储维护过程中所需要的信息,例如用户信息、云账号信息等。可选地,后续数据库具体可以采用MySQL。
云授权服务器主要被设置为在接收到平台服务器发送的授权请求时,返回相应的历史安全令牌(token)。
云资源服务器则被设置为提供云资源,用户通过前端利用免密登陆地址访问云资源服务器中的云资源。
基于上述提供的云数据库运维平台,本公开实施例提供了一种云数据库资源的处理方法,应用与平台服务器。如图2所示,本公开实施例提供的一种云数据库资源的处理方法,包括以下步骤:
S201、获取用户的认证信息,并对用户的认证信息进行鉴权。
其中,认证信息具体可以包括用户的账号和密码等。
具体可以在用户申请注册时,将用户的账户和密码保存至后台数据库中。所以用户在需要登陆运维平台时,输入相应的认证信息,此时平台服务器获取用户的认证信息,并利用后台数据库中存储的各个用户的账号和密码对当前获取到的用户的认证信息进行鉴权。
可选地,在本公开实施例中,对用户的认证信息进行鉴权的一种方式,如图3所示,包括:
S301、检测用户的认证信息是否符合格式要求。
在本公开实施例中,为了避免进行减少不必要的工作量,所以先检测用户的认证信息的格式是否符合格式要求,当检测出用户的认证信息符合格式要求时,才执行步骤S302。
可选地,若检测出用户的认证信息不符合格式要求,可以通过前端向用户反馈格式存在问题的提示信息。
S302、基于后台数据库中存储的用户信息,判断用户的认证信息是否正确。
具体的,从后台数据库中查询与该用户的认证信息相一致的信息。若查询到与该用户的认证信息相一致的信息,则确定用户的认证信息正确,此时执行步骤S303,若查询不到与该用户的认证信息相一致的信息,则确定用户的认证信息不正确。
S303、确定用户的认证信息通过鉴权。
S202、判断用户的认证信息是否通过鉴权。
其中,若判断出用户的认证信息通过鉴权,则执行步骤S203。
S203、从后台数据库中获取用户具有权限的项目,并反馈给用户。
具体的,从后台数据库中获取用户具有权限的各个项目的信息,并将项目的信息反馈给前端,通过前端的用户界面提供给用户进行选择。
S204、响应用户的项目选择操作,从后台数据库中查询出属于目标数据库类型的目标项目的云资源信息。
其中,目标项目和所述目标数据库类型分别为用户选择的项目以及数据库类型。
需要说明的是,在将项目提供给用户选择的同时,还向用户提供了相应的,可选择的各个数据库类型。当用户选择项目以及数据库类型后,将用户选择的项目确定为目标项目,且将用户选择的数据库类型确定为目标数据库类型。然后,从后台数据库中查询出目标数据库类型的资源表,并从该资源表中确定出属于A项目的云资源信息。例如,用户选择了项目A和关系型数据库,则返回项目A的关系型数据库的云资源信息。
S205、将查询出的云资源信息反馈给用户。
具体的,将查询出的云资源信息反馈给前端,由前端通过用户界面将云资源信息提供给用户进行选择。
S206、响应用户的云资源选择操作,获取用户选择的目标云资源对应的地址以及目标云资源所属的云账号信息。
其中,目标云资源对应的地址目标资源在云资源服务器中的地址。
基于预先的记录,获取目标云资源对应的地址,并从后台数据库中查询出目标云资源所属的云账号信息。
可选地,云账号信息可以为AccessKey ID以及AccessKey Secret。
可选地,在本公开另一实施例中,目标云资源包括目标数据库服务和目标数 据库实例,在本公开实施例中,步骤S206的具体实施方式,如图4所示,包括:
S401、向目标数据库服务所在的云资源服务器发送尝试访问目标数据库服务的访问请求。
需要说明的是,在本公开实施例中,用户选择的云资源包括了数据库服务和数据库实例。
由于保存的目标数据库服务的地址并不一定是当前其在云资源服务器中正在的地址,因此需要向视图去访问该云资源服务器中的目标数据库服务器,此时云资源服务器将返回重定向地址(统一资源定位符Uniform Resource Locator,简称为url)。
S402、获取云资源服务器返回的重定向地址。
S403、从后台数据库中查询出目标数据库实例所属的云账号信息。
需要说明的是,由于在本公开实施例中,获取的目标云资源对应的地址为重定向地址,所以在本公开实施例中步骤S208相应的为:
将重定向地址与所述安全令牌进行拼接,得到免密登陆地址。
S207、将目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发授权服务器请求返回安全令牌。
可选地,后台数据库中保存的云账户信息可以以加密的方式进行保存,从而保障云账户信息的安全。因此,在获取到云账号信息后,需要先对云账号信息进行解密,然后利用解密后的云账户信息作为参数向云授权服务器发起授权请求。此时,授权服务器中登陆服务将返回临时的安全令牌。
S208、将目标云资源对应的地址与安全令牌进行拼接,得到免密登陆地址,并反馈给用户。
其中,免密登陆地址用于免密访问目标云资源对应的服务。
由于,已经获取到了安全令牌,所以将安全令牌和目标云资源对应的地址进 行拼接所得到的地址中包含有安全令牌,因此在利用该地址进行访问时就可以免密登陆进行访问。因此在得到免密登陆地址后,将免密登陆地址反馈给前端,提供给用户,用户通过前端利用该免密登陆地址,直接访问目标云资源。
可选地,本公开另一实施例中,还可以进一步包括同步数据库资源的方法,具体如图5所示,包括以下步骤:
S501、获取目标厂商的云主账号信息。
可选地,可以是通过定时任务,每日同步数据库资源至平台的后台数据库中,实现云资源信息的录入和更新。具体的,可以发起定时任务,此时调起多个线程进行资源同步,每个云厂商的每种数据库类型对应一个线程,将每个云厂商作为目标厂商,利用对应的线程执行本方法。
具体的,获取目标场景的云主账号信息,具体可以包括AccessKey ID以及AccessKey Secret。
S502、利用解密后的云主账号信息构建目标厂商对应的数据库服务访问连接。
具体的,由于云主账号信息通常是加密存储的,所以需要向对其进行解密,然后使用解密后的云主账号信息构建对应的数据库服务访问连接。例如,访问的是RDS数据库,则构建对应的RDS SDK client。
S503、利用目标厂商对应的数据库服务访问连接,调用目标厂商的数据库服务,以获取目标厂商的待同步数据库的数据库实例列表。
具体的,调用目标厂商的数据库服务,通过数据库服务返回的待同步数据库的数据库实例列表。其中,数据库实例列表中包含有实例信息、项目、对应云账号标识等信息。
S504、将数据库实例列表中的信息写入数据库中。
具体的,根据给云实例划分资源组的方式,将确定实例所属项目,从而将信息存储至相应的项目下。
本公开实施例提供了一种云数据库资源的处理方法,获取用户的认证信息, 并对用户的认证信息进行鉴权。若所述用户的认证信息通过鉴权,则从后台数据库中获取所述用户具有权限的项目,并反馈给用户选择。响应用户的项目选择操作,从后台数据库中查询出属于用户选择的目标数据库类型的目标项目的云资源信息,并将查询出的云资源信息反馈给用户选择。然后,响应用户的云资源选择操作,获取用户选择的目标云资源对应的地址以及目标云资源所属的云账号信息,并将目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发授权服务器请求返回安全令牌,进而将目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址,并反馈给所述用户,用户可以直接利用免密登陆地址免密访问目标云资源对应的服务。从而实现了只需要一次登录,就可以选择任意类型的数据库的云资源,并获得免密登陆地址对云资源进行访问,使得对云资源的管理更加的便捷。
本公开另一实施例提供了一种云数据库资源的处理装置,如图6所示,包括:
认证信息获取单元601,被设置为获取用户的认证信息。
鉴权单元602,被设置为对用户的认证信息进行鉴权。
项目查询单元603,被设置为若用户的认证信息通过鉴权,则从后台数据库中获取用户具有权限的项目,并反馈给用户,
资源查询单元604,被设置为响应用户的项目选择操作,从后台数据库中查询出属于目标数据库类型的目标项目的云资源信息。
其中,目标项目和目标数据库类型分别为用户选择的项目以及数据库类型。
资源反馈单元605,被设置为将查询出的云资源信息反馈给用户。
资源信息获取单元606,被设置为响应用户的云资源选择操作,获取用户选择的目标云资源对应的地址以及目标云资源所属的云账号信息。
授权请求单元607,被设置为将目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发授权服务器请求返回安全令牌。
拼接单元608,被设置为将目标云资源对应的地址与安全令牌进行拼接,得 到免密登陆地址,并反馈给用户。其中,免密登陆地址用于免密访问目标云资源对应的服务。
可选地,在本公开另一实施例提供的云数据库资源的处理装置中,目标云资源包括目标数据库服务和目标数据库实例。本公开实施例中的资源信息获取单元,如图7所示,包括:
访问单元701,被设置为向目标数据库服务所在的云资源服务器发送尝试访问目标数据库服务的访问请求。
地址获取单元702,被设置为获取云资源服务器返回的重定向地址。
账号信息查询单元703,被设置为从后台数据库中查询出目标数据库实例所属的云账号信息。
其中,本公开实施例中的拼接单元执行将目标云资源对应的地址与安全令牌进行拼接,得到免密登陆地址时,被设置为:
将重定向地址与安全令牌进行拼接,得到免密登陆地址。
可选地,在本公开另一实施例提供的云数据库资源的处理装置中,鉴权单元,如图8所示,包括:
格式校验单元801,被设置为检测用户的认证信息是否符合格式要求。
判断单元802,被设置为若检测出用户的认证信息符合格式要求,则基于后台数据库中存储的用户信息,判断用户的认证信息是否正确。
确定单元803,被设置为若判断出用户的认证信息正确,则确定用户的认证信息通过鉴权。
可选地,在本公开另一实施例提供的云数据库资源的处理装置中,还包括:
主账号信息获取单元,被设置为获取目标厂商的云主账号信息。
构建单元,被设置为利用解密后的云主账号信息构建目标厂商对应的数据库服务访问连接。
调用单元,被设置为利用目标厂商对应的数据库服务访问连接,调用目标厂商的数据库服务,以获取目标厂商的待同步数据库的数据库实例列表。
处理单元,被设置为将数据库实例列表中的信息写入数据库中。
需要说明的是,本公开上述实施例提供的各个单元的具体工作过程可相应地参考上述方法实施例中的相应的步骤,此处不再赘述。
本公开另一实施例提供了一种电子设备,如图9所示,包括:
存储器901和处理器902。
其中,存储器901被设置为存储程序。
处理器902被设置为执行存储器901存储的程序,并且该程序被执行时,具体被设置为实现如上述任意一个实施例提供的云数据库资源的处理方法。
本公开另一实施例提供了一种计算机存储介质,被设置为存储计算机程序,计算机程序被执行时,被设置为实现如上述任意一个实施例提供的云数据库资源的处理方法。
计算机存储介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可被设置为存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清 楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本公开。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本公开的精神或范围的情况下,在其它实施例中实现。因此,本公开将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种云数据库资源的处理方法,包括:
    获取用户的认证信息,并对所述用户的认证信息进行鉴权;
    若所述用户的认证信息通过鉴权,则从后台数据库中获取所述用户具有权限的项目,并反馈给所述用户;
    响应所述用户的项目选择操作,从所述后台数据库中查询出属于目标数据库类型的目标项目的云资源信息;其中,所述目标项目和所述目标数据库类型分别为所述用户选择的项目以及数据库类型;
    将查询出的所述云资源信息反馈给所述用户;
    响应所述用户的云资源选择操作,获取所述用户选择的目标云资源对应的地址以及所述目标云资源所属的云账号信息;
    将所述目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发所述授权服务器请求返回安全令牌;
    将所述目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址,并反馈给所述用户;其中,所述免密登陆地址用于免密访问所述目标云资源对应的服务。
  2. 根据权利要求1所述的方法,其中,所述目标云资源包括目标数据库服务和目标数据库实例,所述获取所述用户选择的目标云资源对应的地址以及所述目标云资源所属的云账号信息,包括:
    向所述目标数据库服务所在的云资源服务器发送尝试访问所述目标数据库服务的访问请求;
    获取所述云资源服务器返回的重定向地址;
    从所述后台数据库中查询出所述目标数据库实例所属的云账号信息;
    其中,所述将所述目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址,包括:
    将所述重定向地址与所述安全令牌进行拼接,得到免密登陆地址。
  3. 根据权利要求1所述的方法,其中,所述对所述用户的认证信息进行鉴权,包括:
    检测所述用户的认证信息是否符合格式要求;
    若检测出所述用户的认证信息符合格式要求,则基于所述后台数据库中存储的用户信息,判断所述用户的认证信息是否正确;
    若判断出所述用户的认证信息正确,则确定所述用户的认证信息通过鉴权。
  4. 根据权利要求1所述的方法,其中,还包括:
    获取目标厂商的云主账号信息;
    利用解密后的所述云主账号信息构建所述目标厂商对应的数据库服务访问连接;
    利用所述目标厂商对应的数据库服务访问连接,调用所述目标厂商的数据库服务,以获取所述目标厂商的待同步数据库的数据库实例列表;
    将所述数据库实例列表中的信息写入数据库中。
  5. 一种云数据库资源的处理装置,包括:
    认证信息获取单元,被设置为获取用户的认证信息;
    鉴权单元,被设置为对所述用户的认证信息进行鉴权;
    项目查询单元,被设置为若所述用户的认证信息通过鉴权,则从后台数据库中获取所述用户具有权限的项目,并反馈给所述用户;
    资源查询单元,被设置为响应所述用户的项目选择操作,从所述后台数据库中查询出属于目标数据库类型的目标项目的云资源信息;其中,所述目标项 目和所述目标数据库类型分别为所述用户选择的项目以及数据库类型;
    资源反馈单元,被设置为将查询出的所述云资源信息反馈给所述用户;
    资源信息获取单元,被设置为响应所述用户的云资源选择操作,获取所述用户选择的目标云资源对应的地址以及所述目标云资源所属的云账号信息;
    授权请求单元,被设置为将所述目标云资源所属的云账号信息作为参数向授权服务器发送授权请求,以触发所述授权服务器请求返回安全令牌;
    拼接单元,被设置为将所述目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址,并反馈给所述用户;其中,所述免密登陆地址用于免密访问所述目标云资源对应的服务。
  6. 根据权利要求5所述的装置,其中,所述目标云资源包括目标数据库服务和目标数据库实例,所述资源信息获取单元,包括:
    访问单元,被设置为向所述目标数据库服务所在的云资源服务器发送尝试访问所述目标数据库服务的访问请求;
    地址获取单元,被设置为获取所述云资源服务器返回的重定向地址;
    账号信息查询单元,被设置为从所述后台数据库中查询出所述目标数据库实例所属的云账号信息;
    其中,所述拼接单元执行所述将所述目标云资源对应的地址与所述安全令牌进行拼接,得到免密登陆地址时,被设置为:
    将所述重定向地址与所述安全令牌进行拼接,得到免密登陆地址。
  7. 根据权利要求5所述的装置,其中,所述鉴权单元,包括:
    格式校验单元,被设置为检测所述用户的认证信息是否符合格式要求;
    判断单元,被设置为若检测出所述用户的认证信息符合格式要求,则基于所述后台数据库中存储的用户信息,判断所述用户的认证信息是否正确;
    确定单元,被设置为若判断出所述用户的认证信息正确,则确定所述用户 的认证信息通过鉴权。
  8. 根据权利要求5所述的装置,其中,还包括:
    主账号信息获取单元,被设置为获取目标厂商的云主账号信息;
    构建单元,被设置为利用解密后的所述云主账号信息构建所述目标厂商对应的数据库服务访问连接;
    调用单元,被设置为利用所述目标厂商对应的数据库服务访问连接,调用所述目标厂商的数据库服务,以获取所述目标厂商的待同步数据库的数据库实例列表;
    处理单元,被设置为将所述数据库实例列表中的信息写入数据库中。
  9. 一种电子设备,包括:
    存储器和处理器;
    其中,所述存储器被设置为存储程序;
    所述处理器被设置为执行所述程序,所述程序被执行时,具体被设置为实现如权利要求1至4任意一项所述的云数据库资源的处理方法。
  10. 一种计算机存储介质,被设置为存储计算机程序,所述计算机程序被执行时,被设置为实现如权利要求1至4任意一项所述的云数据库资源的处理方法。
PCT/CN2022/106267 2021-10-28 2022-07-18 云数据库资源的处理方法及装置、电子设备、存储介质 WO2023071305A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111262883.X 2021-10-28
CN202111262883.XA CN114090975A (zh) 2021-10-28 2021-10-28 云数据库资源的处理方法及装置、电子设备、存储介质

Publications (1)

Publication Number Publication Date
WO2023071305A1 true WO2023071305A1 (zh) 2023-05-04

Family

ID=80297994

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/106267 WO2023071305A1 (zh) 2021-10-28 2022-07-18 云数据库资源的处理方法及装置、电子设备、存储介质

Country Status (2)

Country Link
CN (1) CN114090975A (zh)
WO (1) WO2023071305A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116886763A (zh) * 2023-09-08 2023-10-13 江苏未来网络集团有限公司 一种通用三方接入平台的对接方法、业务对接方法及***
CN117857217A (zh) * 2024-03-01 2024-04-09 浙江网商银行股份有限公司 云原生平台资源校验方法、装置、存储介质以及电子设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114090975A (zh) * 2021-10-28 2022-02-25 青岛海尔科技有限公司 云数据库资源的处理方法及装置、电子设备、存储介质
CN114973761A (zh) * 2022-05-25 2022-08-30 重庆长安汽车股份有限公司 停车场车辆自动泊车过道闸的***、方法及存储介质
CN115022074A (zh) * 2022-06-24 2022-09-06 中国电信股份有限公司 用户认证授权方法、装置、介质及设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286633A (zh) * 2018-10-26 2019-01-29 深圳市华云中盛科技有限公司 单点登陆方法、装置、计算机设备及存储介质
US20190075115A1 (en) * 2017-09-01 2019-03-07 Atlassian Pty Ltd Systems and methods for accessing cloud resources from a local development environment
CN112995165A (zh) * 2021-02-10 2021-06-18 北京金山云网络技术有限公司 资源访问的鉴权方法及装置、存储介质、电子设备
CN112995163A (zh) * 2021-02-10 2021-06-18 北京金山云网络技术有限公司 资源访问的鉴权方法及装置、存储介质、电子设备
CN113347242A (zh) * 2021-05-28 2021-09-03 Oppo广东移动通信有限公司 跨设备资源访问方法、装置、存储介质及电子设备
CN114090975A (zh) * 2021-10-28 2022-02-25 青岛海尔科技有限公司 云数据库资源的处理方法及装置、电子设备、存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190075115A1 (en) * 2017-09-01 2019-03-07 Atlassian Pty Ltd Systems and methods for accessing cloud resources from a local development environment
CN109286633A (zh) * 2018-10-26 2019-01-29 深圳市华云中盛科技有限公司 单点登陆方法、装置、计算机设备及存储介质
CN112995165A (zh) * 2021-02-10 2021-06-18 北京金山云网络技术有限公司 资源访问的鉴权方法及装置、存储介质、电子设备
CN112995163A (zh) * 2021-02-10 2021-06-18 北京金山云网络技术有限公司 资源访问的鉴权方法及装置、存储介质、电子设备
CN113347242A (zh) * 2021-05-28 2021-09-03 Oppo广东移动通信有限公司 跨设备资源访问方法、装置、存储介质及电子设备
CN114090975A (zh) * 2021-10-28 2022-02-25 青岛海尔科技有限公司 云数据库资源的处理方法及装置、电子设备、存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116886763A (zh) * 2023-09-08 2023-10-13 江苏未来网络集团有限公司 一种通用三方接入平台的对接方法、业务对接方法及***
CN117857217A (zh) * 2024-03-01 2024-04-09 浙江网商银行股份有限公司 云原生平台资源校验方法、装置、存储介质以及电子设备

Also Published As

Publication number Publication date
CN114090975A (zh) 2022-02-25

Similar Documents

Publication Publication Date Title
WO2023071305A1 (zh) 云数据库资源的处理方法及装置、电子设备、存储介质
US10848310B2 (en) Method and device for identifying user identity
CN111556006B (zh) 第三方应用***登录方法、装置、终端及sso服务平台
AU2017215589B2 (en) Electronic payment service processing method and device, and electronic payment method and device
US9280651B2 (en) Securely handling server certificate errors in synchronization communication
US8898764B2 (en) Authenticating user through web extension using token based authentication scheme
TWI679550B (zh) 帳號登入方法及裝置
WO2018121445A1 (zh) 一种多租户访问控制方法和装置
US20170324570A1 (en) Group management method, apparatus, and system
TW201828645A (zh) 網路驗證方法及裝置
EP2924947B1 (en) Method and apparatus for controlling access
KR20140035382A (ko) 사용자 액세스를 허용하는 방법, 클라이언트, 서버 및 시스템
US20220270085A1 (en) Destination addressing associated with a distributed ledger
WO2020212784A1 (en) Destination addressing associated with a distributed ledger
WO2014153982A1 (en) Methods and systems for broadcasting pictures
CN111817860B (zh) 一种通信认证方法、装置、设备及存储介质
CN112367302B (zh) 一种适用于chrome浏览器的身份认证方法及***
US10742802B2 (en) Methods and devices for verifying a communication number
CN115525880A (zh) 面向多租户提供saas服务的方法、装置、设备及介质
CN112583777B (zh) 用户登录的实现方法及装置
CN113300867B (zh) Cdn***、信息处理方法及装置、cdn节点
US9363274B2 (en) Methods and systems for broadcasting pictures
CN114500031B (zh) 基于单点登录获取bi报表的***、方法、电子设备及介质
US8875300B1 (en) Method and apparatus for authenticating a request between tasks in an operating system
CN117201162A (zh) 服务鉴权方法及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22885209

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE