Zero-trust system access method based on identity security
The invention relates to the technical field of information security transmission, and particularly discloses a zero-trust system access method based on identity security. According to the method, an application bastion fortress is deployed between a client and a service system, and the application...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention relates to the technical field of information security transmission, and particularly discloses a zero-trust system access method based on identity security. According to the method, an application bastion fortress is deployed between a client and a service system, and the application bastion fortress is a unique entrance for the client to access the service system. The application bastion is connected to the application bastion control center. The method comprises the following steps: a user logs in a client on equipment, and sends a request for accessing a service system to an application bastion fortress through the client; the application bastion control center collects and analyzes the access information, then carries out risk assessment, obtains an access permission decision of the access according to a risk assessment result, and sends the decision to the application bastion; and the application fortress performs access permission control according to the access permission decision. Accor |
---|