[go: up one dir, main page]

CN112788019A - Application fusion scheme under zero trust concept - Google Patents

Application fusion scheme under zero trust concept Download PDF

Info

Publication number
CN112788019A
CN112788019A CN202011625802.3A CN202011625802A CN112788019A CN 112788019 A CN112788019 A CN 112788019A CN 202011625802 A CN202011625802 A CN 202011625802A CN 112788019 A CN112788019 A CN 112788019A
Authority
CN
China
Prior art keywords
session
zero trust
application
scheme under
zero
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011625802.3A
Other languages
Chinese (zh)
Other versions
CN112788019B (en
Inventor
李春林
金宏洲
程亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tiangu Information Technology Co ltd
Original Assignee
Hangzhou Tiangu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tiangu Information Technology Co ltd filed Critical Hangzhou Tiangu Information Technology Co ltd
Priority to CN202011625802.3A priority Critical patent/CN112788019B/en
Publication of CN112788019A publication Critical patent/CN112788019A/en
Application granted granted Critical
Publication of CN112788019B publication Critical patent/CN112788019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an application fusion scheme under a zero trust concept, which comprises the following steps: and an authentication process, namely checking cookies for all http flow through the zero trust gateway, judging whether a middle-session field exists in the cookies, verifying and judging whether a middle-session certificate is legal or not, logging in the process, submitting a user password and the account number in the IAM by the user after the certificate is legal through the authentication process, and comparing and checking through the zero trust gateway. The invention realizes the check and verification of all http flow flowing through the zero trust gateway, realizes the comparison and verification of the user password and the account password in the IAM, simultaneously realizes the idea that the page element is the service, and completes the creation of a new single-page application.

Description

Application fusion scheme under zero trust concept
Technical Field
The invention relates to the technical field of application fusion, in particular to an application fusion scheme under a zero trust concept.
Background
Zero trust represents a new generation of network security protection concept, and the key point of the method is to break default 'trust', generalize the concept by a colloquial word, namely 'continuous verification and never trust'. Anyone, equipment and a system inside and outside the default untrusted enterprise network rebuild the trust basis of access control based on identity authentication and authorization, thereby ensuring identity trust, equipment trust, application trust and link trust. Based on the zero trust principle, the safety of the office system terminal, the safety of the link and the safety of access control can be guaranteed.
With the acceleration of information and digitization processes of Chinese enterprises, more and more internal applications and systems are developed, the internal applications are developed by different departments based on different requirement backgrounds, the development time points are different, a series of generations are poor, used account number systems are scattered and trivial, enterprise office and application management scene data with high maintenance cost and Gartner statistics are maintained, and a protection centralization, human and authentication core and dynamic self-adaptive quick response system is urgently needed in enterprises.
Disclosure of Invention
The invention aims to provide an application fusion scheme under the zero trust concept so as to overcome the defects in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme: an application fusion scheme under a zero trust concept comprises the following steps:
s1: the authentication process comprises the steps that all http traffic flowing through is checked for cookies through the zero trust gateway, whether a middle-session field exists in the cookies or not is judged, and whether middle-session certificates are legal or not is judged through verification;
s2: logging in the process, after the authentication process determines that the certificate is legal, the user submits a user password and an account number in the IAM, and the user password and the account number are compared and verified through the zero trust gateway;
s3: and (4) a logout flow, wherein after the zero-trust gateway receives the hijacked logout request, the middle-session in the cache is cleared and redirected to a login page.
As a further description of the above technical solution:
in step S1, the zero-trust gateway checks cookies for all http traffic flowing through, determines whether a midle-session field exists, and redirects to a login page if the midle-session field does not exist, indicating that the credential is illegal.
As a further description of the above technical solution:
the specific method for verifying and judging whether the middle-session voucher is legal in step S1 is to take out the value of the middle-session in the cookie and perform comparison, retrieval and analysis in the cache.
As a further description of the above technical solution:
when a value corresponding to the value of the middle-session is retrieved from the cache, the voucher is legal, and the voucher is passed and recorded.
As a further description of the above technical solution:
and when the value corresponding to the value of the midle-session is not retrieved from the cache, the certificate is illegal, and the login page is redirected.
As a further description of the above technical solution:
in the step S2, the zero trust gateway performs comparison and verification, and if the verification is passed, an access credential corresponding to the application is generated according to an authentication algorithm configured correspondingly to the application, and the access credential is returned to the browser through the set-cookie, and a new midle-session is generated and stored in the cache.
As a further description of the above technical solution:
the method further comprises a fusion process, wherein the fusion process specifically comprises the following steps:
s4.1: generating an empty main dom-tree by templating;
s4.2: extracting div \ table \ form in html of respective application through Xpath as a basic element,
s4.3: and mounting the extracted basic elements into the main dom-tree in the form of iframe.
The invention provides an application fusion scheme under a zero trust concept. The method has the following beneficial effects:
the application fusion scheme under the zero trust concept realizes the check and verification of all http flow flowing through the zero trust gateway, realizes the comparison and verification of a user password and an account password in an IAM, simultaneously realizes the idea that page elements are services, and completes the creation of a new single-page application.
Drawings
FIG. 1 is a schematic diagram of an authentication process in the present invention;
FIG. 2 is a schematic diagram of a login process in the present invention;
FIG. 3 is a diagram illustrating a logout procedure according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1-3, an application fusion scheme under the zero trust concept includes the following steps:
s1: the authentication process comprises the steps that all http traffic flowing through is checked for cookies through the zero trust gateway, whether a middle-session field exists in the cookies or not is judged, and whether middle-session certificates are legal or not is judged through verification;
s2: logging in the process, after the authentication process determines that the certificate is legal, the user submits a user password and an account number in the IAM, and the user password and the account number are compared and verified through the zero trust gateway;
s3: and (4) a logout flow, wherein after the zero-trust gateway receives the hijacked logout request, the middle-session in the cache is cleared and redirected to a login page.
In step S1, the zero-trust gateway checks cookies for all http traffic flowing through, determines whether a middle-session field exists, and redirects to a login page if no middle-session field exists, which indicates that the credential is illegal.
In step S1, the specific method for verifying and determining whether the midle-session credential is legitimate is to take out the value of the midle-session in the cookie and perform a comparison, retrieval and analysis in the cache.
When a value corresponding to the value of the middle-session is retrieved from the cache, the voucher is legal, and the voucher passes and is recorded;
and when the value corresponding to the value of the midle-session is not retrieved from the cache, the certificate is illegal, and the login page is redirected.
And step S2, comparing and checking through the zero trust gateway, if the check is passed, generating an access certificate corresponding to the application according to the authentication algorithm correspondingly configured to the application, returning the access certificate to the browser through the set-cookie, and generating a new midle-session to be stored in the cache.
The method further comprises a fusion process, wherein the fusion process specifically comprises the following steps:
s4.1: generating an empty main dom-tree by templating;
s4.2: div \ table \ form in html of respective application is extracted through XPath to be used as a basic element, wherein XPath is XML path language which is used for determining the language of a certain part of position in an XML document, and html is hypertext markup language and is markup language. The document format on the network can be unified through the labels, so that the scattered Internet resources are connected into a logic whole.
S4.3: and mounting the extracted basic elements into the main dom-tree in the form of iframe, wherein the iframe is an html tag.
Specifically, the zero-trust gateway in the authentication process, the login process and the logout process realizes single sign-on of all applications, on the basis, an empty main dom-tree is generated by templating according to needs, div \ table \ form in html of each application is extracted through Xpath and is used as a basic element, the basic element is mounted in the main dom-tree in the form of iframe, the creation of new single-page applications is completed by the idea that page elements are services,
in the new single-page application, a user can log in at one time, the login state endowment in all iframe areas is realized, smooth operation is carried out, the customization development cost of the application can be greatly reduced in the fusion process, and repeated multi-head development is avoided.
In the description herein, references to the description of "one embodiment," "an example," "a specific example," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (7)

1. An application fusion scheme under a zero trust concept is characterized by comprising the following steps:
s1: the authentication process comprises the steps that all http traffic flowing through is checked for cookies through the zero trust gateway, whether a middle-session field exists in the cookies or not is judged, and whether middle-session certificates are legal or not is judged through verification;
s2: logging in the process, after the authentication process determines that the certificate is legal, the user submits a user password and an account number in the IAM, and the user password and the account number are compared and verified through the zero trust gateway;
s3: and (4) a logout flow, wherein after the zero-trust gateway receives the hijacked logout request, the middle-session in the cache is cleared and redirected to a login page.
2. The application fusion scheme under the zero trust concept of claim 1, wherein in step S1, the zero trust gateway checks cookies for all http traffic flowing through, determines whether a midle-session field exists, and redirects to a login page if no midle-session field exists, which indicates that the credential is illegal.
3. The application fusion scheme under the zero trust concept of claim 1, wherein the specific method for verifying and judging whether the midle-session voucher is legal in step S1 is to extract a value of the midle-session in the cookie and perform a comparative retrieval analysis in a cache.
4. The application fusion scheme under the zero trust concept of claim 3, wherein when a value corresponding to the value of the middle-session is retrieved from the cache, it indicates that the credential is legal, and the credential is passed and recorded.
5. The application fusion scheme under the zero trust concept of claim 3, wherein when the value corresponding to the value of the middle-session is not retrieved from the cache, it indicates that the credential is illegal, and the credential is redirected to the login page.
6. The application fusion scheme under the zero trust concept as claimed in claim 1, wherein in step S2, the zero trust gateway performs comparison and verification, and if the verification is passed, according to the authentication algorithm configured correspondingly to the application, generates an access credential corresponding to the application, and returns the access credential to the browser through the set-cookie, and generates a new midle-session to be stored in the cache.
7. The application fusion scheme under the zero trust concept as claimed in claim 1, further comprising a fusion process, wherein the fusion process specifically comprises the following steps:
s4.1: generating an empty main dom-tree by templating;
s4.2: extracting div \ table \ form in html of respective application through Xpath as a basic element,
s4.3: and mounting the extracted basic elements into the main dom-tree in the form of iframe.
CN202011625802.3A 2020-12-30 2020-12-30 Application fusion scheme under zero trust concept Active CN112788019B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011625802.3A CN112788019B (en) 2020-12-30 2020-12-30 Application fusion scheme under zero trust concept

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011625802.3A CN112788019B (en) 2020-12-30 2020-12-30 Application fusion scheme under zero trust concept

Publications (2)

Publication Number Publication Date
CN112788019A true CN112788019A (en) 2021-05-11
CN112788019B CN112788019B (en) 2023-04-07

Family

ID=75754479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011625802.3A Active CN112788019B (en) 2020-12-30 2020-12-30 Application fusion scheme under zero trust concept

Country Status (1)

Country Link
CN (1) CN112788019B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023069129A1 (en) * 2021-10-18 2023-04-27 Sophos Limited Network appliances for secure enterprise resources
US11663030B2 (en) 2021-10-18 2023-05-30 Sophos Limited Extending expiration of user sessions with authentication refresh

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1205058A2 (en) * 1999-08-05 2002-05-15 Sun Microsystems, Inc. Access management system and method
CN101572608A (en) * 2009-06-17 2009-11-04 杭州华三通信技术有限公司 Method and device for acquiring once-login parameters
CN103078912A (en) * 2012-12-27 2013-05-01 北京思特奇信息技术股份有限公司 Single-point logging method and system
CN103179134A (en) * 2013-04-19 2013-06-26 中国建设银行股份有限公司 Single sign on method and system based on Cookie and application server thereof
CN103188295A (en) * 2011-12-28 2013-07-03 上海格尔软件股份有限公司 WEB single sign-on method completely transparent to user and application
CN105592003A (en) * 2014-10-22 2016-05-18 北京拓尔思信息技术股份有限公司 Cross-domain single sign-on method and system based on notification
CN107835248A (en) * 2017-11-13 2018-03-23 暴风集团股份有限公司 Cookie information sharing method, device and terminal
CN109165500A (en) * 2018-09-04 2019-01-08 山东浪潮云投信息科技有限公司 A kind of single sign-on authentication system and method based on cross-domain technology
WO2019157333A1 (en) * 2018-02-08 2019-08-15 Nussbaum Jared Peeirs:passive evaluation of endpoint identity and risk as a surrogate authentication factor
CN110661798A (en) * 2019-09-23 2020-01-07 紫光云(南京)数字技术有限公司 Authentication method based on authentication platform
CN110753045A (en) * 2019-10-14 2020-02-04 紫光云(南京)数字技术有限公司 Single sign-on method between different domains
CN110909290A (en) * 2019-12-05 2020-03-24 杭州安恒信息技术股份有限公司 Method and system for combining multiple systems into large single-page applications
CN111212095A (en) * 2020-04-20 2020-05-29 国网电子商务有限公司 Authentication method, server, client and system for identity information
CN111245791A (en) * 2019-12-31 2020-06-05 熵加网络科技(北京)有限公司 Single sign-on method for realizing management and IT service through reverse proxy
US20200236112A1 (en) * 2019-01-18 2020-07-23 Cisco Technology, Inc. Machine learning-based application posture for zero trust networking
CN111581631A (en) * 2020-05-12 2020-08-25 西安腾营信息科技有限公司 Single sign-on method based on redis
CN112118102A (en) * 2020-10-21 2020-12-22 国网天津市电力公司 A power-specific zero-trust network system
CN112149105A (en) * 2020-10-21 2020-12-29 腾讯科技(深圳)有限公司 Data processing system, method, related equipment and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1205058A2 (en) * 1999-08-05 2002-05-15 Sun Microsystems, Inc. Access management system and method
CN101572608A (en) * 2009-06-17 2009-11-04 杭州华三通信技术有限公司 Method and device for acquiring once-login parameters
CN103188295A (en) * 2011-12-28 2013-07-03 上海格尔软件股份有限公司 WEB single sign-on method completely transparent to user and application
CN103078912A (en) * 2012-12-27 2013-05-01 北京思特奇信息技术股份有限公司 Single-point logging method and system
CN103179134A (en) * 2013-04-19 2013-06-26 中国建设银行股份有限公司 Single sign on method and system based on Cookie and application server thereof
CN105592003A (en) * 2014-10-22 2016-05-18 北京拓尔思信息技术股份有限公司 Cross-domain single sign-on method and system based on notification
CN107835248A (en) * 2017-11-13 2018-03-23 暴风集团股份有限公司 Cookie information sharing method, device and terminal
WO2019157333A1 (en) * 2018-02-08 2019-08-15 Nussbaum Jared Peeirs:passive evaluation of endpoint identity and risk as a surrogate authentication factor
CN109165500A (en) * 2018-09-04 2019-01-08 山东浪潮云投信息科技有限公司 A kind of single sign-on authentication system and method based on cross-domain technology
US20200236112A1 (en) * 2019-01-18 2020-07-23 Cisco Technology, Inc. Machine learning-based application posture for zero trust networking
CN110661798A (en) * 2019-09-23 2020-01-07 紫光云(南京)数字技术有限公司 Authentication method based on authentication platform
CN110753045A (en) * 2019-10-14 2020-02-04 紫光云(南京)数字技术有限公司 Single sign-on method between different domains
CN110909290A (en) * 2019-12-05 2020-03-24 杭州安恒信息技术股份有限公司 Method and system for combining multiple systems into large single-page applications
CN111245791A (en) * 2019-12-31 2020-06-05 熵加网络科技(北京)有限公司 Single sign-on method for realizing management and IT service through reverse proxy
CN111212095A (en) * 2020-04-20 2020-05-29 国网电子商务有限公司 Authentication method, server, client and system for identity information
CN111581631A (en) * 2020-05-12 2020-08-25 西安腾营信息科技有限公司 Single sign-on method based on redis
CN112118102A (en) * 2020-10-21 2020-12-22 国网天津市电力公司 A power-specific zero-trust network system
CN112149105A (en) * 2020-10-21 2020-12-29 腾讯科技(深圳)有限公司 Data processing system, method, related equipment and storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
冀托: "【零信任】详解零信任架构中的安全网关", 《HTTP://WWW.CHINAAET.COM/ARTICLE/3000123465》 *
冀托: "详解零信任架构中的安全网关", 《HTTPS://ZHUANLAN.ZHIHU.COM/P/265865597》 *
张宇,张妍: "零信任研究综述", 《信息安全研究》 *
蔺旭冉,毛天宇: "零信任安全架构技术研究和应用思考", 《中国核电》 *
金瀚信安: "详解零信任架构中的安全网关", 《HTTP://WWW.JINHANSAFE.COM/2105.HTML》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023069129A1 (en) * 2021-10-18 2023-04-27 Sophos Limited Network appliances for secure enterprise resources
US11663030B2 (en) 2021-10-18 2023-05-30 Sophos Limited Extending expiration of user sessions with authentication refresh
US12153948B2 (en) 2021-10-18 2024-11-26 Sophos Limited Distributed zero trust network access
US12159158B2 (en) 2021-10-18 2024-12-03 Sophos Limited Extending expiration of user sessions with authentication refresh
US12210895B2 (en) 2021-10-18 2025-01-28 Sophos Limited Updating a cluster of nodes in a network appliance
US12299472B2 (en) 2021-10-18 2025-05-13 Sophos Limited Executable policy declarations for network security
US12321771B2 (en) 2021-10-18 2025-06-03 Sophos Limited Software rollback of cluster of network devices
US12474945B2 (en) 2021-10-18 2025-11-18 Sophos Limited Network configuration update

Also Published As

Publication number Publication date
CN112788019B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
KR100884714B1 (en) An application protection method, a method for preventing an application from running outside an authorized operating range, an application security layer implementation system, and a computer-readable recording medium
EP2005698B1 (en) Method for providing web application security
US7302480B2 (en) Monitoring the flow of a data stream
Damiani et al. Fine grained access control for SOAP e-services
US7882555B2 (en) Application layer security method and system
EP1361723B1 (en) Maintaining authentication states for resources accessed in a stateless environment
US20120090030A1 (en) Identifying bots
US20040123144A1 (en) Method and system for authentication using forms-based single-sign-on operations
CN111431838A (en) Method and device for single-point login and single-point logout in cluster and API gateway
WO2005069823A2 (en) Centralized transactional security audit for enterprise systems
US20040010710A1 (en) Method and system for filtering requests to a web site
CN109688105A (en) A method and system for generating threat alarm information
EP3926926B1 (en) Method and system for delivering restricted-access resources using a content delivery network
CN111181924A (en) Web application firewall method and system based on application gateway
CN112929391B (en) Method for realizing cross-platform identity authentication based on single sign-on
CN109936565A (en) Method, apparatus, computer equipment and storage medium for logging in to multiple service clusters
CN112788019B (en) Application fusion scheme under zero trust concept
CN111818088A (en) Authorization mode management method and device, computer equipment and readable storage medium
CN107992771A (en) A kind of data desensitization method and device
CN110753045A (en) Single sign-on method between different domains
CN117240533A (en) A unified authentication method and device based on enterprise service gateway
CN112491895A (en) Identity authentication method, storage medium and system based on micro-service
CN119583099A (en) Service scheduling method, scheduling component, device and medium based on scheduling component
Duraisamy et al. A server side solution for protection of web applications from cross-site scripting attacks
CN117527377A (en) A method to identify whether there is an authentication mechanism on a system interface based on traffic data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant