CN114374529B - Resource access method, device, system, electronic device, medium and program - Google Patents
Resource access method, device, system, electronic device, medium and program Download PDFInfo
- Publication number
- CN114374529B CN114374529B CN202111406965.7A CN202111406965A CN114374529B CN 114374529 B CN114374529 B CN 114374529B CN 202111406965 A CN202111406965 A CN 202111406965A CN 114374529 B CN114374529 B CN 114374529B
- Authority
- CN
- China
- Prior art keywords
- virtual private
- private network
- user terminal
- server
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 98
- 238000012795 verification Methods 0.000 claims abstract description 195
- 238000013475 authorization Methods 0.000 claims abstract description 161
- 238000004891 communication Methods 0.000 claims abstract description 74
- 239000003999 initiator Substances 0.000 claims description 44
- 238000004590 computer program Methods 0.000 claims description 11
- 238000009434 installation Methods 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 6
- 230000008569 process Effects 0.000 abstract description 17
- 238000010586 diagram Methods 0.000 description 13
- 230000004083 survival effect Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 3
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 3
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 3
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 3
- 235000014510 cooky Nutrition 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 210000004258 portal system Anatomy 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及互联网技术领域,尤其涉及一种资源访问方法、装置、系统、电子设备、介质及程序。The present invention relates to the field of Internet technology, and in particular to a resource access method, device, system, electronic device, medium and program.
背景技术Background technique
随着Web的普及和远程办公的兴起,越来越多的企业采用虚拟专用网络技术使员工接入到企业网络。随着企业规模的增长,企业员工的身份也多种多样,有正式员工、外包员工等等。各种身份的员工都有访问企业网络的需求,而不同身份的员工所能访问的企业应用又不尽相同。有的应用在互联网可以直接访问,有的则需要通过虚拟专用网络客户端连接到虚拟专用网络之后才能访问。With the popularity of the Web and the rise of remote work, more and more companies are using virtual private network technology to allow employees to access the corporate network. As the scale of enterprises grows, the identities of corporate employees are also diverse, including regular employees, outsourced employees, and so on. Employees of various identities have the need to access the corporate network, and employees of different identities can access different corporate applications. Some applications can be accessed directly on the Internet, while others can only be accessed after connecting to the virtual private network through a virtual private network client.
由于Web浏览器和虚拟专用网络客户端属于不同的应用程序,受操作系统的安全策略限制,不同的应用程序之间的会话不能共享。所以用户在通过Web浏览器登录企业门户服务器时需要进行登录认证,在访问企业网络内网资源时,需要接入虚拟专用网络,再次登录虚拟专用网络服务器。重复登录不仅带来了不好的用户体验,而且,由于多次输入账号及密码,增加了用户密码泄露的风险,降低了整个系统的安全性。Since the Web browser and the VPN client are different applications, they cannot share sessions between different applications due to the security policy restrictions of the operating system. Therefore, when users log in to the enterprise portal server through a Web browser, they need to log in and authenticate. When accessing the intranet resources of the enterprise network, they need to access the VPN and log in to the VPN server again. Repeated login not only brings a bad user experience, but also increases the risk of password leakage due to multiple account and password input, which reduces the security of the entire system.
对于现有技术中为了访问企业网络的内网资源过程中,需要多次登录,登录过程较为复杂,安全性较低的缺陷,现亟需一种能够克服上述缺陷的技术方案。In order to access the intranet resources of the enterprise network in the prior art, multiple logins are required, the login process is relatively complicated, and the security is low. There is an urgent need for a technical solution that can overcome the above-mentioned shortcomings.
发明内容Summary of the invention
本发明提供一种资源访问方法、系统、电子设备、存储介质及程序,用以解决现有技术中访问企业的内部网络资源过程中,需要多次登录,登录过程较为复杂,安全性较低的缺陷,实现快捷安全登录。The present invention provides a resource access method, system, electronic device, storage medium and program to solve the defects of the prior art that multiple logins are required during access to the internal network resources of an enterprise, the login process is relatively complicated and the security is low, and realize fast and secure login.
本发明提供一种资源访问方法,包括:The present invention provides a resource access method, comprising:
向企业门户服务器发送登录请求,以供所述企业门户服务器对用户进行身份认证;Sending a login request to the enterprise portal server so that the enterprise portal server can authenticate the user;
接收所述企业门户服务器在所述登录请求通过的情况下返回的授权凭证;Receiving the authorization credential returned by the enterprise portal server when the login request is approved;
通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求,以供所述虚拟专用网络服务器对用户进行身份验证;其中,所述验证请求中携带有所述授权凭证;Sending a verification request to a virtual private network server through a virtual private network client, so that the virtual private network server can authenticate the user; wherein the verification request carries the authorization credential;
在所述验证请求验证通过的情况下,利用所述虚拟专用网络客户端建立与所述虚拟专用网络服务器之间的加密通讯隧道,以通过所述加密通讯隧道访问内网资源。When the verification request is successfully verified, the virtual private network client is used to establish an encrypted communication tunnel with the virtual private network server to access intranet resources through the encrypted communication tunnel.
根据本发明提供的一种资源访问方法,所述向企业门户服务器发送登录请求之后,所述通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求之前,方法还包括:According to a resource access method provided by the present invention, after sending a login request to the enterprise portal server and before sending a verification request to the virtual private network server through the virtual private network client, the method further includes:
检测是否安装有所述虚拟专用网络客户端;Detecting whether the virtual private network client is installed;
在未检测到所述虚拟专用网络客户端的情况下,提示安装所述虚拟专用网络客户端;安装完成后再次执行所述检测是否安装有所述虚拟专用网络客户端的步骤;In the case where the virtual private network client is not detected, prompting to install the virtual private network client; after the installation is completed, executing the step of detecting whether the virtual private network client is installed again;
在检测到所述虚拟专用网络客户端的情况下,启动所述虚拟专用网络客户端。In case the virtual private network client is detected, the virtual private network client is started.
根据本发明提供的一种资源访问方法,所述验证请求中携带有验证请求发起者的IP地址信息,且所述授权凭证携带有登录请求发起者的IP地址信息,以供所述虚拟网络服务器验证IP地址一致性。According to a resource access method provided by the present invention, the verification request carries the IP address information of the initiator of the verification request, and the authorization credential carries the IP address information of the initiator of the login request, so that the virtual network server can verify the consistency of the IP addresses.
本发明还提供一种资源访问方法,包括:The present invention also provides a resource access method, comprising:
接收用户终端发送的验证请求;其中,所述验证请求携带有授权凭证;Receiving a verification request sent by a user terminal; wherein the verification request carries an authorization certificate;
根据所述授权凭证,向企业门户服务器请求用户信息;Requesting user information from the enterprise portal server according to the authorization credential;
接收所述企业门户服务器返回的用户信息,并根据所述用户信息对所述验证请求进行验证;Receiving user information returned by the enterprise portal server, and verifying the verification request according to the user information;
在验证通过的情况下,向用户终端发送验证通过信息,并建立与所述用户终端之间的加密通讯隧道,以供所述用户终端通过所述加密通讯隧道访问内网资源。If the verification is successful, verification success information is sent to the user terminal, and an encrypted communication tunnel is established between the user terminal and the user terminal, so that the user terminal can access intranet resources through the encrypted communication tunnel.
根据本发明提供的一种资源访问方法,所述验证请求中携带有验证请求发起者的IP地址信息,且所述授权凭证携带有登录请求发起者的IP地址信息;According to a resource access method provided by the present invention, the verification request carries the IP address information of the initiator of the verification request, and the authorization credential carries the IP address information of the initiator of the login request;
相应地,所述接收用户终端的验证请求之后,所述根据所述授权凭证,向企业门户服务器请求用户信息之前,方法还包括:Correspondingly, after receiving the verification request from the user terminal and before requesting the user information from the enterprise portal server according to the authorization credential, the method further includes:
在所述验证请求中携带的验证请求发起者的IP地址信息与所述授权凭证携带的登录请求发起者的IP地址信息不一致的情况下,确认所述验证请求验证不通过;If the IP address information of the initiator of the verification request carried in the verification request is inconsistent with the IP address information of the initiator of the login request carried in the authorization credential, confirming that the verification request fails the verification;
在所述验证请求中携带的验证请求发起者的IP地址信息与所述授权凭证携带的登录请求发起者的IP地址信息一致的情况下,执行所述根据所述授权凭证,向企业门户服务器请求用户信息的步骤。When the IP address information of the initiator of the verification request carried in the verification request is consistent with the IP address information of the initiator of the login request carried in the authorization credential, the step of requesting user information from the enterprise portal server according to the authorization credential is performed.
本发明还提供一种资源访问方法,包括:接收用户终端发送的登录请求;The present invention also provides a resource access method, comprising: receiving a login request sent by a user terminal;
在所述登录请求通过的情况下,向所述用户终端发送授权凭证;If the login request is approved, sending an authorization certificate to the user terminal;
接收虚拟专用网络服务器发送的用户信息请求;receiving a user information request sent by a virtual private network server;
在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息,以供所述虚拟专用网络服务器对用户终端发送的验证请求进行验证。In the case where the user information request carries the authorization ticket, the corresponding user information is sent to the virtual private network server according to the authorization ticket, so that the virtual private network server can verify the verification request sent by the user terminal.
根据本发明提供的一种资源访问方法,所述在所述登录请求通过的情况下,向所述用户终端发送授权凭证之后,方法还包括:According to a resource access method provided by the present invention, when the login request is passed, after sending the authorization credential to the user terminal, the method further includes:
响应所述用户终端的开放资源访问请求,向所述用户终端返回开放资源链接,以供所述用户终端访问对应的开放资源。In response to the open resource access request of the user terminal, an open resource link is returned to the user terminal so that the user terminal can access the corresponding open resource.
根据本发明提供的一种资源访问方法,所述在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息之后,方法还包括:According to a resource access method provided by the present invention, when the user information request carries the authorization credential, after sending the corresponding user information to the virtual private network server according to the authorization credential, the method further includes:
在所述授权凭证对应的验证请求通过的情况下,响应所述用户终端的内网资源访问请求,向所述用户终端返回内网资源链接,以供所述用户终端利用与虚拟专用网络服务器建立的加密通讯隧道访问对应的内网资源。When the verification request corresponding to the authorization credential passes, the intranet resource access request of the user terminal is responded to, and the intranet resource link is returned to the user terminal so that the user terminal can access the corresponding intranet resource by using the encrypted communication tunnel established with the virtual private network server.
本发明还提供一种资源访问装置,包括:The present invention also provides a resource access device, comprising:
登录请求发送单元,用于向企业门户服务器发送登录请求,以供所述企业门户服务器对用户进行身份认证;A login request sending unit, used to send a login request to the enterprise portal server so that the enterprise portal server can authenticate the user;
授权凭证接收单元,用于接收所述企业门户服务器在所述登录请求通过的情况下返回的授权凭证;An authorization credential receiving unit, configured to receive the authorization credential returned by the enterprise portal server when the login request is approved;
验证请求发送单元,用于通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求,以供所述虚拟专用网络服务器对用户进行身份验证;其中,所述验证请求中携带有所述授权凭证;A verification request sending unit, used to send a verification request to a virtual private network server through a virtual private network client, so that the virtual private network server can authenticate the identity of the user; wherein the verification request carries the authorization credential;
第一加密通讯单元,用于在所述验证请求验证通过的情况下,利用所述虚拟专用网络客户端建立与所述虚拟专用网络服务器之间的加密通讯隧道,以通过所述加密通讯隧道访问内网资源。The first encryption communication unit is used to establish an encrypted communication tunnel between the virtual private network client and the virtual private network server when the verification request is verified successfully, so as to access the intranet resources through the encrypted communication tunnel.
本发明还提供一种资源访问装置,包括:The present invention also provides a resource access device, comprising:
验证请求接收单元,用于接收用户终端发送的验证请求;其中,所述验证请求携带有授权凭证;A verification request receiving unit, configured to receive a verification request sent by a user terminal; wherein the verification request carries an authorization certificate;
用户信息请求单元,用于根据所述授权凭证,向企业门户服务器请求用户信息;A user information request unit, configured to request user information from the enterprise portal server according to the authorization credential;
验证请求验证单元,用于接收所述企业门户服务器返回的用户信息,并根据所述用户信息对所述验证请求进行验证;A verification request verification unit, configured to receive the user information returned by the enterprise portal server and verify the verification request according to the user information;
第二加密通讯单元,用于在验证通过的情况下,向用户终端发送验证通过信息,并建立与所述用户终端之间的加密通讯隧道,以供所述用户终端通过所述加密通讯隧道访问内网资源。The second encryption communication unit is used to send verification pass information to the user terminal when the verification is passed, and establish an encrypted communication tunnel with the user terminal so that the user terminal can access intranet resources through the encrypted communication tunnel.
本发明还提供一种资源访问装置,包括:The present invention also provides a resource access device, comprising:
登录请求接收单元,用于接收用户终端发送的登录请求;A login request receiving unit, used to receive a login request sent by a user terminal;
授权凭证发送单元,用于在所述登录请求通过的情况下,向所述用户终端发送授权凭证;An authorization credential sending unit, configured to send an authorization credential to the user terminal if the login request is approved;
信息请求接收单元,用于接收虚拟专用网络服务器发送的用户信息请求;An information request receiving unit, used to receive a user information request sent by a virtual private network server;
用户信息发送单元,用于在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息,以供所述虚拟专用网络服务器对用户终端发送的验证请求进行验证。The user information sending unit is used to send corresponding user information to the virtual private network server according to the authorization certificate when the user information request carries the authorization certificate, so that the virtual private network server can verify the verification request sent by the user terminal.
本发明还提供一种资源访问方法系统,包括:用户终端、虚拟专用网络服务器、企业门户服务器;The present invention also provides a resource access method system, comprising: a user terminal, a virtual private network server, and an enterprise portal server;
所述用户终端,用于向企业门户服务器发送登录请求,以供所述企业门户服务器对用户进行身份认证;接收所述企业门户服务器在所述登录请求通过的情况下返回的授权凭证;通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求,以供所述虚拟专用网络服务器对用户进行身份验证;其中,所述验证请求中携带有所述授权凭证;在所述验证请求验证通过的情况下,利用所述虚拟专用网络客户端建立与所述虚拟专用网络服务器之间的加密通讯隧道,以通过所述加密通讯隧道访问内网资源;The user terminal is used to send a login request to the enterprise portal server so that the enterprise portal server can authenticate the user; receive the authorization certificate returned by the enterprise portal server when the login request is passed; send a verification request to the virtual private network server through the virtual private network client so that the virtual private network server can authenticate the user; wherein the verification request carries the authorization certificate; when the verification request is passed, the virtual private network client is used to establish an encrypted communication tunnel with the virtual private network server to access intranet resources through the encrypted communication tunnel;
所述虚拟专用网络服务器,用于接收用户终端发送的验证请求;其中,所述验证请求携带有授权凭证;根据所述授权凭证,向企业门户服务器请求用户信息;接收所述企业门户服务器返回的用户信息,并根据所述用户信息对所述验证请求进行验证;在验证通过的情况下,向用户终端发送验证通过信息,并建立与所述用户终端之间的加密通讯隧道,以供所述用户终端通过所述加密通讯隧道访问内网资源;The virtual private network server is used to receive a verification request sent by a user terminal; wherein the verification request carries an authorization credential; based on the authorization credential, request user information from the enterprise portal server; receive the user information returned by the enterprise portal server, and verify the verification request based on the user information; if the verification is successful, send verification success information to the user terminal, and establish an encrypted communication tunnel with the user terminal, so that the user terminal can access intranet resources through the encrypted communication tunnel;
所述企业门户服务器,用于接收用户终端发送的登录请求;在所述登录请求通过的情况下,向所述用户终端发送授权凭证;接收虚拟专用网络服务器发送的用户信息请求;在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息,以供所述虚拟专用网络服务器对用户终端发送的验证请求进行验证。The enterprise portal server is used to receive a login request sent by a user terminal; if the login request is approved, send an authorization credential to the user terminal; receive a user information request sent by a virtual private network server; if the user information request carries the authorization credential, send corresponding user information to the virtual private network server based on the authorization credential, so that the virtual private network server can verify the verification request sent by the user terminal.
本发明还提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如上述任一种所述资源访问方法的全部或部分步骤。The present invention also provides an electronic device, comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein when the processor executes the program, all or part of the steps of any of the resource access methods described above are implemented.
本发明还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如上述任一种所述资源访问方法的全部或部分步骤。The present invention also provides a non-transitory computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, all or part of the steps of any of the resource access methods described above are implemented.
本发明提供的一种资源访问方法、装置、系统、电子设备、介质及程序,本实施例中,在通过互联网直接登录企业门户服务器后,自动向虚拟专用网络服务器发送携带有授权凭证的验证请求,实现静默登录,无需用户重复输入身份认证信息,由于授权凭证是非明文的加密字符串,并不是用户登录企业门户的身份认证信息,因而提升了登录虚拟专用网络服务器过程的安全性;并且,在验证请求验证通过的情况下,用户终端通过虚拟专用网络客户端建立与虚拟专用网络服务器之间的加密通讯隧道,便于安全便捷地访问企业门户服务器中管理的内网资源。The present invention provides a resource access method, device, system, electronic device, medium and program. In this embodiment, after directly logging into an enterprise portal server through the Internet, a verification request carrying an authorization credential is automatically sent to a virtual private network server to achieve silent login without the need for the user to repeatedly enter identity authentication information. Since the authorization credential is a non-plaintext encrypted string and is not the identity authentication information of the user logging into the enterprise portal, the security of the process of logging into the virtual private network server is improved; and, when the verification request is verified, the user terminal establishes an encrypted communication tunnel with the virtual private network server through the virtual private network client, which facilitates safe and convenient access to intranet resources managed in the enterprise portal server.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本发明或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the present invention or the prior art, the following briefly introduces the drawings required for use in the embodiments or the description of the prior art. Obviously, the drawings described below are some embodiments of the present invention. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.
图1是本发明提供的一种资源访问方法对应的网络结构图;FIG1 is a network structure diagram corresponding to a resource access method provided by the present invention;
图2是本发明提供的一种资源访问方法的流程示意图;FIG2 is a schematic diagram of a flow chart of a resource access method provided by the present invention;
图3是本发明提供的另一种资源访问方法的流程示意图;FIG3 is a schematic flow chart of another resource access method provided by the present invention;
图4是本发明提供的又一种资源访问方法的流程示意图;FIG4 is a flow chart of another resource access method provided by the present invention;
图5是本发明提供的一种资源访问装置的结构示意图;FIG5 is a schematic diagram of the structure of a resource access device provided by the present invention;
图6是本发明提供的另一种资源访问装置的结构示意图;FIG6 is a schematic diagram of the structure of another resource access device provided by the present invention;
图7是本发明提供的又一种资源访问装置的结构示意图;7 is a schematic diagram of the structure of another resource access device provided by the present invention;
图8是本发明提供的一种资源访问系统的结构示意图;FIG8 is a schematic diagram of the structure of a resource access system provided by the present invention;
图9是本发明提供的电子设备的结构示意图。FIG. 9 is a schematic diagram of the structure of an electronic device provided by the present invention.
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚,下面将结合本发明中的附图,对本发明中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with the drawings of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.
Web门户指的是将不同来源的信息以一种整齐划一的形式整理、储存并呈现的网站。用户可以根据信息来源、信息类型、关键字检索以及其他方式,来筛选并获取在门户网站内发布的所有内容。而企业门户则指的是企业IT部门针对企业员工建设的Web门户系统,员工可以通过企业门户系统快速访问企业提供的网络资源,获取企业的通知、新闻等信息,企业门户是企业对员工的重要信息通道。Web portal refers to a website that organizes, stores and presents information from different sources in a uniform form. Users can filter and obtain all content published on the portal website based on information source, information type, keyword search and other methods. Enterprise portal refers to the Web portal system built by the enterprise IT department for enterprise employees. Employees can quickly access the network resources provided by the enterprise through the enterprise portal system and obtain enterprise notifications, news and other information. The enterprise portal is an important information channel for enterprises to employees.
随着远程办公的兴起,员工需要远程访问企业的门户,但是,员工远程直接通过互联网登录访问企业门户只能够访问到企业门户中的开放资源(即对互联网开放的,通过互联网直接连接并登录后可以访问的资源),对于企业门户中安全等级更高的内部网络资源(即内网资源),则需要连接虚拟专用网络(Virtual Private Network,即VPN)才能够访问,因此远程员工访问内网资源时需要多次输入账号、密码(两次登录的账号密码可能一致,也可能不一致)。重复登录不仅带来了不好的用户体验,而且,由于多次输入账号、密码,增加了用户密码泄露的风险,降低了整个系统的安全性。With the rise of remote work, employees need to access the enterprise portal remotely. However, employees can only access the open resources in the enterprise portal (i.e., resources that are open to the Internet and can be accessed after directly connecting and logging in through the Internet) by logging in remotely through the Internet. For the internal network resources (i.e., intranet resources) with a higher security level in the enterprise portal, it is necessary to connect to a virtual private network (VPN) to access them. Therefore, remote employees need to enter their account and password multiple times when accessing intranet resources (the account and password for the two logins may or may not be the same). Repeated login not only brings a bad user experience, but also increases the risk of user password leakage due to multiple account and password input, reducing the security of the entire system.
本发明提供了一种资源访问方法、装置、系统、电子设备、介质及程序,使得企业员工在登录企业门户之后,可以根据需要,无感知地、便捷地登录连接虚拟专用网络,以访问企业的内部网络资源。The present invention provides a resource access method, device, system, electronic device, medium and program, so that after logging into the enterprise portal, enterprise employees can log in to the virtual private network conveniently and imperceptibly as needed to access the internal network resources of the enterprise.
下面结合图1-图9描述本发明的一种资源访问方法、装置、系统、电子设备、介质及程序。The following describes a resource access method, device, system, electronic device, medium and program of the present invention in conjunction with Figures 1 to 9.
为便于理解本发明提供的一种资源访问方法,以下先对本发明提供的资源访问方法对应的网络结构进行说明。图1是本发明提供的一种资源访问方法对应的网络结构图,如图1所示,企业网络分为互联网可访问部分以及互联网不可访问部分,企业网络中的互联网可访问部分部署有企业门户服务器,企业门户服务器管理着开放资源链接(或开放资源入口)以及内网资源链接(或内网资源入口)。其中,开放资源为安全要求较低,可通过互联网直接登录获取的资源(数据资源、服务资源),内网资源为安全要求较高,无法通过互联网直接登录获取的资源(数据资源、服务资源)。互联网中的用户终端可以通过浏览器直接登录企业门户服务器,但是直接通过互联网登录企业门户服务器后只能够访问到企业门户服务器管理的开放资源链接,通过开放资源链接访问企业网络中互联网可访问部分中部署的开放资源服务器;互联网中的用户终端还可以通过虚拟专用网络客户端连接虚拟专用网络服务器,在企业门户中获取内网资源链接后,进而通过虚拟专用网络服务器接入企业网络中互联网不可访问部分中部署的内网资源服务器,访问内网资源链接对应的内网资源,虚拟专用网络为外网的用户终端访问企业门户服务器提供了一条加密通讯隧道,因而可以安全地访问内网资源。To facilitate understanding of a resource access method provided by the present invention, the network structure corresponding to the resource access method provided by the present invention is first described below. Figure 1 is a network structure diagram corresponding to a resource access method provided by the present invention. As shown in Figure 1, the enterprise network is divided into an Internet accessible part and an Internet inaccessible part. The Internet accessible part of the enterprise network is deployed with an enterprise portal server, and the enterprise portal server manages open resource links (or open resource entrances) and intranet resource links (or intranet resource entrances). Among them, open resources have lower security requirements and can be directly obtained by logging in through the Internet (data resources, service resources), and intranet resources have higher security requirements and cannot be directly obtained by logging in through the Internet (data resources, service resources). User terminals on the Internet can directly log in to the enterprise portal server through a browser, but after logging in to the enterprise portal server directly through the Internet, they can only access the open resource links managed by the enterprise portal server, and access the open resource servers deployed in the Internet accessible part of the enterprise network through the open resource links; user terminals on the Internet can also connect to the virtual private network server through a virtual private network client, obtain the intranet resource link in the enterprise portal, and then access the intranet resource server deployed in the Internet inaccessible part of the enterprise network through the virtual private network server, and access the intranet resources corresponding to the intranet resource link. The virtual private network provides an encrypted communication tunnel for external network user terminals to access the enterprise portal server, so that they can safely access intranet resources.
图2是本发明提供的一种资源访问方法的流程示意图,该方法应用于用户终端,如图2所示,该方法包括:FIG2 is a flow chart of a resource access method provided by the present invention. The method is applied to a user terminal. As shown in FIG2 , the method includes:
S21、向企业门户服务器发送登录请求,以供所述企业门户服务器对用户进行身份认证;S21, sending a login request to the enterprise portal server so that the enterprise portal server can authenticate the user;
具体地,用户终端位于互联网,企业门户服务器部署于企业网络中互联网可直接访问部分。用户终端向企业门户服务器发送登录请求,以供企业门户对用户身份进行认证。发送登录请求的登录客户端可以是安装于用户终端的浏览器,即通过浏览器登录网页向企业门户服务器发送登录请求。Specifically, the user terminal is located on the Internet, and the enterprise portal server is deployed in the part of the enterprise network that is directly accessible from the Internet. The user terminal sends a login request to the enterprise portal server so that the enterprise portal can authenticate the user identity. The login client that sends the login request can be a browser installed on the user terminal, that is, the login request is sent to the enterprise portal server through the browser login webpage.
登录请求中携带有身份认证信息,例如,可以携带用户的账号、密码信息,又或者携带有用户的生物特征信息(如语音、指纹、人脸、虹膜等),以供企业门户服务器对用户身份进行认证。The login request carries identity authentication information, for example, the user's account number and password information, or the user's biometric information (such as voice, fingerprint, face, iris, etc.), so that the enterprise portal server can authenticate the user's identity.
S22、接收所述企业门户服务器在所述登录请求通过的情况下返回的授权凭证;S22, receiving the authorization certificate returned by the enterprise portal server when the login request is approved;
具体地,企业门户服务器根据登录请求中携带的身份认证信息对用户进行认证,在认证通过的情况下,用户终端可以直接访问企业门户服务器中的开放资源链接(不经过下文中的虚拟专用网络服务器),进而获取相应的开放资源。并且,在认证通过的情况下,企业门户服务器还返回授权凭证,授权凭证可以是非明文的加密字符串,该授权凭证可以用于第三方应用访问企业门户服务器。授权凭证还可以设置为具有一定存活时间的凭证信息,以便第三方应用在存活时间段内临时访问企业门户服务器,以提升企业门户管理的安全性。Specifically, the enterprise portal server authenticates the user according to the identity authentication information carried in the login request. If the authentication is successful, the user terminal can directly access the open resource link in the enterprise portal server (without passing through the virtual private network server mentioned below), and then obtain the corresponding open resources. In addition, if the authentication is successful, the enterprise portal server also returns an authorization credential, which can be a non-plaintext encrypted string, and the authorization credential can be used for third-party applications to access the enterprise portal server. The authorization credential can also be set as credential information with a certain survival time, so that third-party applications can temporarily access the enterprise portal server within the survival time period to improve the security of enterprise portal management.
可以理解的是,在企业门户服务器对登录请求认证不通过的情况下,则返回认证失败的反馈信息。进一步地,可以在用户终端提示用户重新输入身份认证信息。It is understandable that, when the enterprise portal server fails to authenticate the login request, it returns a feedback message indicating that the authentication failed. Furthermore, the user can be prompted to re-enter the identity authentication information at the user terminal.
S23、通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求,以供所述虚拟专用网络服务器对用户进行身份验证;其中,所述验证请求中携带有所述授权凭证;S23, sending a verification request to a virtual private network server through a virtual private network client, so that the virtual private network server can authenticate the user; wherein the verification request carries the authorization credential;
具体地,用户终端中发送登录请求的浏览器在接收到企业门户服务器返回的授权凭证后,将授权凭证传递给用户终端内安装的虚拟专用客户端,虚拟专用客户端向虚拟专用网络服务器发送带有该授权凭证的验证请求,以获取虚拟专用网络服务。需要说明的是,虚拟专用客户端是自动根据授权凭证发送验证请求,此过程无需账号、密码信息或用户的生物特征信息等,且无需用户手动输入,实现了静默登录。Specifically, after receiving the authorization credential returned by the enterprise portal server, the browser in the user terminal that sends the login request passes the authorization credential to the virtual private client installed in the user terminal, and the virtual private client sends a verification request with the authorization credential to the virtual private network server to obtain the virtual private network service. It should be noted that the virtual private client automatically sends the verification request based on the authorization credential, and this process does not require account, password information or user's biometric information, etc., and does not require manual input by the user, thus realizing silent login.
另外,需要说明的是,当用户终端为位于企业内网的终端时,则无需连接虚拟专用网络,可以直接访问相应权限的内网资源。进一步地,对于内网用户终端的身份验证,可以根据登录请求的IP地址进行快捷验证,若确认登录请求的IP地址属于内网IP地址,则直接确定验证通过。In addition, it should be noted that when the user terminal is located in the enterprise intranet, it does not need to connect to the virtual private network and can directly access the intranet resources with corresponding permissions. Furthermore, for the identity authentication of the intranet user terminal, a quick verification can be performed based on the IP address of the login request. If it is confirmed that the IP address of the login request belongs to the intranet IP address, the verification is directly determined to be passed.
S24、在所述验证请求验证通过的情况下,利用所述虚拟专用网络客户端建立与所述虚拟专用网络服务器之间的加密通讯隧道,以通过所述加密通讯隧道访问内网资源。S24. When the verification request is successfully verified, the virtual private network client is used to establish an encrypted communication tunnel with the virtual private network server to access intranet resources through the encrypted communication tunnel.
具体地,在虚拟专用网络服务器对验证请求验证通过的情况下,为用户终端提供虚拟专用网络服务,建立用户终端与虚拟专用网络服务器之间的加密通讯隧道。加密通讯隧道建立后,用户终端与虚拟专用网络服务器之间的通讯信息均为加密的数据,因而提升了在网络中数据传输的安全性,此时用户终端在获取企业门户中的内网资源链接后,即可通过虚拟专用网络服务器访问该内网资源链接对应的内网资源服务器,以获取相应的内网资源。Specifically, when the virtual private network server verifies the verification request, it provides the user terminal with a virtual private network service and establishes an encrypted communication tunnel between the user terminal and the virtual private network server. After the encrypted communication tunnel is established, the communication information between the user terminal and the virtual private network server is all encrypted data, thereby improving the security of data transmission in the network. At this time, after the user terminal obtains the intranet resource link in the enterprise portal, it can access the intranet resource server corresponding to the intranet resource link through the virtual private network server to obtain the corresponding intranet resources.
另外,需要说明的是,虚拟专用网络(VPN)可以分为基于客户端的可用VPN和基于网络的可用VPN。基于客户端的可用VPN是在单个用户和远程网络之间创建的虚拟专用网络,基于客户端的可用VPN通常涉及一个应用程序,用户通常手动启动可用VPN客户端,并使用用户名和密码登录进行身份验证,客户端在用户计算机和远程网络之间创建一个加密隧道,以便用户通过加密隧道访问远程网络;基于网络的可用VPN能够跨越不信任的网络将两个网络安全地连接在一起。本发明为用户单点远程登录,因此采用基于客户端的虚拟专用网络。In addition, it should be noted that a virtual private network (VPN) can be divided into a client-based available VPN and a network-based available VPN. A client-based available VPN is a virtual private network created between a single user and a remote network. A client-based available VPN usually involves an application. The user usually manually starts the available VPN client and logs in with a username and password for identity authentication. The client creates an encrypted tunnel between the user's computer and the remote network so that the user can access the remote network through the encrypted tunnel; a network-based available VPN can securely connect two networks across untrusted networks. The present invention is a user single-point remote login, so a client-based virtual private network is used.
本实施例中,在通过互联网直接登录企业门户服务器后,自动向虚拟专用网络服务器发送携带有授权凭证的验证请求,实现静默登录,无需用户重复输入身份认证信息,由于授权凭证是非明文的加密字符串,并不是用户登录企业门户服务器的身份认证信息,因而提升了登录虚拟专用网络服务器过程的安全性;并且,在验证请求验证通过的情况下,用户终端通过虚拟专用网络客户端建立与虚拟专用网络服务器之间的加密通讯隧道,便于安全便捷地访问企业门户服务器中管理的内网资源。In this embodiment, after directly logging into the enterprise portal server through the Internet, a verification request carrying the authorization credentials is automatically sent to the virtual private network server to achieve silent login without the need for the user to repeatedly enter the identity authentication information. Since the authorization credential is a non-plaintext encrypted string and is not the identity authentication information of the user logging into the enterprise portal server, the security of the process of logging into the virtual private network server is improved; and, if the verification request is verified successfully, the user terminal establishes an encrypted communication tunnel with the virtual private network server through the virtual private network client, which facilitates safe and convenient access to the intranet resources managed in the enterprise portal server.
基于上述任一实施例,在一个实施例中,所述向企业门户服务器发送登录请求之后,所述通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求之前,方法还包括:Based on any of the above embodiments, in one embodiment, after sending a login request to the enterprise portal server and before sending a verification request to the virtual private network server through the virtual private network client, the method further includes:
检测是否安装有所述虚拟专用网络客户端;Detecting whether the virtual private network client is installed;
在未检测到所述虚拟专用网络客户端的情况下,提示安装所述虚拟专用网络客户端;安装完成后再次执行所述检测是否安装有所述虚拟专用网络客户端的步骤;In the case where the virtual private network client is not detected, prompting to install the virtual private network client; after the installation is completed, executing the step of detecting whether the virtual private network client is installed again;
在检测到所述虚拟专用网络客户端的情况下,启动所述虚拟专用网络客户端。In case the virtual private network client is detected, the virtual private network client is started.
具体地,可以利用特定的本地端口进行监听,监听端口能返回预期的响应信息,用来检测判断用户终端中虚拟专用网络客户端的安装状态。检测过程可以是通过集成的JavaScript SDK完成,也可以通过用户根据需求自行编写的程序实现。在未检测到虚拟专用网络客户端的情况下,则提示安装虚拟专用网络客户端,安装完成后,返回上一步检测用户终端中虚拟专用网络客户端的安装状态的步骤,以便顺利自行启动虚拟专用网络客户端;在检测到虚拟专用网络客户端的情况下,则启动虚拟专用网络客户端,以便自动向虚拟专用网络服务器发送验证请求,以建立与企业门户服务器之间的加密通讯隧道。Specifically, a specific local port can be used for monitoring, and the monitoring port can return the expected response information, which is used to detect and determine the installation status of the virtual private network client in the user terminal. The detection process can be completed through an integrated JavaScript SDK, or it can be implemented by a program written by the user according to needs. If the virtual private network client is not detected, a prompt will be given to install the virtual private network client. After the installation is completed, the previous step of detecting the installation status of the virtual private network client in the user terminal will be returned to so as to smoothly start the virtual private network client by itself; if the virtual private network client is detected, the virtual private network client will be started so as to automatically send a verification request to the virtual private network server to establish an encrypted communication tunnel with the enterprise portal server.
本实施中通过自动检测并自启动虚拟专用网络客户端,无需用户重复手动输入密码连接虚拟专用网络,提升了用户体验。In this implementation, the virtual private network client is automatically detected and automatically started, eliminating the need for the user to repeatedly manually enter a password to connect to the virtual private network, thereby improving the user experience.
基于上述任一实施例,在一个实施例中,所述验证请求中携带有验证请求发起者的IP地址信息,且所述授权凭证携带有登录请求发起者的IP地址信息,以供所述虚拟网络服务器验证IP地址一致性。Based on any of the above embodiments, in one embodiment, the verification request carries the IP address information of the initiator of the verification request, and the authorization credential carries the IP address information of the initiator of the login request, so that the virtual network server can verify the consistency of the IP addresses.
具体地,对于静默登录连接虚拟专用网络服务器的实现,用户终端将登录企业门户服务器的浏览器获取到的授权凭证传递到虚拟专用网络客户端,以用于连接虚拟专用网络服务器,为了防止授权凭证被黑客通过XSS漏洞等方式窃取/篡改,因此虚拟专用网络客户端在登录虚拟专用网络服务器时,需要验证用户IP来源的一致性。具体地,需要在验证请求中携带有验证请求发起者的IP地址信息,在授权凭证中携带有登录请求发起者的IP地址信息,以供虚拟网络服务器在接收到验证请求后,对验证请求发起者的IP地址与授权凭证中携带的登录请求发起者的IP地址进行校验,二者一致则说明授权凭证没有被窃取/篡改,二者不一致则说明有可能存在XSS等漏洞,用户终端进行告警提示。Specifically, for the implementation of silent login to connect to a virtual private network server, the user terminal passes the authorization credential obtained by the browser that logs into the enterprise portal server to the virtual private network client for connecting to the virtual private network server. In order to prevent the authorization credential from being stolen/tampered by hackers through XSS vulnerabilities, the virtual private network client needs to verify the consistency of the user's IP source when logging into the virtual private network server. Specifically, the IP address information of the initiator of the verification request needs to be carried in the verification request, and the IP address information of the initiator of the login request needs to be carried in the authorization credential, so that after receiving the verification request, the virtual network server can verify the IP address of the initiator of the verification request with the IP address of the initiator of the login request carried in the authorization credential. If the two are consistent, it means that the authorization credential has not been stolen/tampered with. If the two are inconsistent, it means that there may be vulnerabilities such as XSS, and the user terminal will issue an alarm prompt.
需要说明的是,XSS漏洞指的是通过注入恶意指令代码到网页,使用户加载并执行攻击者恶意制造的网页程序。这些恶意网页程序通常是JavaScript,但实际上也可以包括Java、VBScript、ActiveX、Flash或者甚至是普通的HTML。攻击成功后,攻击者可能得到包括但不限于更高的权限(如执行危险操作)、私密网页内容、会话和cookie等各种内容。It should be noted that XSS vulnerability refers to the process of injecting malicious instruction codes into web pages, causing users to load and execute web programs maliciously created by attackers. These malicious web programs are usually JavaScript, but in fact they can also include Java, VBScript, ActiveX, Flash or even ordinary HTML. After the attack is successful, the attacker may obtain various contents including but not limited to higher permissions (such as executing dangerous operations), private web content, sessions and cookies.
本实施例中,通过在验证请求中携带有验证请求发起者的IP地址信息,在授权凭证携带有登录请求发起者的IP地址信息,以供虚拟网络服务器验证IP地址一致性,进一步保障了静默登录过程的安全性。In this embodiment, by carrying the IP address information of the initiator of the verification request in the verification request and carrying the IP address information of the initiator of the login request in the authorization credential, so that the virtual network server can verify the consistency of the IP address, the security of the silent login process is further guaranteed.
基于上述任一实施例,在一个实施例中,所述虚拟专用网络客户端为基于安全套接字层协议的虚拟专用网络客户端,所述虚拟专用网络服务器为基于安全套接字层协议的虚拟专用网络服务器。Based on any of the above embodiments, in one embodiment, the virtual private network client is a virtual private network client based on the secure socket layer protocol, and the virtual private network server is a virtual private network server based on the secure socket layer protocol.
具体地,基于安全套接字层协议的虚拟专用网络(SSLVPN),不会受到安装在客户端与服务器之间的防火墙等转换设备(NAT设备)的影响,穿透能力强;可以在任何地点,利用任何设备,连接到相应的网络资源上,是企业远程安全接入的最佳选择。其中,安全套接字层协议(SSL协议)包括SSL记录协议和握手协议,它们共同为应用访问连接提供认证、加密和防篡改功能。SSL握手协议相对于IPSEC协议体系中的IKE(互联网密钥交换协议)协议,主要是用于服务器和客户之间的相互认证,协商加密算法和MAC(Message AuthenticationCode-消息认证码)算法,用于生成在SSL记录协议中使用的加密和认证密钥。Specifically, the virtual private network (SSLVPN) based on the Secure Sockets Layer protocol will not be affected by the conversion devices (NAT devices) such as firewalls installed between the client and the server, and has strong penetration capabilities; it can be connected to the corresponding network resources at any location and using any device, and is the best choice for remote secure access for enterprises. Among them, the Secure Sockets Layer protocol (SSL protocol) includes the SSL record protocol and the handshake protocol, which together provide authentication, encryption and anti-tampering functions for application access connections. Compared with the IKE (Internet Key Exchange Protocol) protocol in the IPSEC protocol system, the SSL handshake protocol is mainly used for mutual authentication between the server and the client, and negotiates encryption algorithms and MAC (Message Authentication Code) algorithms to generate encryption and authentication keys used in the SSL record protocol.
本实施例中通过采用基于安全套接字层协议的虚拟专用网络客户端和基于安全套接字层协议的虚拟专用网络服务器便捷安全地建立了用户终端与企业门户服务器之间的加密通讯隧道。In this embodiment, an encrypted communication tunnel between a user terminal and an enterprise portal server is conveniently and securely established by adopting a virtual private network client based on the secure socket layer protocol and a virtual private network server based on the secure socket layer protocol.
基于上述任一实施例,在一个实施例中,方法还包括:Based on any of the above embodiments, in one embodiment, the method further includes:
将当前时刻可以访问到的企业门户服务器中的资源显示为第一颜色;Display the resources in the enterprise portal server that can be accessed at the current moment in the first color;
将当前时刻无法访问到的企业门户服务器中的资源显示为第二颜色。Resources in the enterprise portal server that are currently inaccessible are displayed in a second color.
具体的,用户终端中还对企业门户服务器中的资源进行颜色区分显示,例如在通过浏览器登录后将可以访问到的企业门户服务器中的开放资源显示为白色背景,将无法访问到的企业门户服务器中的内网资源显示为灰色背景,又例如,在用户终端静默登录连接虚拟专用网络服务器后,用户终端可以访问企业门户服务器中的开放资源及内网资源,此时均调整为白色背景,当然,还可以是针对字体颜色进行设置。第一颜色、第二颜色的具体颜色设置可以根据用户需求自行调整,此处不作限制。Specifically, the user terminal also displays the resources in the enterprise portal server in different colors. For example, after logging in through a browser, the open resources in the enterprise portal server that can be accessed are displayed as a white background, and the intranet resources in the enterprise portal server that cannot be accessed are displayed as a gray background. For another example, after the user terminal silently logs in and connects to the virtual private network server, the user terminal can access the open resources and intranet resources in the enterprise portal server, and at this time, they are all adjusted to a white background. Of course, the font color can also be set. The specific color settings of the first color and the second color can be adjusted according to user needs, and there is no limitation here.
此外,在进行静默登录时,还可以在用户终端中对用户进行提示,例如提示“当前正在登录虚拟专用网络”。In addition, when performing silent login, the user may be prompted in the user terminal, for example, a prompt "currently logging into a virtual private network" may be given.
本实施例中,通过将当前时刻可以访问到的企业门户服务器中的资源显示为第一颜色;将当前时刻无法访问到的企业门户服务器中的资源显示为第二颜色,对资源进行了区分显示,提升了用户体验。In this embodiment, by displaying resources in the enterprise portal server that are currently accessible in the first color and displaying resources in the enterprise portal server that are currently inaccessible in the second color, resources are displayed differently, thereby improving user experience.
图3是本发明提供的另一种资源访问方法的流程示意图,该方法应用于虚拟专用网络服务器,如图3所示,该方法包括:FIG3 is a flow chart of another resource access method provided by the present invention, which is applied to a virtual private network server. As shown in FIG3 , the method includes:
S31、接收用户终端发送的验证请求;其中,所述验证请求携带有授权凭证;S31, receiving a verification request sent by a user terminal; wherein the verification request carries an authorization certificate;
S32、根据所述授权凭证,向企业门户服务器请求用户信息;S32, requesting user information from the enterprise portal server according to the authorization credential;
S33、接收所述企业门户服务器返回的用户信息,并根据所述用户信息对所述验证请求进行验证;S33, receiving the user information returned by the enterprise portal server, and verifying the verification request according to the user information;
S34、在验证通过的情况下,向用户终端发送验证通过信息,并与建立所述用户终端之间的加密通讯隧道,以供所述用户终端通过所述加密通讯隧道访问内网资源。S34. If the verification is successful, send verification success information to the user terminal, and establish an encrypted communication tunnel between the user terminal so that the user terminal can access intranet resources through the encrypted communication tunnel.
具体地,虚拟专用网络服务器位于企业网络中互联网可访问部分。虚拟专用网络服务器在接收用户终端发送的验证请求,根据验证请求确认用户是否为合法用户,并确定是否提供虚拟专用网络服务;验证请求中携带有用户直接连接互联网登录企业门户服务器时获取到的授权凭证,虚拟专用网络服务器根据授权凭证,向企业门户服务器请求用户信息。用户信息例如:用户名、是否具有内网资源的远程访问权限等。虚拟专用网络服务器根据授权凭证在接收到企业门户服务器返回的用户信息后,根据用户信息对验证请求进行验证,以确认用户是否合法,是否具有远程访问内网资源的权限等。在验证通过的情况下,虚拟专用网络服务器向用户终端发送验证通过的信息,并建立用户终端与虚拟专用网络服务器之间的加密通讯隧道,以供所述用户终端通过所述加密通讯隧道访问内网资源。Specifically, the virtual private network server is located in the Internet-accessible part of the enterprise network. After receiving the verification request sent by the user terminal, the virtual private network server confirms whether the user is a legitimate user based on the verification request and determines whether to provide virtual private network services; the verification request carries the authorization certificate obtained when the user directly connects to the Internet to log in to the enterprise portal server, and the virtual private network server requests user information from the enterprise portal server based on the authorization certificate. User information includes: user name, whether the user has remote access rights to intranet resources, etc. After receiving the user information returned by the enterprise portal server based on the authorization certificate, the virtual private network server verifies the verification request based on the user information to confirm whether the user is legitimate and whether the user has the authority to remotely access intranet resources, etc. If the verification is successful, the virtual private network server sends verification success information to the user terminal and establishes an encrypted communication tunnel between the user terminal and the virtual private network server so that the user terminal can access intranet resources through the encrypted communication tunnel.
需要说明的是,在执行本方法前,虚拟专用网络服务器与企业门户服务器需要预先配置对接,例如配置通信地址、端口号、授权凭证格式、用户信息格式等,以便顺利执行后续静默登录过程。It should be noted that before executing this method, the virtual private network server and the enterprise portal server need to be pre-configured and connected, such as configuring the communication address, port number, authorization credential format, user information format, etc., so as to smoothly execute the subsequent silent login process.
本实施例中根据用户终端发送的验证请求中携带的用户凭证,向企业门户服务器请求用户信息,并据此对用户终端发送的验证请求进行验证,由于授权凭证是非明文的加密字符串,并不是用户登录企业门户服务器的身份认证信息,因而提升了静默登录虚拟专用网络服务器的安全性;通过根据授权凭证向企业门户服务器请求用户信息,对用户远程访问企业内网资源的权限进行了准确、便捷地管理。In this embodiment, user information is requested from the enterprise portal server based on the user credentials carried in the verification request sent by the user terminal, and the verification request sent by the user terminal is verified accordingly. Since the authorization credential is a non-plaintext encrypted string and is not the identity authentication information of the user logging into the enterprise portal server, the security of silent login to the virtual private network server is improved; by requesting user information from the enterprise portal server based on the authorization credential, the user's remote access rights to enterprise intranet resources are accurately and conveniently managed.
基于上述任一实施例,在一个实施例中,所述验证请求中携带有验证请求发起者的IP地址信息,且所述授权凭证携带有登录请求发起者的IP地址信息;Based on any of the above embodiments, in one embodiment, the verification request carries the IP address information of the initiator of the verification request, and the authorization credential carries the IP address information of the initiator of the login request;
相应地,所述接收用户终端的验证请求之后,所述根据所述授权凭证,向企业门户服务器请求用户信息之前,方法还包括:Correspondingly, after receiving the verification request from the user terminal and before requesting the user information from the enterprise portal server according to the authorization credential, the method further includes:
在所述验证请求中携带的验证请求发起者的IP地址信息与所述授权凭证携带的登录请求发起者的IP地址信息不一致的情况下,确认所述验证请求验证不通过;If the IP address information of the initiator of the verification request carried in the verification request is inconsistent with the IP address information of the initiator of the login request carried in the authorization credential, confirming that the verification request fails the verification;
在所述验证请求中携带的验证请求发起者的IP地址信息与所述授权凭证携带的登录请求发起者的IP地址信息一致的情况下,执行所述根据所述授权凭证,向企业门户服务器请求用户信息的步骤。When the IP address information of the initiator of the verification request carried in the verification request is consistent with the IP address information of the initiator of the login request carried in the authorization credential, the step of requesting user information from the enterprise portal server according to the authorization credential is performed.
具体地,用户终端将登录企业门户的登录客户端获取到的授权凭证传递到虚拟专用网络客户端,以用于连接虚拟专用网络服务器,为了防止授权凭证被黑客通过XSS漏洞等方式窃取/篡改,因此虚拟专用网络客户端在登录虚拟专用网络服务器时,虚拟专用网络服务器需要验证用户IP来源的一致性。具体地,需要在验证请求中携带有验证请求发起者的IP地址信息,在授权凭证中携带有登录请求发起者的IP地址信息,以供虚拟网络服务器在接收到验证请求后,对验证请求发起者的IP地址与授权凭证中携带的登录请求发起者的IP地址进行校验,二者一致则说明授权凭证没有被窃取/篡改,可以执行下一步验证操作;二者不一致则说明有可能存在XSS等漏洞,则向用户终端发出验证不通过的信息,以便用户终端进行告警提示。Specifically, the user terminal passes the authorization credential obtained by the login client of the enterprise portal to the virtual private network client for connecting to the virtual private network server. In order to prevent the authorization credential from being stolen/tampered by hackers through XSS vulnerabilities, the virtual private network server needs to verify the consistency of the user's IP source when the virtual private network client logs in to the virtual private network server. Specifically, the IP address information of the initiator of the verification request needs to be carried in the verification request, and the IP address information of the initiator of the login request needs to be carried in the authorization credential, so that after receiving the verification request, the virtual network server can verify the IP address of the initiator of the verification request and the IP address of the initiator of the login request carried in the authorization credential. If the two are consistent, it means that the authorization credential has not been stolen/tampered with, and the next verification operation can be performed; if the two are inconsistent, it means that there may be vulnerabilities such as XSS, and a verification failure message is sent to the user terminal so that the user terminal can issue an alarm prompt.
需要说明的是,XSS漏洞指的是通过注入恶意指令代码到网页,使用户加载并执行攻击者恶意制造的网页程序。这些恶意网页程序通常是JavaScript,但实际上也可以包括Java、VBScript、ActiveX、Flash或者甚至是普通的HTML。攻击成功后,攻击者可能得到包括但不限于更高的权限(如执行一些操作)、私密网页内容、会话和cookie等各种内容。It should be noted that XSS vulnerability refers to the process of injecting malicious instruction codes into web pages, causing users to load and execute web programs maliciously created by attackers. These malicious web programs are usually JavaScript, but in fact they can also include Java, VBScript, ActiveX, Flash or even ordinary HTML. After the attack is successful, the attacker may obtain various contents including but not limited to higher permissions (such as executing some operations), private web content, sessions and cookies.
本实施例中,通过在验证请求中携带有验证请求发起者的IP地址信息,在授权凭证携带有登录请求发起者的IP地址信息,通过虚拟网络服务器验证IP地址一致性,进一步保障了静默登录过程的安全性。In this embodiment, by carrying the IP address information of the initiator of the verification request in the verification request, carrying the IP address information of the initiator of the login request in the authorization credential, and verifying the consistency of the IP address through the virtual network server, the security of the silent login process is further guaranteed.
图4是本发明提供的又一种资源访问方法的流程示意图,该方法应用于企业门户服务器,如图4所示,该方法包括:FIG4 is a flow chart of another resource access method provided by the present invention, which is applied to an enterprise portal server. As shown in FIG4 , the method includes:
S41、接收用户终端发送的登录请求;S41, receiving a login request sent by a user terminal;
S42、在所述登录请求通过的情况下,向所述用户终端发送授权凭证;S42: if the login request is approved, sending an authorization certificate to the user terminal;
S43、接收虚拟专用网络服务器发送的用户信息请求;S43, receiving a user information request sent by a virtual private network server;
S44、在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息,以供所述虚拟专用网络服务器对用户终端发送的验证请求进行验证。S44. When the user information request carries the authorization credential, the corresponding user information is sent to the virtual private network server according to the authorization credential, so that the virtual private network server can verify the verification request sent by the user terminal.
具体地,企业门户服务器部署于企业网络中可被互联网访问部分,企业门户服务器在接收到用户终端通过互联网发送的登录请求后,根据登录请求中携带的身份认证信息对用户身份信息进行认证,以确定是否通过用户的登录请求。企业门户服务器可以自身配置身份认证功能,例如根据预存的用户身份信息数据库对用户终端的登录请求进行认证,还可以将登录请求中的身份认证信息转发至身份认证平台进行认证,身份认证平台为多方提供集中的身份认证功能。Specifically, the enterprise portal server is deployed in the part of the enterprise network that can be accessed by the Internet. After receiving the login request sent by the user terminal through the Internet, the enterprise portal server authenticates the user identity information according to the identity authentication information carried in the login request to determine whether to approve the user's login request. The enterprise portal server can configure the identity authentication function itself, for example, authenticate the login request of the user terminal according to the pre-stored user identity information database, and can also forward the identity authentication information in the login request to the identity authentication platform for authentication. The identity authentication platform provides centralized identity authentication functions for multiple parties.
在用户身份信息认证失败的情况下,拒绝登录请求,用户终端提示用户重新登录;在认证成功的情况下,同意用户的登录请求,并向用户发送授权凭证,授权凭证可以是非明文的加密字符串,该授权凭证可以用于第三方应用访问企业门户服务器。授权凭证还可以设置为具有一定存活时间的凭证信息,以便第三方应用在存活时间段内临时访问企业门户服务器,以提升企业门户管理的安全性。If the user identity authentication fails, the login request is rejected and the user terminal prompts the user to log in again; if the authentication is successful, the user's login request is approved and an authorization credential is sent to the user. The authorization credential can be a non-plaintext encrypted string, which can be used by third-party applications to access the enterprise portal server. The authorization credential can also be set as credential information with a certain survival time, so that third-party applications can temporarily access the enterprise portal server within the survival time period to improve the security of enterprise portal management.
企业门户服务器还接收虚拟专用网络服务器发送的用户信息请求,根据授权凭证返回对应的用户信息。具体地,企业门户服务器在接收用户的登录请求并生成授权凭证时,还记录了该授权凭证与用户信息的对应关系,以便在接收到虚拟专用网络服务器发送的用户信息请求时,根据授权凭证返回对应的用户信息。另外,对于具有一定存活时间的授权凭证,企业门户服务器还需要确定该当前验证请求的时间是否在授权凭证的存活时间段内,确定在存活时间段内,才返回授权凭证对应的用户信息。虚拟专用网络服务器在接收到用户信息后,即可对用户终端发送的验证请求进行验证。The enterprise portal server also receives a user information request sent by the virtual private network server, and returns the corresponding user information according to the authorization credential. Specifically, when the enterprise portal server receives the user's login request and generates the authorization credential, it also records the corresponding relationship between the authorization credential and the user information, so that when receiving the user information request sent by the virtual private network server, the corresponding user information is returned according to the authorization credential. In addition, for the authorization credential with a certain survival time, the enterprise portal server also needs to determine whether the time of the current verification request is within the survival time period of the authorization credential, and only return the user information corresponding to the authorization credential if it is within the survival time period. After receiving the user information, the virtual private network server can verify the verification request sent by the user terminal.
本实施例中,企业门户服务器向登录请求通过的用户终端返回授权凭证,用于在登录虚拟专用网络访问内网资源的过程中进行认证,无需用户的身份认证信息,提升了安全性;根据授权凭证向虚拟专用网络返回对应的用户信息,以便虚拟专用网络服务器进行验证确定是否建立加密通讯隧道,便捷地对用户远程接入企业门户服务器的过程进行了管理,提升了便利性。In this embodiment, the enterprise portal server returns an authorization credential to the user terminal that has passed the login request, which is used for authentication during the process of logging into the virtual private network to access intranet resources. No user identity authentication information is required, thereby improving security. The corresponding user information is returned to the virtual private network based on the authorization credential so that the virtual private network server can verify and determine whether to establish an encrypted communication tunnel. The process of user remote access to the enterprise portal server is conveniently managed, thereby improving convenience.
基于上述任一实施例,在一个实施例中,所述在所述登录请求通过的情况下,向所述用户终端发送授权凭证之后,方法还包括:Based on any of the above embodiments, in one embodiment, when the login request is passed, after sending the authorization credential to the user terminal, the method further includes:
响应所述用户终端的开放资源访问请求,向所述用户终端返回开放资源链接,以供所述用户终端访问对应的开放资源。In response to the open resource access request of the user terminal, an open resource link is returned to the user terminal so that the user terminal can access the corresponding open resource.
具体地,在用户终端通过互联网直接登录企业门户服务器的登录请求认证通过的情况下,用户终端可以直接访问企业门户服务器中的开放资源链接,通过开放资源链接访问企业网络中互联网可访问部分中部署的开放资源服务器,获取对应的开放资源。Specifically, when the login request of the user terminal to directly log in to the enterprise portal server through the Internet is authenticated, the user terminal can directly access the open resource link in the enterprise portal server, access the open resource server deployed in the Internet accessible part of the enterprise network through the open resource link, and obtain the corresponding open resources.
本实施例中为直接通过互联网登录企业门户服务器并登录通过的用户提供了开放资源服务。In this embodiment, an open resource service is provided for users who log in to the enterprise portal server directly through the Internet and pass the login.
基于上述任一实施例,在一个实施例中,所述在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息之后,方法还包括:Based on any of the above embodiments, in one embodiment, when the user information request carries the authorization credential, after sending the corresponding user information to the virtual private network server according to the authorization credential, the method further includes:
在所述授权凭证对应的验证请求通过的情况下,响应所述用户终端的内网资源访问请求,向所述用户终端返回内网资源链接,以供所述用户终端利用与虚拟专用网络服务器建立的加密通讯隧道访问对应的内网资源。When the verification request corresponding to the authorization credential passes, the intranet resource access request of the user terminal is responded to, and the intranet resource link is returned to the user terminal so that the user terminal can access the corresponding intranet resource by using the encrypted communication tunnel established with the virtual private network server.
具体地,在虚拟网络服务器根据用户信息对用户终端的验证请求验证通过后,虚拟专用网络服务器与用户终端之间建立加密通讯隧道,用户终端在企业门户中获取内网资源链接后即可通过加密通讯隧道获取对应的内网资源。由于加密通讯隧道中的数据均为加密数据,因此用户可以安全地远程访问企业内网资源。Specifically, after the virtual network server verifies the user terminal's verification request based on the user information, an encrypted communication tunnel is established between the virtual private network server and the user terminal. After the user terminal obtains the intranet resource link in the enterprise portal, it can obtain the corresponding intranet resource through the encrypted communication tunnel. Since the data in the encrypted communication tunnel is encrypted data, users can safely access the enterprise intranet resources remotely.
本实施例中在授权凭证对应的验证请求验证通过的情况下,通过专用网络服务器与用户终端之间建立的加密通讯隧道,便捷安全地为用户提供了内网资源服务。In this embodiment, when the verification request corresponding to the authorization credential is verified, the encrypted communication tunnel established between the dedicated network server and the user terminal provides the user with intranet resource services conveniently and securely.
基于上述任一实施例,在一个实施例中,所述接收用户终端发送的登录请求之后,所述在所述登录请求通过的情况下,向所述用户终端发送授权凭证之前,方法还包括:Based on any of the above embodiments, in one embodiment, after receiving the login request sent by the user terminal, and before sending the authorization credential to the user terminal if the login request is approved, the method further includes:
将所述登录请求转发至身份认证平台进行认证;Forwarding the login request to the identity authentication platform for authentication;
根据所述身份认证平台返回的认证结果确定所述登录请求是否通过。Determine whether the login request is passed based on the authentication result returned by the identity authentication platform.
具体地,企业门户服务器可以自身配置身份认证功能,还可以将登录请求中的身份认证信息转发至身份认证平台进行认证,身份认证平台为多方提供集中的身份认证功能。Specifically, the enterprise portal server can configure the identity authentication function itself, and can also forward the identity authentication information in the login request to the identity authentication platform for authentication. The identity authentication platform provides centralized identity authentication functions for multiple parties.
相应地,虚拟专用网络服务器也可以通过身份认证平台对用户终端的验证请求进行验证。虚拟专用网络服务器在接收到用户终端的验证请求后,根据授权凭证向身份认证平台请求用户信息,接收身份认证平台返回的用户信息,并根据用户信息对用户终端的验证请求进行验证,在验证通过的情况下,向用户终端发送验证通过信息,并建立用户终端与虚拟专用网络服务器之间的加密通讯隧道。Correspondingly, the virtual private network server can also verify the verification request of the user terminal through the identity authentication platform. After receiving the verification request from the user terminal, the virtual private network server requests the user information from the identity authentication platform according to the authorization certificate, receives the user information returned by the identity authentication platform, and verifies the verification request of the user terminal according to the user information. If the verification is successful, it sends the verification pass information to the user terminal and establishes an encrypted communication tunnel between the user terminal and the virtual private network server.
本实施例中通过转发登录请求至身份认证平台进行认证,低成本便捷地对用户身份信息进行了认证。In this embodiment, the login request is forwarded to the identity authentication platform for authentication, so that the user identity information is authenticated at a low cost and conveniently.
下面对本发明提供的资源访问装置进行描述,下文描述的资源访问装置与上文描述的资源访问方法可相互对应参照。The resource access device provided by the present invention is described below. The resource access device described below and the resource access method described above can be referenced to each other.
图5是本发明提供的一种资源访问装置(对应下文用户终端51)的结构示意图,如图5所示,该装置包括:FIG5 is a schematic diagram of the structure of a resource access device (corresponding to the user terminal 51 below) provided by the present invention. As shown in FIG5 , the device includes:
登录请求发送单元511,用于向企业门户服务器发送登录请求,以供所述企业门户服务器对用户进行身份认证;A login request sending unit 511 is used to send a login request to the enterprise portal server so that the enterprise portal server can authenticate the user;
授权凭证接收单元512,用于接收所述企业门户服务器在所述登录请求通过的情况下返回的授权凭证;The authorization credential receiving unit 512 is used to receive the authorization credential returned by the enterprise portal server when the login request is approved;
验证请求发送单元513,用于通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求,以供所述虚拟专用网络服务器对用户进行身份验证;其中,所述验证请求中携带有所述授权凭证;The verification request sending unit 513 is used to send a verification request to the virtual private network server through the virtual private network client, so that the virtual private network server can authenticate the user; wherein the verification request carries the authorization certificate;
第一加密通讯单元514,用于在所述验证请求验证通过的情况下,利用所述虚拟专用网络客户端建立与所述虚拟专用网络服务器之间的加密通讯隧道,以通过所述加密通讯隧道访问内网资源。The first encryption communication unit 514 is used to establish an encrypted communication tunnel between the virtual private network client and the virtual private network server by using the virtual private network client when the verification request is verified successfully, so as to access the intranet resources through the encrypted communication tunnel.
基于上述实施例,在一个实施例中,所述装置还包括:Based on the above embodiment, in one embodiment, the device further includes:
检测单元,用于检测是否安装有所述虚拟专用网络客户端;A detection unit, used to detect whether the virtual private network client is installed;
提示安装单元,用于在未检测到所述虚拟专用网络客户端的情况下,提示安装所述虚拟专用网络客户端;安装完成后再次执行所述检测是否安装有所述虚拟专用网络客户端的步骤;an installation prompting unit, configured to prompt the installation of the virtual private network client if the virtual private network client is not detected; and to perform the step of detecting whether the virtual private network client is installed again after the installation is completed;
启动单元,用于在检测到所述虚拟专用网络客户端的情况下,启动所述虚拟专用网络客户端。The starting unit is used to start the virtual private network client when the virtual private network client is detected.
基于上述任一实施例,在一个实施例中,所述验证请求中携带有验证请求发起者的IP地址信息,且所述授权凭证携带有登录请求发起者的IP地址信息,以供所述虚拟网络服务器验证IP地址一致性。Based on any of the above embodiments, in one embodiment, the verification request carries the IP address information of the initiator of the verification request, and the authorization credential carries the IP address information of the initiator of the login request, so that the virtual network server can verify the consistency of the IP addresses.
基于上述任一实施例,在一个实施例中,所述虚拟专用网络客户端为基于安全套接字层协议的虚拟专用网络客户端,所述虚拟专用网络服务器为基于安全套接字层协议的虚拟专用网络服务器。Based on any of the above embodiments, in one embodiment, the virtual private network client is a virtual private network client based on the secure socket layer protocol, and the virtual private network server is a virtual private network server based on the secure socket layer protocol.
基于上述任一实施例,在一个实施例中,所述装置还包括:Based on any of the above embodiments, in one embodiment, the device further includes:
第一显示单元,用于将当前时刻可以访问到的企业门户服务器中的资源显示为第一颜色;A first display unit, used to display resources in the enterprise portal server that are currently accessible in a first color;
第二显示单元,用于将当前时刻无法访问到的企业门户服务器中的资源显示为第二颜色。The second display unit is used to display the resources in the enterprise portal server that are currently inaccessible in a second color.
图6是本发明提供的一种资源访问装置(对应下文虚拟专用网络服务器61)的结构示意图,如图6所示,该装置包括:FIG6 is a schematic diagram of the structure of a resource access device (corresponding to the virtual private network server 61 below) provided by the present invention. As shown in FIG6 , the device includes:
验证请求接收单元611,用于接收用户终端发送的验证请求;其中,所述验证请求携带有授权凭证;The verification request receiving unit 611 is used to receive a verification request sent by a user terminal; wherein the verification request carries an authorization certificate;
用户信息请求单元612,用于根据所述授权凭证,向企业门户服务器请求用户信息;A user information request unit 612, configured to request user information from the enterprise portal server according to the authorization credential;
验证请求验证单元613,用于接收所述企业门户服务器返回的用户信息,并根据所述用户信息对所述验证请求进行验证;The verification request verification unit 613 is used to receive the user information returned by the enterprise portal server and verify the verification request according to the user information;
第二加密通讯单元614,用于在验证通过的情况下,向用户终端发送验证通过信息,并建立与所述用户终端之间的加密通讯隧道,以供所述用户终端通过所述加密通讯隧道访问内网资源。The second encryption communication unit 614 is used to send a verification pass message to the user terminal when the verification is passed, and to establish an encrypted communication tunnel with the user terminal so that the user terminal can access the intranet resources through the encrypted communication tunnel.
基于上述任一实施例,在一个实施例中,所述验证请求中携带有验证请求发起者的IP地址信息,且所述授权凭证携带有登录请求发起者的IP地址信息;相应地,所述装置还包括:Based on any of the above embodiments, in one embodiment, the verification request carries the IP address information of the initiator of the verification request, and the authorization credential carries the IP address information of the initiator of the login request; accordingly, the device further includes:
第一预验证单元,用于在所述验证请求中携带的验证请求发起者的IP地址信息与所述授权凭证携带的登录请求发起者的IP地址信息不一致的情况下,确认所述验证请求验证不通过;A first pre-verification unit, configured to confirm that the verification request fails verification if the IP address information of the verification request initiator carried in the verification request is inconsistent with the IP address information of the login request initiator carried in the authorization credential;
第二预验证单元,用于在所述验证请求中携带的验证请求发起者的IP地址信息与所述授权凭证携带的登录请求发起者的IP地址信息一致的情况下,执行所述根据所述授权凭证,向企业门户服务器请求用户信息的步骤。The second pre-verification unit is used to execute the step of requesting user information from the enterprise portal server according to the authorization credential when the IP address information of the verification request initiator carried in the verification request is consistent with the IP address information of the login request initiator carried in the authorization credential.
图7是本发明提供的一种资源访问装置(对应下文企业门户服务器71)的结构示意图,如图7所示,该装置包括:FIG. 7 is a schematic diagram of the structure of a resource access device (corresponding to the enterprise portal server 71 below) provided by the present invention. As shown in FIG. 7 , the device includes:
登录请求接收单元711,用于接收用户终端发送的登录请求;A login request receiving unit 711, configured to receive a login request sent by a user terminal;
授权凭证发送单元712,用于在所述登录请求通过的情况下,向所述用户终端发送授权凭证;The authorization credential sending unit 712 is used to send the authorization credential to the user terminal if the login request is approved;
信息请求接收单元713,用于接收虚拟专用网络服务器发送的用户信息请求;The information request receiving unit 713 is used to receive a user information request sent by a virtual private network server;
用户信息发送单元714,用于在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息,以供所述虚拟专用网络服务器对用户终端发送的验证请求进行验证。The user information sending unit 714 is used to send corresponding user information to the virtual private network server according to the authorization certificate when the user information request carries the authorization certificate, so that the virtual private network server can verify the verification request sent by the user terminal.
基于上述任一实施例,在一个实施例中,所述装置还包括:Based on any of the above embodiments, in one embodiment, the device further includes:
开放资源响应单元,用于响应所述用户终端的开放资源访问请求,向所述用户终端返回开放资源链接,以供所述用户终端访问对应的开放资源。The open resource response unit is used to respond to the open resource access request of the user terminal and return an open resource link to the user terminal so that the user terminal can access the corresponding open resource.
基于上述任一实施例,在一个实施例中,所述装置还包括:Based on any of the above embodiments, in one embodiment, the device further includes:
内网资源响应单元,用于在所述授权凭证对应的验证请求通过的情况下,响应所述用户终端的内网资源访问请求,向所述用户终端返回内网资源链接,以供所述用户终端利用与虚拟专用网络服务器建立的加密通讯隧道访问对应的内网资源。The intranet resource response unit is used to respond to the intranet resource access request of the user terminal when the verification request corresponding to the authorization credential passes, and return the intranet resource link to the user terminal so that the user terminal can access the corresponding intranet resource by using the encrypted communication tunnel established with the virtual private network server.
下面对本发明提供的一种资源访问系统进行描述,下文描述的资源访问系统与上文描述的资源访问方法可相互对应参照。图8是本发明提供的一种资源访问系统的结构示意图,如图8所示,该系统包括:用户终端51,虚拟专用网络服务器61,以及企业门户服务器71;A resource access system provided by the present invention is described below. The resource access system described below and the resource access method described above can be referred to in correspondence with each other. FIG8 is a schematic diagram of the structure of a resource access system provided by the present invention. As shown in FIG8, the system includes: a user terminal 51, a virtual private network server 61, and an enterprise portal server 71;
所述用户终端51,包括:The user terminal 51 includes:
登录请求发送单元,用于向企业门户服务器发送登录请求,以供所述企业门户服务器对用户进行身份认证;A login request sending unit, used to send a login request to the enterprise portal server so that the enterprise portal server can authenticate the user;
授权凭证接收单元,用于接收所述企业门户服务器在所述登录请求通过的情况下返回的授权凭证;An authorization credential receiving unit, configured to receive the authorization credential returned by the enterprise portal server when the login request is approved;
验证请求发送单元,用于通过虚拟专用网络客户端向虚拟专用网络服务器发送验证请求,以供所述虚拟专用网络服务器对用户进行身份验证;其中,所述验证请求中携带有所述授权凭证;A verification request sending unit, used to send a verification request to a virtual private network server through a virtual private network client, so that the virtual private network server can authenticate the identity of the user; wherein the verification request carries the authorization credential;
第一加密通讯单元,用于在所述验证请求验证通过的情况下,利用所述虚拟专用网络客户端建立与所述虚拟专用网络服务器之间的加密通讯隧道,以通过所述加密通讯隧道访问内网资源。The first encryption communication unit is used to establish an encrypted communication tunnel between the virtual private network client and the virtual private network server when the verification request is verified successfully, so as to access the intranet resources through the encrypted communication tunnel.
虚拟专用网络服务器61,包括:The virtual private network server 61 comprises:
验证请求接收单元,用于接收用户终端发送的验证请求;其中,所述验证请求携带有授权凭证;A verification request receiving unit, configured to receive a verification request sent by a user terminal; wherein the verification request carries an authorization certificate;
用户信息请求单元,用于根据所述授权凭证,向企业门户服务器请求用户信息;A user information request unit, configured to request user information from the enterprise portal server according to the authorization credential;
验证请求验证单元,用于接收所述企业门户服务器返回的用户信息,并根据所述用户信息对所述验证请求进行验证;A verification request verification unit, configured to receive the user information returned by the enterprise portal server and verify the verification request according to the user information;
第二加密通讯单元,用于在验证通过的情况下,向用户终端发送验证通过信息,并建立与所述用户终端之间的加密通讯隧道,以供所述用户终端通过所述加密通讯隧道访问内网资源。The second encryption communication unit is used to send verification pass information to the user terminal when the verification is passed, and establish an encrypted communication tunnel with the user terminal so that the user terminal can access intranet resources through the encrypted communication tunnel.
企业门户服务器71,包括:The enterprise portal server 71 includes:
登录请求接收单元,用于接收用户终端发送的登录请求;A login request receiving unit, used to receive a login request sent by a user terminal;
授权凭证发送单元,用于在所述登录请求通过的情况下,向所述用户终端发送授权凭证;An authorization credential sending unit, configured to send an authorization credential to the user terminal if the login request is approved;
信息请求接收单元,用于接收虚拟专用网络服务器发送的用户信息请求;An information request receiving unit, used to receive a user information request sent by a virtual private network server;
用户信息发送单元,用于在所述用户信息请求中携带有所述授权凭证的情况下,根据所述授权凭证,向所述虚拟专用网络服务器发送对应的用户信息,以供所述虚拟专用网络服务器对用户终端发送的验证请求进行验证。The user information sending unit is used to send corresponding user information to the virtual private network server according to the authorization certificate when the user information request carries the authorization certificate, so that the virtual private network server can verify the verification request sent by the user terminal.
本实施例中用户终端在通过互联网直接登录企业门户服务器后,自动向虚拟专用网络服务器发送携带有授权凭证的验证请求,实现静默登录,无需用户重复输入身份认证信息,由于授权凭证是非明文的加密字符串,并不是用户登录企业门户的身份认证信息,因而提升了静默登录虚拟专用网络服务器过程的安全性;并且,用户终端与虚拟专用网络服务器之间建立了加密通讯隧道,便于用户终端安全便捷地访问企业门户服务器中管理的内网资源。In this embodiment, after the user terminal directly logs in to the enterprise portal server through the Internet, it automatically sends a verification request carrying the authorization credential to the virtual private network server, thereby realizing silent login without the need for the user to repeatedly enter the identity authentication information. Since the authorization credential is a non-plaintext encrypted string and is not the identity authentication information of the user logging in to the enterprise portal, the security of the silent login process to the virtual private network server is improved; in addition, an encrypted communication tunnel is established between the user terminal and the virtual private network server, so that the user terminal can safely and conveniently access the intranet resources managed in the enterprise portal server.
以下通过一个优选的实施例来描述本发明提供的资源访问方法中各执行主体之间的交互过程:The following describes the interaction process between the execution entities in the resource access method provided by the present invention through a preferred embodiment:
准备阶段:Preparation Phase:
①、SSLVPN服务器和企业Web门户服务器完成认证对接及网络资源配置等。①. The SSLVPN server and the enterprise Web portal server complete authentication connection and network resource configuration.
②、IT人员为员工的用户终端预先安装好SSLVPN客户端。②. IT personnel pre-install the SSLVPN client on employees' user terminals.
登录阶段:Login phase:
①、企业员工在家或出差等需要进行远程办工时,使用企业为员工分配的账号、密码通过用户终端登录企业Web门户服务器;① When enterprise employees need to work remotely at home or on business trips, they can log in to the enterprise web portal server through the user terminal using the account and password assigned by the enterprise to the employee;
②、企业Web门户服务器通过统一身份认证平台对登录请求进行身份认证,接收统一身份认证平台的认证结果,获取授权凭证,并将认证结果、授权凭证返回给用户Web浏览器;② The enterprise Web portal server authenticates the login request through the unified identity authentication platform, receives the authentication result of the unified identity authentication platform, obtains the authorization certificate, and returns the authentication result and authorization certificate to the user's Web browser;
③、用户终端通过SDK提供的端口查询SSLVPN客户端,在检测到未安装SSLVPN客户端的情况下,提示安装SSLVPN客户端,在检测到SSLVPN客户端的情况下,启动SSLVPN客户端;③. The user terminal queries the SSLVPN client through the port provided by the SDK. If it is detected that the SSLVPN client is not installed, it prompts to install the SSLVPN client. If the SSLVPN client is detected, it starts the SSLVPN client.
④、Web浏览器将用户的授权凭证传递给SSLVPN客户端;④. The web browser passes the user's authorization credentials to the SSLVPN client;
⑤、SSLVPN客户端向SSLVPN服务器发起验证请求,验证请求中携带授权凭证;⑤. The SSLVPN client initiates a verification request to the SSLVPN server, and the verification request carries the authorization certificate;
⑥、SSLVPN服务器根据授权凭证向统一身份认证平台请求并获取用户信息;⑥. The SSLVPN server requests and obtains user information from the unified identity authentication platform based on the authorization credentials;
⑦、SSLVPN服务器根据返回的用户信息对用户验证请求进行验证,在验证通过的情况下,建立用户终端与SSLVPN服务器之间的加密通讯隧道。⑦. The SSLVPN server verifies the user authentication request based on the returned user information. If the verification is successful, an encrypted communication tunnel is established between the user terminal and the SSLVPN server.
本实施例中用户终端在通过互联网直接登录企业门户服务器后,自动向虚拟专用网络服务器发送携带有授权凭证的验证请求,实现静默登录,无需用户重复输入身份认证信息,由于授权凭证是非明文的加密字符串,并不是用户登录企业门户服务器的身份认证信息,因而提升了静默登录虚拟专用网络服务器过程的安全性;并且,用户终端与虚拟专用网络服务器建立了加密通讯隧道,便于用户终端安全便捷地访问企业门户服务器中管理的内网资源。In this embodiment, after the user terminal directly logs in to the enterprise portal server through the Internet, it automatically sends a verification request carrying the authorization credential to the virtual private network server, thereby realizing silent login without the need for the user to repeatedly enter the identity authentication information. Since the authorization credential is a non-plaintext encrypted string and is not the identity authentication information of the user logging in to the enterprise portal server, the security of the silent login process to the virtual private network server is improved; in addition, an encrypted communication tunnel is established between the user terminal and the virtual private network server, so that the user terminal can safely and conveniently access the intranet resources managed in the enterprise portal server.
图9示例了一种电子设备的实体结构示意图,如图9所示,该电子设备可以包括:处理器(processor)910、通信接口(Communications Interface)920、存储器(memory)930和通信总线940,其中,处理器910,通信接口920,存储器930通过通信总线940完成相互间的通信。处理器910可以调用存储器930中的逻辑指令,以执行上述各提供的资源访问方法的全部或部分步骤。FIG9 illustrates a schematic diagram of the physical structure of an electronic device. As shown in FIG9 , the electronic device may include: a processor 910, a communication interface 920, a memory 930, and a communication bus 940, wherein the processor 910, the communication interface 920, and the memory 930 communicate with each other through the communication bus 940. The processor 910 may call the logic instructions in the memory 930 to execute all or part of the steps of the resource access methods provided above.
此外,上述的存储器930中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。In addition, the logic instructions in the above-mentioned memory 930 can be implemented in the form of a software functional unit and can be stored in a computer-readable storage medium when it is sold or used as an independent product. Based on such an understanding, the technical solution of the present invention, in essence, or the part that contributes to the prior art or the part of the technical solution, can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present invention. The aforementioned storage medium includes: various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk.
另一方面,本发明还提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各提供的资源访问方法的全部或部分步骤。On the other hand, the present invention also provides a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, and the computer program includes program instructions. When the program instructions are executed by a computer, the computer can execute all or part of the steps of the above-mentioned resource access methods.
又一方面,本发明还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现以执行上述各提供的资源访问方法的全部或部分步骤。On the other hand, the present invention further provides a non-transitory computer-readable storage medium having a computer program stored thereon, which, when executed by a processor, is implemented to perform all or part of the steps of the resource access methods provided above.
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。The device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the scheme of this embodiment. Those of ordinary skill in the art may understand and implement it without creative effort.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。Through the description of the above implementation methods, those skilled in the art can clearly understand that each implementation method can be implemented by means of software plus a necessary general hardware platform, and of course, it can also be implemented by hardware. Based on this understanding, the above technical solution is essentially or the part that contributes to the prior art can be embodied in the form of a software product, and the computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, a disk, an optical disk, etc., including a number of instructions for a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods described in each embodiment or some parts of the embodiments.
最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit it. Although the present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that they can still modify the technical solutions described in the aforementioned embodiments, or make equivalent replacements for some of the technical features therein. However, these modifications or replacements do not deviate the essence of the corresponding technical solutions from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111406965.7A CN114374529B (en) | 2021-11-24 | 2021-11-24 | Resource access method, device, system, electronic device, medium and program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111406965.7A CN114374529B (en) | 2021-11-24 | 2021-11-24 | Resource access method, device, system, electronic device, medium and program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114374529A CN114374529A (en) | 2022-04-19 |
CN114374529B true CN114374529B (en) | 2024-06-28 |
Family
ID=81139105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111406965.7A Active CN114374529B (en) | 2021-11-24 | 2021-11-24 | Resource access method, device, system, electronic device, medium and program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114374529B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115457695A (en) * | 2022-09-06 | 2022-12-09 | 重庆智网科技有限公司信息通信分公司 | Anonymous voting system based on electric virtual private network |
CN119299159A (en) * | 2024-10-09 | 2025-01-10 | 广东软易通信息科技有限公司 | Access control method and device based on application protocol |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100834270B1 (en) * | 2005-10-06 | 2008-05-30 | 주식회사 케이티프리텔 | Mobile communication based virtual private network service providing method and system and mobile terminal for it |
US8738897B2 (en) * | 2007-04-25 | 2014-05-27 | Apple Inc. | Single sign-on functionality for secure communications over insecure networks |
US7954145B2 (en) * | 2007-09-27 | 2011-05-31 | Novell, Inc. | Dynamically configuring a client for virtual private network (VPN) access |
GB2487533A (en) * | 2011-01-21 | 2012-08-01 | Lionel Wolovitz | Access control with application specific rules and access requests including application identifiers |
US8683562B2 (en) * | 2011-02-03 | 2014-03-25 | Imprivata, Inc. | Secure authentication using one-time passwords |
US9098687B2 (en) * | 2013-05-03 | 2015-08-04 | Citrix Systems, Inc. | User and device authentication in enterprise systems |
US9608981B2 (en) * | 2013-12-11 | 2017-03-28 | Red Hat, Inc. | Strong user authentication for accessing protected network |
US10454917B2 (en) * | 2015-11-05 | 2019-10-22 | Red Hat, Inc. | Enabling single sign-on authentication for accessing protected network services |
-
2021
- 2021-11-24 CN CN202111406965.7A patent/CN114374529B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN114374529A (en) | 2022-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101414312B1 (en) | Policy driven, credntial delegat10n for single sign on and secure access to network resources | |
US11190493B2 (en) | Concealing internal applications that are accessed over a network | |
US9729514B2 (en) | Method and system of a secure access gateway | |
CA2689847C (en) | Network transaction verification and authentication | |
US7886339B2 (en) | Radius security origin check | |
US8468582B2 (en) | Method and system for securing electronic transactions | |
JP6343101B2 (en) | Multi-tunnel virtual network adapter | |
WO2022247751A1 (en) | Method, system and apparatus for remotely accessing application, device, and storage medium | |
US20090025080A1 (en) | System and method for authenticating a client to a server via an ipsec vpn and facilitating a secure migration to ssl vpn remote access | |
US20150188779A1 (en) | Split-application infrastructure | |
US20090319776A1 (en) | Techniques for secure network communication | |
CN111416826B (en) | System and method for safely releasing and accessing application service | |
US8973111B2 (en) | Method and system for securing electronic transactions | |
US7334126B1 (en) | Method and apparatus for secure remote access to an internal web server | |
CN111786969A (en) | Single sign-on method, device and system | |
CN113746811A (en) | Login method, device, equipment and readable storage medium | |
CN114374529B (en) | Resource access method, device, system, electronic device, medium and program | |
CN114661485A (en) | Application program interface access control system and method based on zero trust architecture | |
WO2020168586A1 (en) | Blockchain and dnssec-based user authentication method, system, device and medium | |
US20250106208A1 (en) | Establishing trust for an api call from a client to a target service using a relay gateway | |
US20250119275A1 (en) | Authentication tunneling mechanisms for remote connections | |
Ahmed | Balancing security and usability in Web Single Sign-On | |
Ciotîrnae et al. | Multi-Factor Secure Authentication Method Used for Accessing Sensitive Data Bases | |
HK40061824A (en) | Method, system and apparatus for remotely accessing application, and device and storage medium | |
CN117544374A (en) | Service access method and device based on certificate authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Country or region after: China Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Applicant after: QAX Technology Group Inc. Applicant after: Qianxin Wangshen information technology (Beijing) Co.,Ltd. Address before: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Applicant before: QAX Technology Group Inc. Country or region before: China Applicant before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |