当前位置:网站首页>The boss is quarantined
The boss is quarantined
2022-07-07 02:18:00 【Ma Nong turns over】
1
Telecommuting
As a small and medium-sized company IT Head of department operation and maintenance , Zhang Dafu has been under great pressure recently .
Under the epidemic , Several people in the company have been isolated as close contacts , The voice of other employees for home telecommuting is getting louder .
Zhang Dapu also wants to work remotely at home , Safe and free , But the company's customer management system ,OA The systems are deployed in the company's own computer room , It is an internal LAN , How can I visit at home ?
Cannot access , How to telecommute ?
Obviously , The simplest way is to build a set VPN System , Everyone is assigned an account , This solves the problem . however VPN The configuration is complex and expensive , It's not suitable for this small company .
Zhang dafun is bored searching on the Internet , I found a man called “ Dandelion Yi Lian ” Office platform , No need for a private network 、 There is no need for the public network IP, There is no need to change the existing network structure , You can easily build a virtual LAN , Let employees visit the company at home IT System .
This “ The dandelion ” It works like this :
First step , Operations staff ( That is, oneself ) Create a dandelion management platform “ virtual network ”.
The second step , Create a member account for each employee in the virtual network , Each member will be assigned one ID、 Passwords and virtual IP Address .

( Click to see a larger image )
The third step , Each employee downloads and installs dandelion client .( Of course , It also needs to be installed on the company's server )
In addition to supporting Windows outside , Dandelion client also supports almost all other mainstream operating systems on the market :

then , Employees can log in with the previously created account and password .

Now every machine has a virtual IP, Employees can not only use it to access OA and CRM System , Machines among employees can also be interconnected .
Zhang Dapu really didn't expect , It's so simple to build a virtual LAN !
He excitedly went to the boss to report the good news , Expect the boss to give an order , Everyone can go home and work remotely .
The boss listened to the report , be noncommittal , Just a faint question : How safe ? If an employee's account is compromised , our OA and CRM The system is not equivalent to running naked on the Internet ?
Zhang Dafu's head was suddenly covered , I'm too impulsive , Report to the boss before considering improvement , I made a big mistake .
Zhang Dafu apologized repeatedly : I don't think well , Go back and study , Come back and make a report .
2
Secure access
Back to your seat , Zhang Dafan thought carefully : Is the boss too demanding ?!
Now even VPN System , The account has been leaked , Isn't the intranet system also exposed ? Also streaked ? The same problem !
If you make an analogy ,VPN The gateway is like a guard , Legal users have passed the inspection of the guard , Enter the community , He will only go where he wants to go 1 building .
But for hackers who steal other people's identities , Once he enters the community , Just go 1 building , I will definitely go 1,2,3... Stroll around building , See if there is anything valuable , Steal it , Or ambush a back door or something .
Can't even a user who logs in to the system through the account password be trusted ? What should I do ?
Zhang Dafu was stunned .
Is this time , Go to the tea room to fetch water CTO Lao he saw Zhang Dafu in a daze , Gently patted him on the shoulder : What do you daydream in broad daylight ?
Zhang Dafu told Lao he about his experience and confusion , Lao he laughed :“ Your problem is also easy to solve , Use your example to compare , We first check at the gate of the community , But even if a person passes the guard's inspection , Enter the community , When he is doing something , And continue to be checked , See if his identity is right , Do you have permission to , If an exception is found , Just kick him out .”
“ That is to say, the principle of minimum permission should be used , Implement refined authority control ?” Zhang Da Pang asked .
“ Children can teach !” Old he left with a cup .
Zhang Dafu immediately went to check the dandelion easy plan , It is found that it supports custom setting of access permissions between members , So as to realize the refined access strategy .
Managers can meet different job requirements 、 Working hours , Set different access permissions for resources in the network . for example : Ordinary employees can only access OA System 、 Finance can access the corresponding financial system , R & D visit git、SVN etc. , Implement the minimum permission principle , High precision protection of sensitive data access security .

( Click to see a larger image )
This solves the problem ?
3
In depth research
however , This time, Zhang Dafang learned well , We must do in-depth research , Then you can report to the boss .
This time when Zhang Dafu was creating the network , I chose “ Custom network ”:

Assign account numbers to employees , When creating network members , Specify the role of the employee :

By default , Ordinary members cannot communicate with each other , Only with center members ( For example, server ) Interworking .
“ Dandelion Yi Lian ” There is also a very powerful access strategy , Fine authorization , For example, you can specify that certain users can only access certain machines , It can only be accessed at a certain time :


( Click to see a larger image )
For example, he Xiaoheng's machine in the above figure can only be accessed from Monday to Friday CRM The server .
Zhang Dafan is very satisfied , With refined authorization , It solves the boss's requirements .
In addition to the prior permission configuration ,“ Dandelion Yi Lian ” It also supports post event log auditing , Who logged in to the client at what time and where , Have you done anything , You can check . The so-called prior perception , Ex post facto .

He continued to try , I also found several very good functions , For example, data transmission adopts RSA/AES Hybrid asymmetric encryption algorithm , It's kind of like Https The implementation of , Very safe .
There is also device terminal verification , If this device is not a trusted terminal like a private computer ,“ The dandelion ” It will be continuously verified , It is required to provide dynamic verification code .
This is equivalent to security guards everywhere in the community , To thieves ( Untrusted terminals ) Keep checking , Exception found , Alarm immediately .
What's more useful is , It also supports third-party data access , You can put enterprise wechat 、 nailing 、 Flying book, etc IM Get your address book data , Real time synchronization , Staff entry 、 quit 、 Permission changes are updated in real time , Greatly improve the convenience of member management .
4
The end of the
Before reporting , Zhang Dafan made one PPT, Count it “ Dandelion Yi Lian ” Several advantages of :
1. Support pure software solutions , Not limited by hardware , Do not change the existing network structure
2. Efficient and easy to use , Low threshold for use , One click networking 、 One click connection
3. Low cost , High cost performance , There is no need for special line and public network IP
4. The most important , Very safe
Zhang Dafu is full of confidence this time , He was preparing to report , In wechat, the boss suddenly called him crazily :
Da Pang Zhang , I was quarantined ! How come the network of remote office hasn't been set up yet ?!
Zhang Dafu was surprised and delighted , Hurry up PPT Transfer the past : Boss, don't worry ,“ Dandelion Yi Lian ” Do it right away , You can access the Intranet in a moment !

Welcome to scan the code and consult dandelion Yilian

边栏推荐
- PartyDAO如何在1年内把一篇推文变成了2亿美金的产品DAO
- Introduction to RC oscillator and crystal oscillator
- [unique] what is the [chain storage structure]?
- #夏日挑战赛#数据库学霸笔记(下)~
- Big guys gather | nextarch foundation cloud development meetup is coming!
- 阿里云中间件开源往事
- Metaforce force meta universe development and construction - fossage 2.0 system development
- 机器人队伍学习方法,实现8.8倍的人力回报
- Zhang Ping'an: accelerate cloud digital innovation and jointly build an industrial smart ecosystem
- 张平安:加快云上数字创新,共建产业智慧生态
猜你喜欢

ROS learning (24) plugin

Centros 8 installation MySQL Error: The gpg Keys listed for the "MySQL 8.0 Community Server" repository are already ins

开发中对集合里面的数据根据属性进行合并数量时犯的错误

ROS learning (21) robot slam function package -- installation and testing of orbslam

建议收藏!!Flutter状态管理插件哪家强?请看岛上码农的排行榜!
![[unique] what is the [chain storage structure]?](/img/cd/be18c65b9d7faccc3c9b18e3b2ce8e.png)
[unique] what is the [chain storage structure]?

TiFlash 源码阅读(四)TiFlash DDL 模块设计及实现分析

张平安:加快云上数字创新,共建产业智慧生态

Stm32f4 --- general timer update interrupt

建議收藏!!Flutter狀態管理插件哪家强?請看島上碼農的排行榜!
随机推荐
Several classes and functions that must be clarified when using Ceres to slam
[unique] what is the [chain storage structure]?
STM32F4---通用定时器更新中断
Tiflash source code reading (IV) design and implementation analysis of tiflash DDL module
Golang foundation - data type
3D laser slam: time synchronization of livox lidar hardware
Centros 8 installation MySQL Error: The gpg Keys listed for the "MySQL 8.0 Community Server" repository are already ins
The GPG keys listed for the "MySQL 8.0 community server" repository are already ins
STM32F4---PWM输出
centos8安裝mysql報錯:The GPG keys listed for the “MySQL 8.0 Community Server“ repository are already ins
How did partydao turn a tweet into a $200million product Dao in one year
FLIR blackfly s usb3 industrial camera: white balance setting method
How to use strings as speed templates- How to use String as Velocity Template?
企业中台建设新路径——低代码平台
ROS学习(25)rviz plugin插件
张平安:加快云上数字创新,共建产业智慧生态
Centos8 install MySQL 8.0 using yum x
@Before, @after, @around, @afterreturning execution sequence
使用Ceres进行slam必须要弄清楚的几个类和函数
【论文阅读|深读】RolNE: Improving the Quality of Network Embedding with Structural Role Proximity