当前位置:网站首页>The boss is quarantined
The boss is quarantined
2022-07-07 02:18:00 【Ma Nong turns over】
1
Telecommuting
As a small and medium-sized company IT Head of department operation and maintenance , Zhang Dafu has been under great pressure recently .
Under the epidemic , Several people in the company have been isolated as close contacts , The voice of other employees for home telecommuting is getting louder .
Zhang Dapu also wants to work remotely at home , Safe and free , But the company's customer management system ,OA The systems are deployed in the company's own computer room , It is an internal LAN , How can I visit at home ?
Cannot access , How to telecommute ?
Obviously , The simplest way is to build a set VPN System , Everyone is assigned an account , This solves the problem . however VPN The configuration is complex and expensive , It's not suitable for this small company .
Zhang dafun is bored searching on the Internet , I found a man called “ Dandelion Yi Lian ” Office platform , No need for a private network 、 There is no need for the public network IP, There is no need to change the existing network structure , You can easily build a virtual LAN , Let employees visit the company at home IT System .
This “ The dandelion ” It works like this :
First step , Operations staff ( That is, oneself ) Create a dandelion management platform “ virtual network ”.
The second step , Create a member account for each employee in the virtual network , Each member will be assigned one ID、 Passwords and virtual IP Address .
( Click to see a larger image )
The third step , Each employee downloads and installs dandelion client .( Of course , It also needs to be installed on the company's server )
In addition to supporting Windows outside , Dandelion client also supports almost all other mainstream operating systems on the market :
then , Employees can log in with the previously created account and password .
Now every machine has a virtual IP, Employees can not only use it to access OA and CRM System , Machines among employees can also be interconnected .
Zhang Dapu really didn't expect , It's so simple to build a virtual LAN !
He excitedly went to the boss to report the good news , Expect the boss to give an order , Everyone can go home and work remotely .
The boss listened to the report , be noncommittal , Just a faint question : How safe ? If an employee's account is compromised , our OA and CRM The system is not equivalent to running naked on the Internet ?
Zhang Dafu's head was suddenly covered , I'm too impulsive , Report to the boss before considering improvement , I made a big mistake .
Zhang Dafu apologized repeatedly : I don't think well , Go back and study , Come back and make a report .
2
Secure access
Back to your seat , Zhang Dafan thought carefully : Is the boss too demanding ?!
Now even VPN System , The account has been leaked , Isn't the intranet system also exposed ? Also streaked ? The same problem !
If you make an analogy ,VPN The gateway is like a guard , Legal users have passed the inspection of the guard , Enter the community , He will only go where he wants to go 1 building .
But for hackers who steal other people's identities , Once he enters the community , Just go 1 building , I will definitely go 1,2,3... Stroll around building , See if there is anything valuable , Steal it , Or ambush a back door or something .
Can't even a user who logs in to the system through the account password be trusted ? What should I do ?
Zhang Dafu was stunned .
Is this time , Go to the tea room to fetch water CTO Lao he saw Zhang Dafu in a daze , Gently patted him on the shoulder : What do you daydream in broad daylight ?
Zhang Dafu told Lao he about his experience and confusion , Lao he laughed :“ Your problem is also easy to solve , Use your example to compare , We first check at the gate of the community , But even if a person passes the guard's inspection , Enter the community , When he is doing something , And continue to be checked , See if his identity is right , Do you have permission to , If an exception is found , Just kick him out .”
“ That is to say, the principle of minimum permission should be used , Implement refined authority control ?” Zhang Da Pang asked .
“ Children can teach !” Old he left with a cup .
Zhang Dafu immediately went to check the dandelion easy plan , It is found that it supports custom setting of access permissions between members , So as to realize the refined access strategy .
Managers can meet different job requirements 、 Working hours , Set different access permissions for resources in the network . for example : Ordinary employees can only access OA System 、 Finance can access the corresponding financial system , R & D visit git、SVN etc. , Implement the minimum permission principle , High precision protection of sensitive data access security .
( Click to see a larger image )
This solves the problem ?
3
In depth research
however , This time, Zhang Dafang learned well , We must do in-depth research , Then you can report to the boss .
This time when Zhang Dafu was creating the network , I chose “ Custom network ”:
Assign account numbers to employees , When creating network members , Specify the role of the employee :
By default , Ordinary members cannot communicate with each other , Only with center members ( For example, server ) Interworking .
“ Dandelion Yi Lian ” There is also a very powerful access strategy , Fine authorization , For example, you can specify that certain users can only access certain machines , It can only be accessed at a certain time :
( Click to see a larger image )
For example, he Xiaoheng's machine in the above figure can only be accessed from Monday to Friday CRM The server .
Zhang Dafan is very satisfied , With refined authorization , It solves the boss's requirements .
In addition to the prior permission configuration ,“ Dandelion Yi Lian ” It also supports post event log auditing , Who logged in to the client at what time and where , Have you done anything , You can check . The so-called prior perception , Ex post facto .
He continued to try , I also found several very good functions , For example, data transmission adopts RSA/AES Hybrid asymmetric encryption algorithm , It's kind of like Https The implementation of , Very safe .
There is also device terminal verification , If this device is not a trusted terminal like a private computer ,“ The dandelion ” It will be continuously verified , It is required to provide dynamic verification code .
This is equivalent to security guards everywhere in the community , To thieves ( Untrusted terminals ) Keep checking , Exception found , Alarm immediately .
What's more useful is , It also supports third-party data access , You can put enterprise wechat 、 nailing 、 Flying book, etc IM Get your address book data , Real time synchronization , Staff entry 、 quit 、 Permission changes are updated in real time , Greatly improve the convenience of member management .
4
The end of the
Before reporting , Zhang Dafan made one PPT, Count it “ Dandelion Yi Lian ” Several advantages of :
1. Support pure software solutions , Not limited by hardware , Do not change the existing network structure
2. Efficient and easy to use , Low threshold for use , One click networking 、 One click connection
3. Low cost , High cost performance , There is no need for special line and public network IP
4. The most important , Very safe
Zhang Dafu is full of confidence this time , He was preparing to report , In wechat, the boss suddenly called him crazily :
Da Pang Zhang , I was quarantined ! How come the network of remote office hasn't been set up yet ?!
Zhang Dafu was surprised and delighted , Hurry up PPT Transfer the past : Boss, don't worry ,“ Dandelion Yi Lian ” Do it right away , You can access the Intranet in a moment !
Welcome to scan the code and consult dandelion Yilian
边栏推荐
- 新一代云原生消息队列(一)
- 15million employees are easy to manage, and the cloud native database gaussdb makes HR office more efficient
- 【论文阅读|深读】 GraphSAGE:Inductive Representation Learning on Large Graphs
- Flir Blackfly S USB3 工业相机:计数器和定时器的使用方法
- TiFlash 源码阅读(四)TiFlash DDL 模块设计及实现分析
- Modify the system time of Px4 flight control
- centos8安裝mysql報錯:The GPG keys listed for the “MySQL 8.0 Community Server“ repository are already ins
- 老板被隔离了
- Tips for web development: skillfully use ThreadLocal to avoid layer by layer value transmission
- ROS学习(22)TF变换
猜你喜欢
Blackfly s usb3 industrial camera: buffer processing
STM32F4---PWM输出
Centos8 install MySQL 8.0 using yum x
@Before, @after, @around, @afterreturning execution sequence
Livox激光雷达硬件时间同步---PPS方法
Ros Learning (23) Action Communication Mechanism
ROS learning (23) action communication mechanism
【论文阅读|深读】ANRL: Attributed Network Representation Learning via Deep Neural Networks
Shell script quickly counts the number of lines of project code
ROS学习(24)plugin插件
随机推荐
MySQL execution process and sequence
Zabbix 5.0:通过LLD方式自动化监控阿里云RDS
组合导航:中海达iNAV2产品描述及接口描述
Time synchronization of livox lidar hardware -- PPS method
建議收藏!!Flutter狀態管理插件哪家强?請看島上碼農的排行榜!
Zhang Ping'an: accelerate cloud digital innovation and jointly build an industrial smart ecosystem
【LeetCode】Day97-移除链表元素
Stm32f4 --- general timer update interrupt
将截断字符串或二进制数据
Shell script quickly counts the number of lines of project code
Zhang Ping'an: accelerate cloud digital innovation and jointly build an industrial smart ecosystem
遇到慢SQL该怎么办?(下)
Input and output of C language pointer to two-dimensional array
XML to map tool class xmlmaputils (tool class V)
Sensor: DS1302 clock chip and driver code
【论文阅读|深读】ANRL: Attributed Network Representation Learning via Deep Neural Networks
Flir Blackfly S工业相机:颜色校正讲解及配置与代码设置方法
[leetcode] day97 remove linked list elements
Cat recycling bin
Alibaba cloud middleware open source past