µÇ¼ÁÐ±í£¬×÷Ϊ·þÎñÆ÷·ÃÎÊ¿ØÖƵĻù´¡×é³É²¿·Ö£¬Æä²¿ÊðÓë¹ÜÀí²»½ö¹Øºõϵͳ°²È«£¬»¹Ö±½ÓÓ°Ïìµ½ÔËάÍŶӵŤ×÷ЧÂÊ
±¾ÎÄÖ¼ÔÚÌṩһ·ÝÏ꾡ÇÒ¾ß˵·þÁ¦µÄÖ¸ÄÏ£¬½ÌÄãÈçºÎÔÚ·þÎñÆ÷ÉϸßЧ²¿ÊðµÇ¼ÁÐ±í£¬È·±£ÏµÍ³µÄ°²È«Îȶ¨ÔËÐÐ
Ò»¡¢ÒýÑÔ£ºµÇ¼ÁбíµÄÖØÒªÐÔ µÇ¼ÁÐ±í£¬ÓֳƷÃÎÊ¿ØÖÆÁÐ±í£¨Access Control List, ACL£©£¬ÊǶ¨ÒåÄÄЩÓû§»òϵͳʵÌåÓÐȨ·ÃÎÊ·þÎñÆ÷×ÊÔ´µÄ¹æÔò¼¯ºÏ
Ëü°çÑÝ×Å¡°ÊØÃÅÔ±¡±µÄ½ÇÉ«£¬Í¨¹ýÑéÖ¤Óû§Éí·ÝºÍȨÏÞ£¬ÓÐЧ·Àֹδ¾ÊÚȨµÄ·ÃÎÊ£¬±£»¤Ãô¸ÐÊý¾ÝÃâÊÜй¶»ò´Û¸Ä
Ò»¸ö¾«ÐÄÉè¼ÆµÄµÇ¼ÁÐ±í²»½öÄÜÌáÉý°²È«ÐÔ£¬»¹Äܼò»¯Óû§¹ÜÀí£¬Ìá¸ßÔËάЧÂÊ
¶þ¡¢Ç°ÆÚ×¼±¸£ºÃ÷È·ÐèÇóÓë¹æ»® 1.ÐèÇó·ÖÎö£ºÊ×ÏÈ£¬Ã÷È··þÎñÆ÷³ÐÔØµÄÓ¦ÓÃÀàÐÍ¡¢Óû§ÈºÌå¡¢·ÃÎÊÆµÂʼ°°²È«µÈ¼¶ÒªÇó
²»Í¬ÀàÐ͵ķþÎñÆ÷£¨ÈçWeb·þÎñÆ÷¡¢Êý¾Ý¿â·þÎñÆ÷¡¢Îļþ·þÎñÆ÷µÈ£©¶ÔµÇ¼ÁбíµÄÐèÇó¸÷²»Ïàͬ
2.Óû§·ÖÀࣺ¸ù¾ÝÖ°ÔðºÍȨÏÞ£¬½«Óû§·ÖΪ¹ÜÀíÔ±¡¢¿ª·¢Õß¡¢²âÊÔÈËÔ±¡¢ÆÕͨÓû§µÈ²»Í¬½ÇÉ«
ÕâÓÐÖúÓÚʵʩ»ùÓÚ½ÇÉ«µÄ·ÃÎÊ¿ØÖÆ£¨RBAC£©£¬¼ò»¯È¨ÏÞ¹ÜÀí
3.²ßÂÔÖÆ¶¨£ºÖƶ¨ÏêϸµÄ·ÃÎÊ¿ØÖƲßÂÔ£¬°üÀ¨ÔÊÐíµÄµÇ¼ʱ¼ä¡¢IPµØÖ··¶Î§¡¢ÈÏÖ¤·½Ê½£¨ÈçÃÜÂë¡¢ÃÜÔ¿¶Ô¡¢Ë«ÒòËØÈÏÖ¤£©µÈ
4.¼¼ÊõÑ¡ÐÍ£ºÑ¡ÔñºÏÊʵÄÉí·ÝÈÏÖ¤ÓëÊÚȨϵͳ£¬ÈçLDAP£¨ÇáÁ¿¼¶Ä¿Â¼·ÃÎÊÐÒ飩¡¢Kerberos¡¢Active DirectoryµÈ£¬È·±£ÓëÏÖÓÐIT¼Ü¹¹¼æÈÝ
Èý¡¢²¿Êð²½Ö裺ʵʩÓëÅäÖà 1. ·þÎñÆ÷»·¾³ÅäÖà - ²Ù×÷ϵͳѡÔñ£º¸ù¾ÝÓ¦ÓÃÐèÇóÑ¡ÔñºÏÊʵIJÙ×÷ϵͳ£¨ÈçLinux¡¢Windows Server£©£¬²¢È·±£Æä°æ±¾·ûºÏ°²È«±ê×¼
- °²È«¸üУº°²×°ËùÓÐ×îÐµİ²È«²¹¶¡ºÍ¸üУ¬ÒÔ¼õÉÙÒÑ֪©¶´±»ÀûÓõķçÏÕ
- ·À»ðǽÉèÖãºÅäÖ÷À»ðǽ¹æÔò£¬½öÔÊÐí±ØÒªµÄ¶Ë¿Ú£¨ÈçSSH¡¢HTTP¡¢HTTPS£©¶ÔÍ⿪·Å£¬ÏÞÖÆÎ´¾ÊÚȨµÄ·ÃÎʳ¢ÊÔ
2. µÇ¼ÈÏÖ¤»úÖÆÅäÖà - SSHÃÜÔ¿ÈÏÖ¤£º¶ÔÓÚLinux·þÎñÆ÷£¬ÍƼöʹÓÃSSHÃÜÔ¿ÈÏÖ¤Ìæ´úÃÜÂëµÇ¼£¬Ìá¸ß°²È«ÐÔ
Éú³ÉÃÜÔ¿¶Ô£¬½«¹«Ô¿Ìí¼Óµ½·þÎñÆ÷µÄ`~/.ssh/authorized_keys`ÎļþÖУ¬Ë½Ô¿ÓÉÓû§±£¹Ü
- PAMÄ£¿éÅäÖãºÔÚLinuxÉÏ£¬¿Éͨ¹ýÅäÖÃPluggable Authentication Modules£¨PAM£©À´ÔöÇ¿ÈÏÖ¤»úÖÆ£¬Èç½áºÏLDAP½øÐм¯ÖÐÈÏÖ¤
- Windows ServerÈÏÖ¤£ºWindows ServerÖ§³Ö¶àÖÖÈÏÖ¤·½Ê½£¬°üÀ¨±¾µØÕË»§¡¢Active Directory¼¯³ÉµÈ
È·±£ÆôÓÃÕË»§Ëø¶¨²ßÂÔ£¬ÏÞÖÆ´íÎóµÇ¼³¢ÊÔ´ÎÊý
3. µÇ¼Áбí¹ÜÀí - Óû§ÕË»§¹ÜÀí£ºÊ¹Óýű¾»ò¹ÜÀí¹¤¾ß£¨ÈçAnsible¡¢Puppet£©ÅúÁ¿´´½¨¡¢Ð޸ĺÍɾ³ýÓû§ÕË»§£¬È·±£ËùÓÐÕË»§·ûºÏ°²È«²ßÂÔ
- ȨÏÞ·ÖÅ䣺¸ù¾ÝÓû§½ÇÉ«·ÖÅä×îС±ØÒªÈ¨ÏÞÔÔò£¨Principle of Least Privilege£©£¬±ÜÃâ¹ý¶ÈÊÚȨ
- ÈÕÖ¾É󼯣ºÆôÓõǼÈÕÖ¾¼Ç¼£¬¶¨ÆÚÉó²éÈÕÖ¾£¬¼°Ê±·¢ÏÖ²¢ÏìÓ¦Òì³£µÇ¼ÐÐΪ
4. ·ÃÎÊ¿ØÖÆÓë¼à¿Ø - ¶àÒòËØÈÏÖ¤£º¶ÔÓڹؼü·þÎñÆ÷»òÃô¸Ð²Ù×÷£¬ÊµÊ©¶àÒòËØÈÏÖ¤£¬Ôö¼Ó°²È«²ã¼¶
- »á»°¹ÜÀí£ºÉèÖûỰ³¬Ê±£¬ÏÞÖÆÍ¬Ò»Óû§Í¬Ê±µÇ¼µÄ»á»°Êý£¬·ÀÖ¹»á»°½Ù³Ö
- ÈëÇÖ¼ì²âϵͳ£º²¿ÊðÈëÇÖ¼ì²âϵͳ£¨IDS£©»òÈëÇÖ·ÀÓùϵͳ£¨IPS£©£¬ÊµÊ±¼à¿Ø²¢·ÀÓùDZÔÚÍþв
ËÄ¡¢Î¬»¤ÓëÓÅ»¯£º³ÖÐø¸Ä½ø 1.¶¨ÆÚÉ󼯣º¶¨ÆÚ¶ÔµÇ¼ÁÐ±í½øÐÐÉ󼯣¬ÇåÀí²»ÔÙÐèÒªµÄÕË»§£¬¸üÐÂȨÏÞÅäÖÃ
2.°²È«Åàѵ£ºÌá¸ßÓû§µÄ°²È«Òâʶ£¬¶¨ÆÚ½øÐа²È«Åàѵ£¬½ÌÓýÓû§ÈçºÎ±£»¤¸öÈËÐÅÏ¢£¬±ÜÃâÃÜÂëй¶
3.Ó¦¼±ÏìÓ¦¼Æ»®£ºÖƶ¨Ï꾡µÄÓ¦¼±ÏìÓ¦¼Æ»®£¬°üÀ¨ÕË»§Ð¹Â¶¡¢¶ñÒâµÇ¼µÈÇé¿öµÄ´¦ÀíÁ÷³Ì£¬È·±£¿ìËÙÓÐЧµØÓ¦¶Ô°²È«Ê¼þ
4.¼¼ÊõÉý¼¶£º¹Ø×¢×îÐµİ²È«¼¼Êõ·¢Õ¹£¬ÊÊʱÉý¼¶ÈÏÖ¤ÓëÊÚȨϵͳ£¬²ÉÓøüÏȽøµÄ¼ÓÃܼ¼ÊõºÍÉí·Ý¹ÜÀí½â¾ö·½°¸
Îå¡¢°¸Àý·ÖÏí£º×î¼Ñʵ¼ù - ij½ðÈڿƼ¼¹«Ë¾£º¸Ã¹«Ë¾²ÉÓÃLDAP×÷Ϊ¼¯ÖÐÈÏÖ¤Ô´£¬½áºÏKerberosʵÏÖµ¥µãµÇ¼£¨SSO£©£¬ÓÐЧ¼ò»¯ÁËÓû§¹ÜÀíÁ÷³Ì£¬Í¬Ê±ÔöÇ¿Á˰²È«ÐÔ
ͨ¹ý¶¨ÆÚÉó¼ÆºÍÈÕÖ¾·ÖÎö£¬¼°Ê±·¢ÏÖ²¢×èÖ¹Á˶àÆðDZÔڵݲȫÍþв
- ijÔÚÏß½ÌÓýƽ̨£º¸Ãƽ̨ÀûÓÃAnsible×Ô¶¯»¯½Å±¾¹ÜÀí·þÎñÆ÷