Joke Collection Website - Public benefit messages - How to configure interface permissions in a distributed system

How to configure interface permissions in a distributed system

Unified authorized access and user authentication.

1. Unified authorized access: Use web server or zuul as the first and second layer reverse proxy to deal with common network penetration and crawler attacks. On this premise, it deals with the issues of interface authorization and access security, and carries out security control from the client and server.

2. User authentication: The user initiates the login request through the user name and password, and the security level can be improved by cooperating with verification code, SMS verification and WeChat verification. Log in to zuul, which requests access to the authority center, and the services of zuul reverse proxy authority center, query user and role information, and conduct query matching.