主权项 |
1. A computer-implemented method comprising:
receiving, at a control layer of a computing resource service provider via an application accessed by a user device, a request to access a service; receiving, at the control layer of the computing resource service provider via the application, a user identifier and a password associated with the user identifier for accessing the service; obtaining a first authentication of the user identifier and the password using an authentication directory accessible by the computing resource provider, the authentication directory comprising one of a plurality of directories accessible by the computing resource provider; at least partly in response to obtaining the first authentication, encrypting the password to create an encrypted password; transmitting the encrypted password to the application accessed by the user device, wherein the application is configured to decrypt the encrypted password to create a decrypted password and transmit the decrypted password to the user device; receiving, from the user device, at a data layer of the computing resource provider, and independently of the control layer, the decrypted password; and obtaining a second authentication of the decrypted password. |