From the security point of view, no system except auth_key can directly access the auth_key database,
which can be physically isolated during deployment to ensure the security of the database
Features
handshake
Generation auth_key
query_auth_key
Provide query auth_key service, only session has permission to access