Method and device for authority management in operation and maintenance management system based on key
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of operation and maintenance management and authority management, applied in the direction of digital data authentication, etc., to achieve the effect of improving security and concealment, improving standardization and privacy, and ensuring security
Inactive Publication Date: 2019-11-05
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF2 Cites 2 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0005] The technical task of the present invention is to provide a keycloak-based method and device for authority management in the operation and maintenance management system to solve how to manage the data authority of resources while fully satisfying the operation and maintenance personnel's use requirements for the operation and maintenance management system The problem
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0050] as attached figure 1 As shown, the method for authority management in the operation and maintenance management system based on keycloak of the present invention, the method steps are as follows:
[0051] S1. Realize the inheritance of user roles through the configuration of groups based on keycloak;
[0052] S2. Through the keycloak authentication mechanism, the authentication process of the operation and maintenance management system user is controlled to realize the overall resource and authority control of the operation and maintenance management system, including:
[0053] S201. Resource management;
[0054] S202. Authority policy management;
[0055] S203. Policy execution.
[0056] In step S1, based on keycloak through the configuration of groups, the specific steps to realize the inheritance of user roles are as follows:
[0057] S101, enter the keycloak management page, and create realms, clients, groups, and user roles in keycloak;
[0058] S102. Configure...
Embodiment 2
[0073] The device for authority management in the operation and maintenance management system based on keycloak of the present invention includes:
[0074] The user role inheritance unit is used to implement the inheritance of user roles through the configuration of groups based on keycloak;
[0075] The authentication process control unit is used to control the authentication process of the user of the operation and maintenance management system through the authentication mechanism of keycloak, so as to control the overall resources and permissions of the operation and maintenance management system.
[0076] The certification process control unit includes,
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a method and a device for authority management in an operation and maintenance management system based on a key and belongs to the field of cloud platform delivery and operation. In order to solve the technical problem of how to manage the data permission of resources and completely meet the use requirements of operation and maintenance personnel on an operation and maintenance management system, the technical scheme is as follows: (1) the method comprises the following steps: S1, realizing the inheritance of a user role through group configuration on the basis of keylock; S2, controlling an authentication process of a user of the operation and maintenance management system through an authentication mechanism of a key to realize control of resources and permission of the whole operation and maintenance management system, specifically comprising the following steps: S201, carrying out resource management; S202, carrying out authority strategy management; S203, carrying out strategy execution. (2) the device comprises a user role inheritance unit and an authentication process control unit. The user role inheritance unit is used for realizing inheritance of a user role based on key through group configuration. The authentication process control unit is used for controlling the authentication process of the operation and maintenance management system user through an authentication mechanism of the key.
Description
technical field [0001] The present invention relates to the field of cloud platform delivery and operation and maintenance, in particular to a method and device for authority management in an operation and maintenance management system based on keycloak. Background technique [0002] The traditional rights management system includes four parts, users, roles, modules, and resources. In the table design of the database, these four tables are called the entity tables of the authority management system. As long as these four entity tables are made, the structure of the authority management system will be built completely. The translation of such an authority management system into Chinese is: authority The management system is a system that judges whether a user or role has any functions for which resources. [0003] However, in rights management, only the management of data rights for resources cannot fully meet the needs of operation and maintenance personnel for the use of t...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.
Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/45
Inventor 马玉玺吴东生
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD