Unlock instant, AI-driven research and patent intelligence for your innovation.

Authority control method and device, electronic equipment and storage medium

A technology of permission control and permission control items, applied in the computer field, can solve the problems of not docking with distributed file system permission control, unable to meet resource permission allocation requirements, incompatible file system permission control, etc.

Inactive Publication Date: 2020-03-31
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The standard access control list solves the problem that the owner, group, and other users / groups cannot meet the resource permission allocation requirements under Linux
Since the NFS-Ganesha v4 ACL has a finer granularity than the POSIX ACL permission control, it is usually very complicated to map an arbitrary NFSv4 ACL access control list to a POSIX ACL with the same semantics, and vice versa
Therefore, there is a problem of permission control incompatibility between the two file systems, and there is currently no method for docking distributed file system permission control for NFS-Ganesha v4 version

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method and device, electronic equipment and storage medium
  • Authority control method and device, electronic equipment and storage medium
  • Authority control method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0051] The embodiment of the present application discloses a permission control method, which realizes the compatibility between the access control list of NFS V4 and the standard access control list.

[0052] see figure 1 , a flow chart of a permission control method shown according to an exemplary embodiment, as shown in figure 1 shown, including:

[0053] S101: Obtain all first permission control items of a target object; wherein, the first permission control items are permission contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authority control method and apparatus, an electronic device and a computer readable storage medium. The method comprises the steps of obtaining all first authority controlitems of a target object; wherein the first permission control item is a permission control item in a standard access control list, and the target object comprises a target file or a target directory;mapping the first role type in each first permission control item into a second role type, and mapping the first permission type in each first permission control item into a second permission type soas to obtain a second permission control item corresponding to each first permission control item; wherein the second permission control item is a permission control item in an access control list conforming to the NFS v4 version; and performing permission control on the target object by utilizing the second permission control item. Therefore, the standard access control list is mapped into the access control list of the NFS V4, and the compatibility of the access control list of the NFS V4 and the standard access control list is realized.

Description

technical field [0001] The present application relates to the field of computer technology, and more specifically, to an authority control method and device, an electronic device, and a computer-readable storage medium. Background technique [0002] The NFS-Ganesha V4 protocol version is a user-mode network file system. The access control list uses the format and permission control draft stipulated by the NFS V4 protocol, which is quite different from the Posix standard access control list (ACL, Access Control Lists). [0003] By default, the distributed file system supports the Posix ACL permission control draft, that is, the standard access control list. The standard access control list solves the problem that the owner, group, and other users / groups cannot meet the resource permission allocation requirements under Linux. Since NFS-Ganesha v4 ACLs have finer granularity than POSIX ACLs, it is usually very complicated to map arbitrary NFSv4 ACLs to POSIX ACLs with the same...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/182G06F21/60G06F21/62
CPCG06F21/6218G06F16/182G06F21/604
Inventor 臧林劼何营
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD