Authority control method and device, electronic equipment and storage medium
A technology of permission control and permission control items, applied in the computer field, can solve the problems of not docking with distributed file system permission control, unable to meet resource permission allocation requirements, incompatible file system permission control, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050]The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.
[0051] The embodiment of the present application discloses a permission control method, which realizes the compatibility between the access control list of NFS V4 and the standard access control list.
[0052] see figure 1 , a flow chart of a permission control method shown according to an exemplary embodiment, as shown in figure 1 shown, including:
[0053] S101: Obtain all first permission control items of a target object; wherein, the first permission control items are permission contro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


