Role permission setting method and device

A technology of roles and permissions, applied in the computer field, can solve problems such as no permissions and difficulty in changing, and achieve the effect of flexible setting methods

Active Publication Date: 2020-07-31
HANGZHOU DT DREAM TECH
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the related technologies, once the role permissions are set, it is difficult to change. This is because: on the one hand, the service is deployed in multiple instances, and the management system is not allowed to affect users when it is upgraded This requires that the original account is not allowed to change its permissions within a certain period of time. On the other hand, if the scheme of adjusting the permissions corresponding to the role is adopted, the department administrator has just filled out the form for creating network products. Changing the system permissions at the time caused the department administrator to have no permission for this operation, which is unacceptable to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role permission setting method and device
  • Role permission setting method and device
  • Role permission setting method and device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0042] In this example, create a new administrator account, set the setting permissions corresponding to the new administrator account, and send a permission update request to the new administrator account, so that the new administrator account will be created with the corresponding role ID. Add a permission system, that is, add a new administrator account to perform the configuration of the new management system.

[0043] In this embodiment, it is also possible for the administrator to gradually delegate role authority setting, and the corresponding role authority is set by the upper-level role identifier corresponding to each role identifier, for example, the administrator sets the role authority of the department administrator, The administrator assigns department administrators to set the role permissions of project administrators, etc.

example 2

[0045] In this example, considering that in practical applications, role permissions have both functional and hierarchical relationships. For example, department management role permissions are associated with corresponding project management role permissions, and department management role permissions must be hierarchical. It is higher than the project management role permissions, and the lower-level role permissions depend on the higher-level role permissions. Therefore, it is necessary to supplement the high-level role permissions to create a corresponding new permission system.

[0046] Specifically, determine the priority of the role permission identifier carried in the permission update request, which can be obtained by querying the corresponding relationship in advance according to the service level, and then determine that the priority is higher than the role permission associated with the role permission identifier business ID, create a role ID corresponding to the rol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a role permission setting method and device, and belongs to the technical field of computers, and the method comprises the steps: obtaining a permission updating request carrying a role permission identifier and a role identifier; identifying an original role permission identifier corresponding to the original role identifier in the original permission system; and when the original permission system does not contain the original role permission identifier which is completely the same as the role permission identifier, creating a newly-added permission system containing the role identifier according to a preset rule, wherein the role identifier in the newly-added permission system has a role permission corresponding to the role permission identifier. Therefore, a flexible role permission setting method is provided, and when the role permission changes, the original role permission is not covered, and a new role permission service can be provided.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for setting role authority. Background technique [0002] With the popularization of cloud platforms, many organizations are accustomed to using online management systems to provide different management services. Among them, the management services of the management system relying on the cloud platform usually adopt role-based access control, that is, for each item of the system The function sets permissions, a set of permissions corresponds to a role, and the role is bound to the account. However, as business needs change, many roles and permissions will change. For example, a new security department and network department are added to the organization, responsible for some security and network-related authority operations of products. The previous department administrators are involved in security and network. The operation permission of needs to be remov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 刘珊珊
Owner HANGZHOU DT DREAM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products