Multi-tenant authority authentication method based on operation and maintenance auditing system

A multi-tenant, tenant technology, applied in the computer field, can solve problems such as low query performance of connected tables

Active Publication Date: 2020-11-24
CHENGDU DBAPP SECURITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Linked table query performance is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-tenant authority authentication method based on operation and maintenance auditing system
  • Multi-tenant authority authentication method based on operation and maintenance auditing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] A multi-tenant permission authentication method based on the operation and maintenance audit system, such as figure 1 As shown, a unified materialized view is established for users, roles, roles, tenants, and their relationships. The view is divided into two materialized views, one is the policy view, which stores the relationship between roles, tenants, and permissions, and the other is the group view, which stores Users inherit roles, and tenants inherit tenant associations. The minimum models of each table are shown in Table 1-Table 7 below:

[0025] Table 1 user table user

[0026] ID name ... User ID user name The rest of the fields are irrelevant to this scenario

[0027] Table 2 role table role

[0028] ID name type character ID Role Name Role type, 1 is system built-in, 2 is custom

[0029] Table 3 tenant table tenant

[0030] ID name ... tenant ID tenant name The rest of the fields ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-tenant authority authentication method based on an operation and maintenance auditing system, which comprises a group view and a poly view, and the policy view is usedfor storing the relationship among roles, tenants and authorities; the group view is used for storing association relationships between user inheritance roles and tenant inheritance tenants. Aiming atusers, roles, authorities and relations of the users, roles and authorities in an operation and maintenance auditing system, related authorized behaviors are converted into a specific structure by using a database materialized view, so that the unified authentication of the users, user groups and behaviors under multiple tenants can be realized, and the key point is that the authorized query andauthentication are unified through the materialized view and a specific storage structure. According to the invention, the logic of unified system permission judgment is realized, the maintenance costof the system is reduced, the complexity of the system is reduced, and the permission authentication performance is improved.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a multi-tenant authority authentication method based on an operation and maintenance audit system. Background technique [0002] In the existing operation and maintenance audit system, for the permission storage scheme in the operation and maintenance audit system, several default roles are generally built into the system, such as administrator, auditor, operation and maintenance personnel, to realize the separation of multiple rights, create When specifying the user's role, when performing an operation, determine which permissions the user has according to the user's role. When a user performs an operation, it is judged within the logic of the operation whether there is permission to execute it. The disadvantage is that the logic needs to be maintained manually, the maintenance cost is high, and the error rate is high. In a multi-tenant environment, the specified ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6227G06F2221/2141
Inventor 杨泽丰范渊吴永越郑学新刘韬
Owner CHENGDU DBAPP SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products