Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-tenant authority authentication method based on operation and maintenance audit system

A multi-tenant and tenant technology, applied in the computer field, can solve problems such as low query performance of linked tables, achieve the effects of reducing complexity, improving performance, and reducing maintenance costs

Active Publication Date: 2022-07-19
CHENGDU DBAPP SECURITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Linked table query performance is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-tenant authority authentication method based on operation and maintenance audit system
  • A multi-tenant authority authentication method based on operation and maintenance audit system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] A multi-tenant authorization authentication method based on the operation and maintenance audit system, such as figure 1 As shown, a unified materialized view is established for users, roles, roles, tenants, and their relationships. The view is divided into two materialized views, one is the policy view, which stores the relationship between roles, tenants and permissions, and the other is the group view, which stores Users inherit roles, and tenants inherit the association relationship of tenants. The minimum model of each table is shown in Table 1-Table 7 below:

[0025] Table 1 user table user

[0026] Id name ... User ID user name The rest of the fields are irrelevant to this scheme

[0027] Table 2 role table role

[0028] Id name type role id Role Name Role type, 1 is built-in system, 2 is custom

[0029] Table 3 tenant table tenant

[0030] Id name ... Tenant ID Tenant name The rest o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-tenant authority authentication method based on an operation and maintenance audit system, including a group view and a policy view, wherein the policy view is used to store the relationship between roles, tenants and permissions; the group view is used to store user inheritance Roles and tenants inherit the relationship of tenants. The present invention is aimed at users, roles, permissions and their relationships in the operation and maintenance audit system. Under multi-tenancy, the relevant authorization behavior is converted into a specific structure using the database materialized view, which can realize the unified behavior of users, user groups, and multi-tenant behaviors. Authentication, the key point is to unify the query and authentication of authorization through the materialized view and a specific storage structure. The invention realizes the logic of unified system authority determination, reduces the maintenance cost of the system, reduces the complexity of the system, and improves the performance of authority authentication.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a multi-tenant authority authentication method based on an operation and maintenance audit system. Background technique [0002] In the existing operation and maintenance audit system, for the permission storage scheme in the operation and maintenance audit system, several default roles are generally built into the system, such as administrator, auditor, The role of the user is specified at the time of the user, and when an operation is performed, the permissions of the user are determined according to the role of the user. When a user performs a certain operation, it is judged in the logic of the operation whether there is permission to execute it. The disadvantage is that the logic needs to be manually maintained, the maintenance cost is high, and the error rate is high. In a multi-tenant environment, a specified role is associated with a tenant. The isolation of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6227G06F2221/2141
Inventor 杨泽丰范渊吴永越郑学新刘韬
Owner CHENGDU DBAPP SECURITY