Access authority management method and device
An access authority management and access authority technology, which is applied in the field of access authority management methods and devices, can solve the problems of low flexibility of access authority management, and achieve the effect of high flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0074] Step S711: Determine the target role of the user and the target resource to be accessed. The target role of the user is the fifth sub-role, the target resource is the fifth resource, and the fifth sub-role is determined as the current role.
[0075] Step S712: According to the pre-established authority relationship between the user and the resource, determine whether the current role has the authority to access the target resource. according to figure 2 It can be seen that the fifth sub-role has the access authority to the fifth resource and the sixth resource, so the current role has the authority to access the target resource.
[0076] Step S713: Confirm that the user has the right to access the target resource, so as to ensure that the user can access the target resource.
Embodiment 2
[0078] Step S721: Determine the current role of the user and the target resource to be accessed. The target role of the user is the fifth sub-role, the target resource is the first resource, and the fifth sub-role is determined as the current role.
[0079] Step S732: According to the pre-established authority relationship between the user and the resource, determine whether the current role has the authority to access the target resource. according to figure 2 It can be seen that the fifth sub-role only has the access right to the fifth resource and the sixth resource, so the current role does not have the right to access the target resource.
[0080] Step S723: According to the authority relationship, determine whether the current role has sub-roles. according to figure 2 It can be seen that the current role has no sub-roles.
[0081] Step S724: Confirm that the user does not have the right to access the target resource.
Embodiment 3
[0083] Step S731: Determine the current role of the user and the target resource to be accessed. The target role of the user is the second sub-role, the target resource is the fifth resource, and the second sub-role is determined as the current role.
[0084] Step S732: According to the pre-established authority relationship between the user and the resource, determine whether the current role has the authority to access the target resource. according to figure 2 It can be seen that the second sub-role only has the direct access right to the eighth resource, so the current role does not have the right to access the target resource.
[0085] Step S733: According to the authority relationship, determine whether the current role has sub-roles. according to figure 2 It can be seen that the current role has a fifth sub-role.
[0086] Step S734: Select one of the sub-roles as the current sub-role of the current character. At this point, the fifth subrole can be selected as th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


