Unlock instant, AI-driven research and patent intelligence for your innovation.

Permission configuration method and device, equipment and medium

A permission configuration and permission technology, applied in the computer field, can solve problems such as unintuitiveness and complicated operation, and achieve the effect of simplifying the operation of permission configuration

Pending Publication Date: 2022-03-22
CCB FINTECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For an application-centric IT resource lifecycle management platform, the traditional menu-level, interface-level, and data-level permission configuration methods are all based on tables in the CMDB database to find configuration item instances through configuration items. In general, a The application contains multiple levels of resources, and each level of resources contains multiple instances of configuration items, making the operation complicated and unintuitive when the user configures permissions for the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission configuration method and device, equipment and medium
  • Permission configuration method and device, equipment and medium
  • Permission configuration method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present disclosure.

[0041] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a permission configuration method and device, equipment and a medium, which can be applied to the technical field of computers and can also be applied to the technical field of finance. The permission configuration method comprises the steps that a target configuration item instance topological graph is determined, and the target configuration item instance topological graph comprises the incidence relation between different configuration item instances in an application with the permission to be configured; determining one or more target configuration item instances according to an association relationship among different configuration item instances; in response to a selection operation for a target role and one or more target configuration item instances in a visual interface, generating matching result information for representing the target role and the one or more target configuration item instances; and configuring the permission of the target configuration item instance for the target role by using the permission configuration server according to the matching result information.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular to a rights configuration method, device, device, medium and program product. Background technique [0002] CMDB (Configuration Management Database) is a database for storing resources. CMDB has developed from a basic resource-oriented platform to an application-centric IT resource life cycle management platform. The breadth and depth of resources in CMDB have been expanded. It has developed from the previous layer of basic resources to multi-level resources, and its breadth is no longer limited to the previous basic resources. [0003] For an application-centric IT resource lifecycle management platform, the traditional menu-level, interface-level, and data-level permission configuration methods are all based on tables in the CMDB database to find configuration item instances through configuration items. In general, a An application contains multiple levels of resou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F16/901G06F16/903
CPCG06F21/604G06F16/9024G06F16/903
Inventor 杨喆谢振山
Owner CCB FINTECH CO LTD