CN111193612A - Access authority configuration control method and system - Google Patents
Access authority configuration control method and system Download PDFInfo
- Publication number
- CN111193612A CN111193612A CN201911222719.9A CN201911222719A CN111193612A CN 111193612 A CN111193612 A CN 111193612A CN 201911222719 A CN201911222719 A CN 201911222719A CN 111193612 A CN111193612 A CN 111193612A
- Authority
- CN
- China
- Prior art keywords
- user
- authority configuration
- configuration
- authority
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Small-Scale Networks (AREA)
Abstract
The embodiment of the invention provides an access right configuration control method and a system, wherein the system comprises the following steps: the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer; the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups; the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user; and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user, can perform grouped authority configuration management on the user, and sets the users with the same authority configuration into the same authority configuration group, so that the authority configuration can be distributed to the user when the user accesses the network application, the network access authority configuration for the user is controlled, and the authority configuration of enterprise personnel is effectively managed, conveniently and quickly.
Description
Technical Field
The embodiment of the invention relates to the technical field of network management, in particular to a method and a system for controlling access authority configuration.
Background
With the continuous development of network technology, more and more business processing systems exist in enterprises, and with the popularization of mobile office and cloud-on-enterprise, personnel in the enterprises generally need to access the business processing systems in the intranet through a browser of an external network to acquire resource data, while different enterprise personnel have different authority configurations, and for large-scale enterprises, the authority configuration management of the enterprise personnel is extremely complex.
Therefore, how to provide a technical scheme to effectively manage the authority configuration of the enterprise personnel is convenient and quick, and is a technical problem to be solved by technical personnel in the field.
Disclosure of Invention
Therefore, the embodiment of the invention provides an access authority configuration control method and system, which can effectively manage the authority configuration of the enterprise personnel, and is convenient and quick.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides an access right configuration control system, including:
the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer;
the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user;
and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user.
Preferably, the permission configuration includes: the access authority of the user to enterprise application, the operation authority of the user side, the plug-in configuration of the user side and the parameter configuration of the user side.
Preferably, the method further comprises the following steps:
the permission configuration group adding module is used for responding to a first input instruction of a user and adding a new permission configuration group;
and the permission configuration group changing module is used for responding to a second input instruction of the user and changing the name of the permission configuration group.
The permission configuration group deleting module is used for responding to a third input instruction of the user and deleting the permission configuration group;
and the authority configuration group query module is used for responding to a fourth input instruction of the user and querying the authority configuration group.
Preferably, the method further comprises the following steps: and the authority configuration group alarm module is used for sending out a popup alarm or a sound signal alarm when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group.
Preferably, the method further comprises the following steps:
the user adding module is used for responding to a fifth input instruction of the user and adding a new user;
and the user changing module is used for responding to a sixth input instruction of the user and changing the name of the user.
Preferably, the method further comprises the following steps:
the user deleting module is used for responding to a seventh input instruction of the user and deleting the user;
and the user query module is used for responding to an eighth input instruction of the user and querying the user.
Preferably, the method further comprises the following steps:
and the user multi-authority configuration reminding module is used for sending out reminding information aiming at the user when detecting that the same user exists in more than one authority configuration group.
In a second aspect, the present invention provides an access right configuration control method, which is applied to the access right configuration control system according to any of the above first aspects, and includes:
constructing N permission configuration groups; wherein N is a positive integer;
adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
adding authority configuration to the N authority configuration groups respectively according to the authority configuration of the user;
when the user accesses the network application, the authority configuration of the authority configuration group where the user is located is distributed to the user side so as to control the access authority configuration of the user.
Preferably, the method further comprises the following steps:
detecting whether the newly added authority configuration group is the same as the name of the current authority configuration group;
and when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group, sending out a popup alarm or a sound signal alarm.
Preferably, the method further comprises the following steps:
detecting whether the same user exists in more than one authority configuration group;
if yes, sending out the reminding information aiming at the user.
The embodiment of the invention provides an access right configuration control system, which comprises: the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer; the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups; the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user; and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user, can perform grouped authority configuration management on the user, and sets the users with the same authority configuration into the same authority configuration group, so that the authority configuration can be distributed to the user when the user accesses the network application, the network access authority configuration for the user is controlled, and the authority configuration of enterprise personnel is effectively managed, conveniently and quickly.
The access right configuration control method provided by the embodiment of the invention also has the beneficial effects, and is not described in detail herein.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
Fig. 1 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention;
FIG. 4 is a flowchart of a method for controlling access right configuration according to the present invention;
FIG. 5 is a flowchart illustrating a privilege configuration group detection method according to an embodiment of the present invention;
fig. 6 is a flowchart of user detection of an access right configuration control method according to the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 2, and fig. 3, fig. 1 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention; fig. 2 is a schematic view of an extended component structure of an access right configuration control system according to an embodiment of the present invention; fig. 3 is a schematic view of another expanded structure of an access right configuration control system according to an embodiment of the present invention.
In a specific implementation manner of the present invention, an embodiment of the present invention provides an access right configuration control system 100, including:
an authority configuration group construction module 110, configured to construct N authority configuration groups; wherein N is a positive integer;
a user adding module 120, configured to add users with the same authority configuration to the same authority configuration group in the N authority configuration groups;
the authority configuration adding module 130 is configured to add authority configurations to the N authority configuration groups according to the authority configuration of the user;
and the authority configuration distribution module 140 is configured to distribute the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application, so as to control the access authority configuration of the user.
The embodiment of the invention can manage the grouped authority configuration of the users, and the users with the same authority configuration are set in the same authority configuration group, so that the authority configuration can be distributed to the users when the users access the network application, the network access authority configuration used for the control can be controlled, the authority configuration of the enterprise personnel can be effectively managed, and the method is convenient and fast.
Specifically, in an embodiment, the user side may be set as a browser client side, a user may log in by using a login module on the browser client side, and after the user logs in, besides configuring the network right of the user side, some functions are allocated according to a group: for example, browser operation rights such as whether copying is possible, printing is possible, address bar is displayed, and the like; whether a certain browser plug-in is automatically downloaded and installed during login; setting browser parameters such as a browser kernel, a trusted site, a home page address, whether popup is allowed or not and the like; that is, the right configuration may specifically include: the access authority of the user to enterprise application, the operation authority of the user side, the plug-in configuration of the user side and the parameter configuration of the user side.
Further, in order to add, change, delete, and query the right configuration group, it is also possible to set, in the access right configuration control system 100: an authority configuration group adding module 150, configured to add a new authority configuration group in response to a first input instruction of a user; a permission configuration group changing module 160 for changing a name of the permission configuration group in response to a second input instruction of the user; a permission configuration group deleting module 170, configured to delete the permission configuration group in response to a third input instruction of the user; and the authority configuration group query module 180 is configured to query the authority configuration group in response to a fourth input instruction of the user.
Of course, since the names of the inputted permission configuration groups may be the same when the permission configuration groups are added, a permission configuration group alarm module 190 may be further disposed in the access permission configuration control system 100, and configured to issue a pop-up window alarm or an audio signal alarm when the permission configuration groups added by the permission configuration group adding module are the same as the names of the current permission configuration groups.
Further, in order to facilitate addition, modification, deletion, and inquiry to the user, it is also possible to set in the access right configuration control system 100: a user adding module 111, configured to add a new user in response to a fifth input instruction of the user; a user changing module 112, configured to change the name of the user in response to a sixth input instruction of the user; a user deleting module 113, configured to delete the user in response to a seventh input instruction of the user; and the user query module 114 is used for responding to an eighth input instruction of the user and querying the user.
Of course, since the same user may exist in different privilege configuration groups and have multiple privilege configurations, it is also possible to set in the access privilege configuration control system 100: and the user multi-authority configuration reminding module 115 is used for sending out reminding information aiming at the user when detecting that the same user exists in more than one authority configuration group.
Referring to fig. 4, fig. 5 and fig. 6, fig. 4 is a flowchart illustrating an access right configuration control method according to the present invention; FIG. 5 is a flowchart illustrating a privilege configuration group detection method according to an embodiment of the present invention; fig. 6 is a flowchart of user detection of an access right configuration control method according to the present invention.
In another embodiment of the present invention, the present invention provides an access right configuration control method, which is applied to the access right configuration control system according to any of the above first aspects, and includes:
step S11: constructing N permission configuration groups; wherein N is a positive integer;
step S12: adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
step S13: adding authority configuration to the N authority configuration groups respectively according to the authority configuration of the user;
step S14: when the user accesses the network application, the authority configuration of the authority configuration group where the user is located is distributed to the user side so as to control the access authority configuration of the user.
Preferably, the method further comprises:
step S21: detecting whether the newly added authority configuration group is the same as the name of the current authority configuration group;
step S22: and when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group, sending out a popup alarm or a sound signal alarm.
Preferably, the method further comprises:
step S31: detecting whether the same user exists in more than one authority configuration group;
step S32: if yes, sending out the reminding information aiming at the user.
The access right configuration control method in the foregoing embodiment has already been described in the relevant embodiments in the access right configuration control system, and is not described herein again.
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, such modifications and improvements are intended to be within the scope of the invention as claimed.
Claims (10)
1. An access right configuration control system, comprising:
the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer;
the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user;
and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user.
2. The access authority configuration control system according to claim 1,
the permission configuration comprises the following steps: the access authority of the user to enterprise application, the operation authority of the user side, the plug-in configuration of the user side and the parameter configuration of the user side.
3. The access right configuration control system according to claim 1, further comprising:
the permission configuration group adding module is used for responding to a first input instruction of a user and adding a new permission configuration group;
the permission configuration group changing module is used for responding to a second input instruction of the user and changing the name of the permission configuration group;
the permission configuration group deleting module is used for responding to a third input instruction of the user and deleting the permission configuration group;
and the authority configuration group query module is used for responding to a fourth input instruction of the user and querying the authority configuration group.
4. The access right configuration control system according to claim 3, further comprising:
and the authority configuration group alarm module is used for sending out a popup alarm or a sound signal alarm when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group.
5. The access right configuration control system according to claim 1, further comprising:
the user adding module is used for responding to a fifth input instruction of the user and adding a new user;
and the user changing module is used for responding to a sixth input instruction of the user and changing the name of the user.
6. The access right configuration control system according to claim 5, further comprising:
the user deleting module is used for responding to a seventh input instruction of the user and deleting the user;
and the user query module is used for responding to an eighth input instruction of the user and querying the user.
7. The access right configuration control system according to any one of claims 1 to 6, characterized by further comprising:
and the user multi-authority configuration reminding module is used for sending out reminding information aiming at the user when detecting that the same user exists in more than one authority configuration group.
8. An access authority configuration control method applied to the access authority configuration control system according to any one of claims 1 to 7, characterized by comprising:
constructing N permission configuration groups; wherein N is a positive integer;
adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
adding authority configuration to the N authority configuration groups respectively according to the authority configuration of the user;
when the user accesses the network application, the authority configuration of the authority configuration group where the user is located is distributed to the user side so as to control the access authority configuration of the user.
9. The access right configuration control method according to claim 8, further comprising:
detecting whether the newly added authority configuration group is the same as the name of the current authority configuration group;
and when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group, sending out a popup alarm or a sound signal alarm.
10. The access right configuration control method according to claim 8 or 9, characterized by further comprising:
detecting whether the same user exists in more than one authority configuration group;
if yes, sending out the reminding information aiming at the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911222719.9A CN111193612A (en) | 2019-12-03 | 2019-12-03 | Access authority configuration control method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911222719.9A CN111193612A (en) | 2019-12-03 | 2019-12-03 | Access authority configuration control method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111193612A true CN111193612A (en) | 2020-05-22 |
Family
ID=70710874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911222719.9A Pending CN111193612A (en) | 2019-12-03 | 2019-12-03 | Access authority configuration control method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111193612A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111970135A (en) * | 2020-07-09 | 2020-11-20 | 北京航空航天大学 | Typhoon tracking and detecting instrument information sharing method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103001803A (en) * | 2012-12-10 | 2013-03-27 | 上海斐讯数据通信技术有限公司 | Method and system for achieving right management in network management |
CN106301940A (en) * | 2016-08-25 | 2017-01-04 | 厦门易灵网络科技有限公司 | A kind of authority configuring method |
CN106570413A (en) * | 2016-10-19 | 2017-04-19 | 上海爱数信息技术股份有限公司 | System and method for controlling access permission of document system |
CN110474897A (en) * | 2019-08-06 | 2019-11-19 | 合肥泓泉档案信息科技有限公司 | A kind of file permission management system |
-
2019
- 2019-12-03 CN CN201911222719.9A patent/CN111193612A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103001803A (en) * | 2012-12-10 | 2013-03-27 | 上海斐讯数据通信技术有限公司 | Method and system for achieving right management in network management |
CN106301940A (en) * | 2016-08-25 | 2017-01-04 | 厦门易灵网络科技有限公司 | A kind of authority configuring method |
CN106570413A (en) * | 2016-10-19 | 2017-04-19 | 上海爱数信息技术股份有限公司 | System and method for controlling access permission of document system |
CN110474897A (en) * | 2019-08-06 | 2019-11-19 | 合肥泓泉档案信息科技有限公司 | A kind of file permission management system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111970135A (en) * | 2020-07-09 | 2020-11-20 | 北京航空航天大学 | Typhoon tracking and detecting instrument information sharing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11146454B2 (en) | Intent driven network policy platform | |
RU2598324C2 (en) | Means of controlling access to online service using conventional catalogue features | |
CA2861676C (en) | Presenting metadata from multiple perimeters | |
US20180373774A1 (en) | Cooperative naming for configuration items in a distributed configuration management database environment | |
US20200145291A1 (en) | Network agent for generating platform specific network policies | |
US20190273657A1 (en) | Multiuser device staging | |
AU2014208184A1 (en) | Systems and methodologies for managing document access permissions | |
US11082429B2 (en) | Providing access to content within a computing environment | |
EP3552096B1 (en) | Co-existence of management applications and multiple user device management | |
US10250446B2 (en) | Distributed policy store | |
US11509535B2 (en) | Network agent for reporting to a network policy system | |
WO2018143996A1 (en) | Limiting folder and link sharing | |
US10721236B1 (en) | Method, apparatus and computer program product for providing security via user clustering | |
WO2019218460A1 (en) | Service line processing method, device, terminal equipment and medium | |
CN111193612A (en) | Access authority configuration control method and system | |
KR102601628B1 (en) | Resource processing methods and systems, storage media, electronic devices | |
US10175968B2 (en) | Software catalog information management | |
CN117170784A (en) | Menu and page rendering method and device thereof and electronic equipment | |
CN114051029A (en) | Authorization method, authorization device, electronic equipment and storage medium | |
CN114424179A (en) | Applying rules to client updates to shared records to trigger system-generated updates | |
CN109492376B (en) | Device access authority control method and device and bastion machine | |
US20140337494A1 (en) | Transferring services in a networked environment | |
US10862747B2 (en) | Single user device staging | |
KR20100070763A (en) | Access control method and device of usn middleware | |
US11868494B1 (en) | Synchronization of access management tags between databases |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200522 |