CN111193612A - Access authority configuration control method and system - Google Patents

Access authority configuration control method and system Download PDF

Info

Publication number
CN111193612A
CN111193612A CN201911222719.9A CN201911222719A CN111193612A CN 111193612 A CN111193612 A CN 111193612A CN 201911222719 A CN201911222719 A CN 201911222719A CN 111193612 A CN111193612 A CN 111193612A
Authority
CN
China
Prior art keywords
user
authority configuration
configuration
authority
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911222719.9A
Other languages
Chinese (zh)
Inventor
陈本峰
冀托
朱二强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Clouddeep Internet Beijing Technology Co ltd
Original Assignee
Clouddeep Internet Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Clouddeep Internet Beijing Technology Co ltd filed Critical Clouddeep Internet Beijing Technology Co ltd
Priority to CN201911222719.9A priority Critical patent/CN111193612A/en
Publication of CN111193612A publication Critical patent/CN111193612A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)

Abstract

The embodiment of the invention provides an access right configuration control method and a system, wherein the system comprises the following steps: the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer; the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups; the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user; and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user, can perform grouped authority configuration management on the user, and sets the users with the same authority configuration into the same authority configuration group, so that the authority configuration can be distributed to the user when the user accesses the network application, the network access authority configuration for the user is controlled, and the authority configuration of enterprise personnel is effectively managed, conveniently and quickly.

Description

Access authority configuration control method and system
Technical Field
The embodiment of the invention relates to the technical field of network management, in particular to a method and a system for controlling access authority configuration.
Background
With the continuous development of network technology, more and more business processing systems exist in enterprises, and with the popularization of mobile office and cloud-on-enterprise, personnel in the enterprises generally need to access the business processing systems in the intranet through a browser of an external network to acquire resource data, while different enterprise personnel have different authority configurations, and for large-scale enterprises, the authority configuration management of the enterprise personnel is extremely complex.
Therefore, how to provide a technical scheme to effectively manage the authority configuration of the enterprise personnel is convenient and quick, and is a technical problem to be solved by technical personnel in the field.
Disclosure of Invention
Therefore, the embodiment of the invention provides an access authority configuration control method and system, which can effectively manage the authority configuration of the enterprise personnel, and is convenient and quick.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides an access right configuration control system, including:
the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer;
the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user;
and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user.
Preferably, the permission configuration includes: the access authority of the user to enterprise application, the operation authority of the user side, the plug-in configuration of the user side and the parameter configuration of the user side.
Preferably, the method further comprises the following steps:
the permission configuration group adding module is used for responding to a first input instruction of a user and adding a new permission configuration group;
and the permission configuration group changing module is used for responding to a second input instruction of the user and changing the name of the permission configuration group.
The permission configuration group deleting module is used for responding to a third input instruction of the user and deleting the permission configuration group;
and the authority configuration group query module is used for responding to a fourth input instruction of the user and querying the authority configuration group.
Preferably, the method further comprises the following steps: and the authority configuration group alarm module is used for sending out a popup alarm or a sound signal alarm when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group.
Preferably, the method further comprises the following steps:
the user adding module is used for responding to a fifth input instruction of the user and adding a new user;
and the user changing module is used for responding to a sixth input instruction of the user and changing the name of the user.
Preferably, the method further comprises the following steps:
the user deleting module is used for responding to a seventh input instruction of the user and deleting the user;
and the user query module is used for responding to an eighth input instruction of the user and querying the user.
Preferably, the method further comprises the following steps:
and the user multi-authority configuration reminding module is used for sending out reminding information aiming at the user when detecting that the same user exists in more than one authority configuration group.
In a second aspect, the present invention provides an access right configuration control method, which is applied to the access right configuration control system according to any of the above first aspects, and includes:
constructing N permission configuration groups; wherein N is a positive integer;
adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
adding authority configuration to the N authority configuration groups respectively according to the authority configuration of the user;
when the user accesses the network application, the authority configuration of the authority configuration group where the user is located is distributed to the user side so as to control the access authority configuration of the user.
Preferably, the method further comprises the following steps:
detecting whether the newly added authority configuration group is the same as the name of the current authority configuration group;
and when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group, sending out a popup alarm or a sound signal alarm.
Preferably, the method further comprises the following steps:
detecting whether the same user exists in more than one authority configuration group;
if yes, sending out the reminding information aiming at the user.
The embodiment of the invention provides an access right configuration control system, which comprises: the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer; the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups; the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user; and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user, can perform grouped authority configuration management on the user, and sets the users with the same authority configuration into the same authority configuration group, so that the authority configuration can be distributed to the user when the user accesses the network application, the network access authority configuration for the user is controlled, and the authority configuration of enterprise personnel is effectively managed, conveniently and quickly.
The access right configuration control method provided by the embodiment of the invention also has the beneficial effects, and is not described in detail herein.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
Fig. 1 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention;
FIG. 4 is a flowchart of a method for controlling access right configuration according to the present invention;
FIG. 5 is a flowchart illustrating a privilege configuration group detection method according to an embodiment of the present invention;
fig. 6 is a flowchart of user detection of an access right configuration control method according to the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 2, and fig. 3, fig. 1 is a schematic structural diagram of an access right configuration control system according to an embodiment of the present invention; fig. 2 is a schematic view of an extended component structure of an access right configuration control system according to an embodiment of the present invention; fig. 3 is a schematic view of another expanded structure of an access right configuration control system according to an embodiment of the present invention.
In a specific implementation manner of the present invention, an embodiment of the present invention provides an access right configuration control system 100, including:
an authority configuration group construction module 110, configured to construct N authority configuration groups; wherein N is a positive integer;
a user adding module 120, configured to add users with the same authority configuration to the same authority configuration group in the N authority configuration groups;
the authority configuration adding module 130 is configured to add authority configurations to the N authority configuration groups according to the authority configuration of the user;
and the authority configuration distribution module 140 is configured to distribute the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application, so as to control the access authority configuration of the user.
The embodiment of the invention can manage the grouped authority configuration of the users, and the users with the same authority configuration are set in the same authority configuration group, so that the authority configuration can be distributed to the users when the users access the network application, the network access authority configuration used for the control can be controlled, the authority configuration of the enterprise personnel can be effectively managed, and the method is convenient and fast.
Specifically, in an embodiment, the user side may be set as a browser client side, a user may log in by using a login module on the browser client side, and after the user logs in, besides configuring the network right of the user side, some functions are allocated according to a group: for example, browser operation rights such as whether copying is possible, printing is possible, address bar is displayed, and the like; whether a certain browser plug-in is automatically downloaded and installed during login; setting browser parameters such as a browser kernel, a trusted site, a home page address, whether popup is allowed or not and the like; that is, the right configuration may specifically include: the access authority of the user to enterprise application, the operation authority of the user side, the plug-in configuration of the user side and the parameter configuration of the user side.
Further, in order to add, change, delete, and query the right configuration group, it is also possible to set, in the access right configuration control system 100: an authority configuration group adding module 150, configured to add a new authority configuration group in response to a first input instruction of a user; a permission configuration group changing module 160 for changing a name of the permission configuration group in response to a second input instruction of the user; a permission configuration group deleting module 170, configured to delete the permission configuration group in response to a third input instruction of the user; and the authority configuration group query module 180 is configured to query the authority configuration group in response to a fourth input instruction of the user.
Of course, since the names of the inputted permission configuration groups may be the same when the permission configuration groups are added, a permission configuration group alarm module 190 may be further disposed in the access permission configuration control system 100, and configured to issue a pop-up window alarm or an audio signal alarm when the permission configuration groups added by the permission configuration group adding module are the same as the names of the current permission configuration groups.
Further, in order to facilitate addition, modification, deletion, and inquiry to the user, it is also possible to set in the access right configuration control system 100: a user adding module 111, configured to add a new user in response to a fifth input instruction of the user; a user changing module 112, configured to change the name of the user in response to a sixth input instruction of the user; a user deleting module 113, configured to delete the user in response to a seventh input instruction of the user; and the user query module 114 is used for responding to an eighth input instruction of the user and querying the user.
Of course, since the same user may exist in different privilege configuration groups and have multiple privilege configurations, it is also possible to set in the access privilege configuration control system 100: and the user multi-authority configuration reminding module 115 is used for sending out reminding information aiming at the user when detecting that the same user exists in more than one authority configuration group.
Referring to fig. 4, fig. 5 and fig. 6, fig. 4 is a flowchart illustrating an access right configuration control method according to the present invention; FIG. 5 is a flowchart illustrating a privilege configuration group detection method according to an embodiment of the present invention; fig. 6 is a flowchart of user detection of an access right configuration control method according to the present invention.
In another embodiment of the present invention, the present invention provides an access right configuration control method, which is applied to the access right configuration control system according to any of the above first aspects, and includes:
step S11: constructing N permission configuration groups; wherein N is a positive integer;
step S12: adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
step S13: adding authority configuration to the N authority configuration groups respectively according to the authority configuration of the user;
step S14: when the user accesses the network application, the authority configuration of the authority configuration group where the user is located is distributed to the user side so as to control the access authority configuration of the user.
Preferably, the method further comprises:
step S21: detecting whether the newly added authority configuration group is the same as the name of the current authority configuration group;
step S22: and when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group, sending out a popup alarm or a sound signal alarm.
Preferably, the method further comprises:
step S31: detecting whether the same user exists in more than one authority configuration group;
step S32: if yes, sending out the reminding information aiming at the user.
The access right configuration control method in the foregoing embodiment has already been described in the relevant embodiments in the access right configuration control system, and is not described herein again.
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, such modifications and improvements are intended to be within the scope of the invention as claimed.

Claims (10)

1. An access right configuration control system, comprising:
the authority configuration group building module is used for building N authority configuration groups; wherein N is a positive integer;
the user adding module is used for adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
the authority configuration adding module is used for respectively adding authority configuration to the N authority configuration groups according to the authority configuration of the user;
and the authority configuration distribution module is used for distributing the authority configuration of the authority configuration group where the user is located to the user side when the user accesses the network application so as to control the access authority configuration of the user.
2. The access authority configuration control system according to claim 1,
the permission configuration comprises the following steps: the access authority of the user to enterprise application, the operation authority of the user side, the plug-in configuration of the user side and the parameter configuration of the user side.
3. The access right configuration control system according to claim 1, further comprising:
the permission configuration group adding module is used for responding to a first input instruction of a user and adding a new permission configuration group;
the permission configuration group changing module is used for responding to a second input instruction of the user and changing the name of the permission configuration group;
the permission configuration group deleting module is used for responding to a third input instruction of the user and deleting the permission configuration group;
and the authority configuration group query module is used for responding to a fourth input instruction of the user and querying the authority configuration group.
4. The access right configuration control system according to claim 3, further comprising:
and the authority configuration group alarm module is used for sending out a popup alarm or a sound signal alarm when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group.
5. The access right configuration control system according to claim 1, further comprising:
the user adding module is used for responding to a fifth input instruction of the user and adding a new user;
and the user changing module is used for responding to a sixth input instruction of the user and changing the name of the user.
6. The access right configuration control system according to claim 5, further comprising:
the user deleting module is used for responding to a seventh input instruction of the user and deleting the user;
and the user query module is used for responding to an eighth input instruction of the user and querying the user.
7. The access right configuration control system according to any one of claims 1 to 6, characterized by further comprising:
and the user multi-authority configuration reminding module is used for sending out reminding information aiming at the user when detecting that the same user exists in more than one authority configuration group.
8. An access authority configuration control method applied to the access authority configuration control system according to any one of claims 1 to 7, characterized by comprising:
constructing N permission configuration groups; wherein N is a positive integer;
adding users with the same authority configuration into the same authority configuration group in the N authority configuration groups;
adding authority configuration to the N authority configuration groups respectively according to the authority configuration of the user;
when the user accesses the network application, the authority configuration of the authority configuration group where the user is located is distributed to the user side so as to control the access authority configuration of the user.
9. The access right configuration control method according to claim 8, further comprising:
detecting whether the newly added authority configuration group is the same as the name of the current authority configuration group;
and when the authority configuration group added by the authority configuration group adding module is the same as the name of the current authority configuration group, sending out a popup alarm or a sound signal alarm.
10. The access right configuration control method according to claim 8 or 9, characterized by further comprising:
detecting whether the same user exists in more than one authority configuration group;
if yes, sending out the reminding information aiming at the user.
CN201911222719.9A 2019-12-03 2019-12-03 Access authority configuration control method and system Pending CN111193612A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911222719.9A CN111193612A (en) 2019-12-03 2019-12-03 Access authority configuration control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911222719.9A CN111193612A (en) 2019-12-03 2019-12-03 Access authority configuration control method and system

Publications (1)

Publication Number Publication Date
CN111193612A true CN111193612A (en) 2020-05-22

Family

ID=70710874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911222719.9A Pending CN111193612A (en) 2019-12-03 2019-12-03 Access authority configuration control method and system

Country Status (1)

Country Link
CN (1) CN111193612A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970135A (en) * 2020-07-09 2020-11-20 北京航空航天大学 Typhoon tracking and detecting instrument information sharing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001803A (en) * 2012-12-10 2013-03-27 上海斐讯数据通信技术有限公司 Method and system for achieving right management in network management
CN106301940A (en) * 2016-08-25 2017-01-04 厦门易灵网络科技有限公司 A kind of authority configuring method
CN106570413A (en) * 2016-10-19 2017-04-19 上海爱数信息技术股份有限公司 System and method for controlling access permission of document system
CN110474897A (en) * 2019-08-06 2019-11-19 合肥泓泉档案信息科技有限公司 A kind of file permission management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001803A (en) * 2012-12-10 2013-03-27 上海斐讯数据通信技术有限公司 Method and system for achieving right management in network management
CN106301940A (en) * 2016-08-25 2017-01-04 厦门易灵网络科技有限公司 A kind of authority configuring method
CN106570413A (en) * 2016-10-19 2017-04-19 上海爱数信息技术股份有限公司 System and method for controlling access permission of document system
CN110474897A (en) * 2019-08-06 2019-11-19 合肥泓泉档案信息科技有限公司 A kind of file permission management system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970135A (en) * 2020-07-09 2020-11-20 北京航空航天大学 Typhoon tracking and detecting instrument information sharing method

Similar Documents

Publication Publication Date Title
US11146454B2 (en) Intent driven network policy platform
RU2598324C2 (en) Means of controlling access to online service using conventional catalogue features
CA2861676C (en) Presenting metadata from multiple perimeters
US20180373774A1 (en) Cooperative naming for configuration items in a distributed configuration management database environment
US20200145291A1 (en) Network agent for generating platform specific network policies
US20190273657A1 (en) Multiuser device staging
AU2014208184A1 (en) Systems and methodologies for managing document access permissions
US11082429B2 (en) Providing access to content within a computing environment
EP3552096B1 (en) Co-existence of management applications and multiple user device management
US10250446B2 (en) Distributed policy store
US11509535B2 (en) Network agent for reporting to a network policy system
WO2018143996A1 (en) Limiting folder and link sharing
US10721236B1 (en) Method, apparatus and computer program product for providing security via user clustering
WO2019218460A1 (en) Service line processing method, device, terminal equipment and medium
CN111193612A (en) Access authority configuration control method and system
KR102601628B1 (en) Resource processing methods and systems, storage media, electronic devices
US10175968B2 (en) Software catalog information management
CN117170784A (en) Menu and page rendering method and device thereof and electronic equipment
CN114051029A (en) Authorization method, authorization device, electronic equipment and storage medium
CN114424179A (en) Applying rules to client updates to shared records to trigger system-generated updates
CN109492376B (en) Device access authority control method and device and bastion machine
US20140337494A1 (en) Transferring services in a networked environment
US10862747B2 (en) Single user device staging
KR20100070763A (en) Access control method and device of usn middleware
US11868494B1 (en) Synchronization of access management tags between databases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200522