CN114218537A - Management method, device, equipment and readable medium for distributed storage users - Google Patents

Management method, device, equipment and readable medium for distributed storage users Download PDF

Info

Publication number
CN114218537A
CN114218537A CN202111343931.8A CN202111343931A CN114218537A CN 114218537 A CN114218537 A CN 114218537A CN 202111343931 A CN202111343931 A CN 202111343931A CN 114218537 A CN114218537 A CN 114218537A
Authority
CN
China
Prior art keywords
user
information
authorized
authorized user
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111343931.8A
Other languages
Chinese (zh)
Inventor
安祥文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202111343931.8A priority Critical patent/CN114218537A/en
Publication of CN114218537A publication Critical patent/CN114218537A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a management method of distributed storage users, which comprises the following steps: creating authorized user information on a storage terminal based on registration information of authorized users, configuring an access authority directory for the users, and associating the access authority directory with the corresponding authorized user information; in response to receiving user information input by a user through a client applet, querying the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients; if the user is an authorized user and the user does not log in other clients, acquiring a corresponding access authority directory, and mounting the authorized user information and the corresponding access authority directory to a cluster through a service IP of the distributed cluster; and accessing the access authority directory through a local drive letter based on the cifs protocol. The invention also discloses a management device, computer equipment and a readable storage medium of the distributed storage users.

Description

Management method, device, equipment and readable medium for distributed storage users
Technical Field
The present invention relates to the field of distributed storage technologies, and in particular, to a method, an apparatus, a device, and a readable medium for managing distributed storage users.
Background
More and more scenes are now using distributed storage to meet the demand for mass storage, such as video health, medical education, communication industry, financial industry, etc. Especially in the broadcast and television asset industry, customers not only need large storage capacity to meet the storage requirements of film editing and the like, but also need to manage the authority and the use space of a plurality of users (such as external collectors).
In the prior art, a user is manually connected to a distributed storage cluster through a PC to obtain an available space of an authority when the user uses the distributed storage cluster, then the storage space corresponding to the user is found through manual selection, and the authority of the user is set through the distributed storage cluster, such as a quota.
The prior art is low in efficiency and cannot meet higher requirements of customers. Therefore, in a media asset scene, the NAS directory can be automatically mounted by inputting a user name and a password, the mounted directory is automatically unloaded when the NAS directory exits, the operation of a user is facilitated, the privacy of the user is protected, the purpose that a person walks and links are disconnected is achieved, and an administrator can monitor and supervise the login time, the login duration, the maximum login number and the like of all users so as to ensure the safety of access data.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method, an apparatus, a device, and a readable medium for managing distributed storage users, where a client performs user identity authentication through a small program, mounts directory resources corresponding to users in a distributed storage cluster, and reports login information of the users to a distributed storage server for resource control, so as to implement effective management of the users and protect data security.
Based on the above object, an aspect of the embodiments of the present invention provides a method for managing distributed storage users, including the following steps: establishing authorized user information at a storage terminal based on registration information of authorized users, configuring an access authority directory for the users, and associating the access authority directory with the corresponding authorized user information; in response to receiving user information input by a user through a client applet, querying the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients; if the user is an authorized user and the user does not log in other clients, acquiring a corresponding access authority directory, and hanging the authorized user information and the corresponding access authority directory to a cluster through a service IP of a distributed cluster; and accessing the access authority directory through a local drive letter based on the cifs protocol.
In some embodiments, in response to receiving user information input by a user via a client applet, querying the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients includes: in response to receiving user information input by a user through a client applet, inquiring whether the user has a corresponding disc character mapping relation in a local database; and if the user has the corresponding drive letter mapping relation, inquiring the authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
In some embodiments, the method further comprises: if the user does not have the corresponding disc character mapping relation, sending a disc character mapping relation selection instruction to the user; and responding to the disc character mapping relation selected by the user, recording the disc character mapping relation into the local database, and inquiring the authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
In some embodiments, the method further comprises: recording user login information and storing the user login information into a user login information database; the login information comprises login time and login duration.
In some embodiments, the method further comprises: and in response to receiving the login time and/or login duration of the query target user, acquiring the user login information of the target user from the user login information database.
In some embodiments, creating the authorized user information at the storage based on the registration information of the authorized user comprises: and acquiring a user name and a password of the authorized user based on the registration information of the authorized user, and creating authorized user information based on the user name and the password.
In some embodiments, the method further comprises: and if the user is not an authorized user or the user logs in at other clients, forbidding the access authority of the user and sending an alarm.
In another aspect of the embodiments of the present invention, a management apparatus for distributed storage users is further provided, including: the first module is configured to create authorized user information at a storage terminal based on registration information of an authorized user, configure an access authority directory for the user, and associate the access authority directory with the corresponding authorized user information; a second module configured to, in response to receiving user information input by a user through a client applet, query the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at another client; the third module is configured to acquire a corresponding access authority directory and mount the authorized user information and the corresponding access authority directory to a cluster through a service IP of a distributed cluster if the user is an authorized user and the user is not logged in at other clients; and the fourth module is configured to access the access right directory through the local drive letter based on the cifs protocol.
In another aspect of the embodiments of the present invention, there is also provided a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing steps of the method comprising: creating authorized user information on a storage terminal based on registration information of authorized users, configuring an access right directory for the users, and associating the access right directory with the corresponding authorized user information; in response to receiving user information input by a user through a client applet, querying the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients; if the user is an authorized user and the user does not log in other clients, acquiring a corresponding access authority directory, and mounting the authorized user information and the corresponding access authority directory to a cluster through a service IP of the distributed cluster; and accessing the access authority directory through a local drive letter based on the cifs protocol.
In some embodiments, in response to receiving user information input by a user via a client applet, querying the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients includes: in response to receiving user information input by a user through a client applet, inquiring whether the user has a corresponding disc character mapping relation in a local database; and if the user has the corresponding drive letter mapping relation, inquiring the authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
In some embodiments, the method further comprises: if the user does not have the corresponding disc character mapping relation, sending a disc character mapping relation selection instruction to the user; and responding to the disc character mapping relation selected by the user, recording the disc character mapping relation into the local database, and inquiring the authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
In some embodiments, the method further comprises: recording user login information and storing the user login information into a user login information database; the login information comprises login time and login duration.
In some embodiments, the method further comprises: and in response to receiving the login time and/or login duration of the query target user, acquiring the user login information of the target user from the user login information database.
In some embodiments, creating the authorized user information at the storage based on the registration information of the authorized user comprises: and acquiring a user name and a password of the authorized user based on the registration information of the authorized user, and creating authorized user information based on the user name and the password.
In some embodiments, the method further comprises: and if the user is not an authorized user or the user logs in at other clients, forbidding the access authority of the user and sending an alarm.
In a further aspect of the embodiments of the present invention, a computer-readable storage medium is also provided, in which a computer program for implementing the above method steps is stored when the computer program is executed by a processor.
The invention has at least the following beneficial technical effects: and performing user identity authentication on the client through the applet, mounting the user identity authentication on directory resources corresponding to the users in the distributed storage cluster, and reporting the login information of the users to the distributed storage server for resource control, so that the users are effectively managed, and the data security is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram illustrating an embodiment of a method for managing distributed storage users according to the present invention;
FIG. 2 is a diagram of an embodiment of a management apparatus for distributed storage users according to the present invention;
FIG. 3 is a schematic diagram of an embodiment of a computer device provided by the present invention;
FIG. 4 is a schematic diagram of an embodiment of a computer-readable storage medium provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any way in the following embodiments.
In view of the above, a first aspect of the embodiments of the present invention provides an embodiment of a management method for distributed storage users. Fig. 1 is a schematic diagram illustrating an embodiment of a management method for distributed storage users according to the present invention. As shown in fig. 1, the management method for distributed storage users according to the embodiment of the present invention includes the following steps:
001. creating authorized user information on a storage terminal based on the registration information of the authorized user, configuring an access authority directory for the user, and associating the access authority directory with the corresponding authorized user information;
002. in response to receiving user information input by a user through a client applet, querying authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients;
003. if the user is an authorized user and the user does not log in other clients, acquiring a corresponding access authority directory, and mounting the information of the authorized user and the corresponding access authority directory to the cluster through a service IP of the distributed cluster;
004. and accessing the access authority directory through the local drive based on the cifs protocol.
In this embodiment, the client applet can automatically mount directory resources corresponding to the users in the distributed storage cluster according to the requirements set by the users by inputting the user name and the password, and simultaneously report login information of the users to the distributed storage server to perform resource management and control, so that the users are effectively managed, and data security is guaranteed. Firstly, a user name, a password and a directory resource which can be accessed by a user are created at a storage cluster end. Secondly, installing a client-side applet in the workstation, enabling a user to automatically call a mount command to automatically mount the local drive to a directory corresponding to the storage-end user through a cifs protocol by inputting a user name, a password and a set local drive, wherein the local disk is a mapping of the directory corresponding to the storage-end user. Finally, after the user logs in, the login information can be reported to the storage end, so that the storage end can perform statistical management on the login duration, the login IP and the like of the user. The storage terminal can also set that the user is not allowed to log in at different clients at the same time, and the like to control the user.
In some embodiments of the invention, in response to receiving user information input by a user via a client applet, querying authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients comprises: in response to receiving user information input by a user through a client applet, inquiring whether the user has a corresponding disc character mapping relation in a local database; if the user has the corresponding disc character mapping relation, the authorized user information is inquired based on the user information to judge whether the user is an authorized user or not and whether the user is registered at other clients or not.
In some embodiments of the invention, the method further comprises: if the user does not have the corresponding drive letter mapping relation, sending a drive letter mapping relation selection instruction to the user; and responding to the disc character mapping relation selected by the user, recording the disc character mapping relation into a local database, and inquiring authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
In some embodiments of the invention, the method further comprises: recording user login information and storing the user login information into a user login information database; the login information comprises login time and login duration.
In some embodiments of the invention, the method further comprises: and acquiring the user login information of the target user from the user login information database in response to the fact that the login time and/or the login duration of the target user are/is inquired.
In some embodiments of the present invention, creating the authorized user information at the storage end based on the registration information of the authorized user comprises: a user name and a password of the authorized user are obtained based on the registration information of the authorized user, and the authorized user information is created based on the user name and the password.
In some embodiments of the invention, the method further comprises: and if the user is not the authorized user or the user logs in at other clients, forbidding the access right of the user and sending an alarm.
It should be particularly noted that, the steps in the embodiments of the management method for distributed storage users described above may be intersected, replaced, added, or deleted, and therefore, the management method for distributed storage users based on these reasonable permutation and combination transformations shall also belong to the scope of the present invention, and shall not limit the scope of the present invention to the embodiments.
The following further illustrates embodiments of the invention in terms of specific examples. The method mainly comprises the following steps:
(1) the distributed cluster storage creates a user1 and password1 and specifies a directory dir1 accessible to the user.
(2) And setting that the user is not allowed to log in at different clients at the same time.
(3) The client correctly installs the applet.
(4) After the user inputs a user name and a password in the client applet, the user firstly inquires whether a mapping relation between the user name user1 and the drive letter disk1 exists in a local database.
(5) If so, the client applet automatically fills the parameters: the user1, the password1, the dir1 and the disk1 are mounted to the cluster through the service IP of the distributed cluster, and can access the directory dir1 of the distributed storage cluster through the local disk sign disk1 through the cifs protocol, meanwhile, the storage cluster end marks whether the user logs in or not when receiving the request, and records the login time, the login duration and the like to the storage database for the administrator to check.
(6) If not, the client applet pops up a window to remind the user to input the disc identifier disk1, and after the user data the disc identifier, the program writes the mapping relationship between the user name and the disc identifier into a local database and executes the step (5).
(7) And (5) when the cluster is mounted in the step (5), judging whether the user logs in, and if so, limiting the user to log in again.
In view of the above object, a second aspect of the embodiments of the present invention provides a management apparatus for distributed storage users. Fig. 2 is a schematic diagram illustrating an embodiment of a management apparatus for distributed storage users according to the present invention. As shown in fig. 2, the management apparatus for distributed storage users according to the embodiment of the present invention includes the following modules: the first module 011 is configured to create authorized user information at a storage terminal based on registration information of authorized users, configure an access authority directory for the users, and associate the access authority directory with the corresponding authorized user information; a second module 012 configured to, in response to receiving user information input by a user through the client applet, query authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at another client; a third module 013, configured to, if the user is an authorized user and the user is not logged in at another client, obtain a corresponding access right directory, and mount the authorized user information and the corresponding access right directory to the cluster through the service IP of the distributed cluster; a fourth module 014 configured for accessing the access right directory through the local disk based on the cifs protocol.
In view of the above object, a third aspect of the embodiments of the present invention provides a computer device. Fig. 3 is a schematic diagram of an embodiment of a computer device provided by the present invention. As shown in fig. 3, the computer apparatus of the embodiment of the present invention includes the following means: at least one processor 021; and a memory 022, the memory 022 storing computer instructions 023 executable on the processor, the instructions when executed by the processor implementing steps of the method comprising: creating authorized user information on a storage terminal based on the registration information of the authorized user, configuring an access authority directory for the user, and associating the access authority directory with the corresponding authorized user information; in response to receiving user information input by a user through a client applet, inquiring authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients; if the user is an authorized user and the user is not registered in other clients, acquiring a corresponding access authority directory, and mounting the information of the authorized user and the corresponding access authority directory to the cluster through the service IP of the distributed cluster; and accessing the access authority directory through the local drive based on the cifs protocol.
In some embodiments of the invention, in response to receiving user information input by a user via a client applet, querying authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients comprises: in response to receiving user information input by a user through a client applet, inquiring whether the user has a corresponding disc character mapping relation in a local database; if the user has the corresponding disc character mapping relation, the authorized user information is inquired based on the user information to judge whether the user is an authorized user or not and whether the user is registered at other clients or not.
In some embodiments of the invention, the method further comprises: if the user does not have the corresponding drive letter mapping relation, sending a drive letter mapping relation selection instruction to the user; and responding to the disc character mapping relation selected by the user, recording the disc character mapping relation into a local database, and inquiring authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
In some embodiments of the invention, the method further comprises: recording user login information and storing the user login information into a user login information database; the login information comprises login time and login duration.
In some embodiments of the invention, the method further comprises: and acquiring the user login information of the target user from the user login information database in response to the fact that the login time and/or the login duration of the target user are/is inquired.
In some embodiments of the present invention, creating the authorized user information at the storage end based on the registration information of the authorized user comprises: a user name and a password of the authorized user are obtained based on the registration information of the authorized user, and the authorized user information is created based on the user name and the password.
In some embodiments of the invention, the method further comprises: and if the user is not the authorized user or the user logs in at other clients, forbidding the access right of the user and sending an alarm.
The invention also provides a computer readable storage medium. FIG. 4 is a schematic diagram illustrating an embodiment of a computer-readable storage medium provided by the present invention. As shown in fig. 4, the computer readable storage medium 031 stores a computer program 032 which, when executed by a processor, performs the method as described above.
Finally, it should be noted that, as one of ordinary skill in the art can appreciate that all or part of the processes in the methods of the above embodiments can be implemented by a computer program to instruct related hardware, and the program for the management method of the distributed storage user can be stored in a computer readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above. The storage medium of the program may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the methods disclosed according to embodiments of the present invention may also be implemented as a computer program executed by a processor, which may be stored in a computer-readable storage medium. Which when executed by a processor performs the above-described functions defined in the methods disclosed in embodiments of the invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium storing a computer program for causing the controller to implement the functions of the above steps or elements.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code means in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. As used herein, magnetic and optical disks include Compact Disks (CDs), laser disks, optical disks, Digital Versatile Disks (DVDs), floppy disks, blu-ray disks where disks usually reproduce data magnetically, while optical disks reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the advantages or disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A management method for distributed storage users is characterized by comprising the following steps:
creating authorized user information on a storage terminal based on registration information of authorized users, configuring an access authority directory for the users, and associating the access authority directory with the corresponding authorized user information;
in response to receiving user information input by a user through a client applet, querying the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at other clients;
if the user is an authorized user and the user does not log in other clients, acquiring a corresponding access authority directory, and mounting the authorized user information and the corresponding access authority directory to a cluster through a service IP of the distributed cluster;
and accessing the access authority directory through a local drive letter based on the cifs protocol.
2. The method of claim 1, wherein in response to receiving user information input by a user through a client applet, querying the authorized user information based on the user information to determine whether the user is an authorized user and whether the user is already logged in at other clients comprises:
in response to receiving user information input by a user through a client applet, inquiring whether the user has a corresponding drive mapping relation in a local database;
and if the user has the corresponding drive letter mapping relation, inquiring the authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
3. The method for managing distributed storage users according to claim 2, further comprising:
if the user does not have the corresponding drive letter mapping relation, sending a drive letter mapping relation selection instruction to the user;
and responding to the disc character mapping relation selected by the user, recording the disc character mapping relation into the local database, and inquiring the authorized user information based on the user information to judge whether the user is an authorized user and whether the user logs in at other clients.
4. The method for managing distributed storage users according to claim 1, further comprising:
recording user login information and storing the user login information into a user login information database;
the login information comprises login time and login duration.
5. The method for managing users of distributed storage according to claim 4, further comprising:
and in response to receiving the login time and/or login duration of the query target user, acquiring the user login information of the target user from the user login information database.
6. The method for managing distributed storage users according to claim 1, wherein creating authorized user information at the storage end based on the registration information of the authorized user comprises:
and acquiring a user name and a password of the authorized user based on the registration information of the authorized user, and creating authorized user information based on the user name and the password.
7. The method for managing distributed storage users according to claim 1, further comprising:
and if the user is not an authorized user or the user logs in at other clients, forbidding the access authority of the user and sending an alarm.
8. A management apparatus for distributed storage users, comprising:
the first module is configured to create authorized user information at a storage terminal based on registration information of an authorized user, configure an access authority directory for the user, and associate the access authority directory with the corresponding authorized user information;
a second module configured to, in response to receiving user information input by a user through a client applet, query the authorized user information based on the user information to determine whether the user is an authorized user and whether the user has logged in at another client;
the third module is configured to acquire a corresponding access authority directory and mount the authorized user information and the corresponding access authority directory to a cluster through a service IP of a distributed cluster if the user is an authorized user and the user is not logged in at other clients;
and the fourth module is configured to access the access right directory through the local drive letter based on the cifs protocol.
9. A computer device, comprising:
at least one processor; and
a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing the steps of the method of any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202111343931.8A 2021-11-14 2021-11-14 Management method, device, equipment and readable medium for distributed storage users Withdrawn CN114218537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111343931.8A CN114218537A (en) 2021-11-14 2021-11-14 Management method, device, equipment and readable medium for distributed storage users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111343931.8A CN114218537A (en) 2021-11-14 2021-11-14 Management method, device, equipment and readable medium for distributed storage users

Publications (1)

Publication Number Publication Date
CN114218537A true CN114218537A (en) 2022-03-22

Family

ID=80697093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111343931.8A Withdrawn CN114218537A (en) 2021-11-14 2021-11-14 Management method, device, equipment and readable medium for distributed storage users

Country Status (1)

Country Link
CN (1) CN114218537A (en)

Similar Documents

Publication Publication Date Title
KR100620054B1 (en) System and method of managing device for device managing technology
US20230403169A1 (en) Devices and methods for analytics exposure to application functions in 5g networks
CN111861140A (en) Service processing method, device, storage medium and electronic device
CN111935110B (en) Method and device for controlling permission of tenant to access container instance
EP3249527B1 (en) Operation method and device for vnf package
US7895308B2 (en) Messaging system configurator
CN107786551B (en) Method for accessing intranet server and device for controlling access to intranet server
CN108289074B (en) User account login method and device
US20220188431A1 (en) Api access to security-sensitive computing system
CN109039764B (en) Network parameter configuration method of distributed storage system
US11909789B1 (en) Conference management
US7379737B2 (en) Telecommunications subscriber profile management system
US20080133726A1 (en) Network administration with guest access
CN111224932B (en) User management method and device of server out-of-band management system
CN106231393B (en) Video information processing method, device and system
CN114218537A (en) Management method, device, equipment and readable medium for distributed storage users
US20220318416A1 (en) Identity query language systems and methods
CN113777942B (en) Control method and control device for intelligent equipment and electronic equipment
CN108768965A (en) A kind of education cloud open service application integrating system and method
CN109286600A (en) Access control method and device in a kind of video monitoring system
CN112116318A (en) Method, device and storage medium for tracking project progress
US20140173073A1 (en) Proactive M2M Framework Using Device-Level vCard for Inventory, Identity, and Network Management
US9077612B2 (en) Method for managing configuration information of an outsourced part, and method and system for managing an alarm of an outsourced part
US8611510B2 (en) System and method for guest voicemail box
CN116455722A (en) Quota management method, device, equipment and medium based on application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20220322