WO2011144071A2 - 域用户权限的处理方法、设备和*** - Google Patents

域用户权限的处理方法、设备和*** Download PDF

Info

Publication number
WO2011144071A2
WO2011144071A2 PCT/CN2011/074582 CN2011074582W WO2011144071A2 WO 2011144071 A2 WO2011144071 A2 WO 2011144071A2 CN 2011074582 W CN2011074582 W CN 2011074582W WO 2011144071 A2 WO2011144071 A2 WO 2011144071A2
Authority
WO
WIPO (PCT)
Prior art keywords
domain user
identifier
command
network element
element device
Prior art date
Application number
PCT/CN2011/074582
Other languages
English (en)
French (fr)
Other versions
WO2011144071A3 (zh
Inventor
蒋立新
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201180000760.7A priority Critical patent/CN102273135B/zh
Priority to PCT/CN2011/074582 priority patent/WO2011144071A2/zh
Publication of WO2011144071A2 publication Critical patent/WO2011144071A2/zh
Publication of WO2011144071A3 publication Critical patent/WO2011144071A3/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • the embodiments of the present invention relate to communication technologies, and in particular, to a method, a device, and a system for processing domain user rights. Background technique
  • the network management device can be used as an administrative domain.
  • the domain users in the management domain can manage all the network element devices in the management domain.
  • the domain users are managed by the network management device. Users with access to all NE devices in the management domain can be accessed under the permission of the device.
  • the rights information of the domain user accessing the network element device may be stored in the network management device, and the permission information is transmitted to the network element device when necessary.
  • the domain user can access the network element device in the management domain in two ways: The domain user accesses the network management device to access the network element device.
  • the network management device authenticates the user in the domain and accesses the NE device after the authentication is passed. The device does not authenticate the user. The other user can log in to the NE device and directly access the device.
  • the network element device in this mode, the domain user logs in to the network element device, and the network element device needs to transmit the related information of the domain user to the gateway system for authentication. After the authentication is passed, the network management device uses the domain user at the current The rights information on the network element device is transmitted to the network element device, so that the network element device receives the user login of the domain, or the user can access the network element.
  • the network management device saves the rights information of the domain user, the set of commands that the domain user can execute on each network element device is saved.
  • the network management device needs to transfer the rights information of the current network element device, that is, the set of all commands that can be executed on the network element device, to the network element device.
  • the command set exceeds a certain size, the permission information sent by the network management device to the network element device exceeds that required by the communication protocol between the network management device and the network element device. Small, the communication processing between the network management device and the network element device is complicated and difficult to process, thereby seriously affecting the processing efficiency of domain user rights. Summary of the invention
  • the embodiment of the invention provides a method, a device and a system for processing domain user rights, which are used to effectively improve the processing efficiency of domain user rights.
  • the embodiment of the invention provides a method for processing domain user rights, including:
  • An embodiment of the present invention provides a processing device for domain user rights, including:
  • a login processing device configured to accept domain user login and obtain domain user information
  • a receiving device configured to receive an executed command
  • An obtaining device configured to acquire a command group to which the executed command belongs
  • the determining processing means is configured to determine whether the command group to which the executed command belongs belongs to one or more command groups associated with the domain user information, and perform corresponding processing according to the determination result.
  • the embodiment of the invention provides a system for processing domain user rights, which includes a network element device and a network management device, wherein the network management device is a processing device for the domain user rights described above.
  • the embodiment of the present invention further provides a processing system for domain user rights, which includes a network element device and a network management device, wherein the network element device is a processing device for the domain user rights described above.
  • the method, device, and system for processing domain user rights receive the command of the domain by accepting the domain user login and acquiring the domain user information, and acquiring the command group to which the executed command belongs, and determining the command to which the executed command belongs. Whether the command group belongs to one or more command groups associated with the domain user information, and then performs corresponding processing according to the judgment result, thereby effectively improving the processing efficiency of the domain user rights.
  • FIG. 1 is a flow chart of an embodiment of a method for processing domain user rights according to the present invention
  • FIG. 2 is a flow chart of another embodiment of a method for processing domain user rights according to the present invention.
  • FIG. 3 is a flow chart of still another embodiment of a method for processing domain user rights according to the present invention.
  • FIG. 4 is a schematic structural diagram of an embodiment of a processing device for a domain user right according to the present invention
  • FIG. 5 is a schematic structural diagram of another embodiment of a processing device for a domain user right according to the present invention
  • FIG. 7 is a schematic structural diagram of an embodiment of a processing system for domain user rights according to the present invention.
  • the network element device pre-classifies the commands defined in the network element device according to functions, thereby defining a plurality of default command groups, and each default command group includes one type of command.
  • the commands in the NE device have the alarm function command, the query function command, the maintenance function command, and the configuration function command.
  • the network element device can classify the commands according to the function and define four default commands. Groups, which are the default command group for indicating the alarm function, the default command group for indicating the query function, the default command group for indicating the maintenance function, and the default command for indicating the configuration function.
  • the command group then sets the alarm function command, the query function command, the maintenance function command, and the configuration function command to the default command group indicating the alarm function, the default command group indicating the query function, and the default command indicating the maintenance function.
  • Group and default command groups that represent configuration features.
  • FIG. 1 is a flowchart of an embodiment of a method for processing domain user rights according to the present invention. As shown in FIG. 1, the method in this embodiment includes:
  • Step 101 Accept the domain user to log in and obtain the domain user information.
  • Step 102 Receive an executed command, and obtain a command group to which the executed command belongs.
  • Step 103 Determine whether the command group to which the executed command belongs belongs to one or more command groups associated with the domain user information, and perform corresponding processing according to the judgment result.
  • the domain user information is obtained by accepting the domain user login
  • the command group to which the executed command belongs is obtained by receiving the command executed by the domain user, thereby determining whether the command group to which the executed command belongs belongs to the domain.
  • FIG. 2 is a flowchart of another embodiment of a method for processing domain user rights according to the present invention.
  • a domain user accesses a network element device through a network management device as an example, and the technical solution of the embodiment is described in detail.
  • the method in this embodiment includes:
  • Step 201 The network management device acquires a default command group defined by the network element device and an identifier of the network element device.
  • the network management device can obtain the default command group defined by the network element device in a dynamic mode or a static configuration mode.
  • Step 202 The network management device receives a custom command group creation request input by the system administrator, where the customized command group creation request includes an identifier of the first designated network element device, an identifier of the custom command group, and an identifier of the specified command.
  • Step 203 The network management device creates a custom command group corresponding to the identifier of the customized command group, and stores the command corresponding to the identifier of the specified command to the custom command from the default command group corresponding to the specified NE device identifier.
  • the group's identity corresponds to the custom command group.
  • Step 204 The network management device sends the customized command group to the identifier of the first designated network element device. Network element device.
  • the network management device can also create a customized command group according to the actual needs of the user.
  • the specific implementation manner of the network management device can be:
  • the custom command group creation request is entered.
  • the custom command group creation request includes the identifier of the specified NE device, the identifier of the custom command group, and the identifier of the specified command, and the custom command corresponding to the identifier of the custom command group is created.
  • the command corresponding to the identifier of the specified command is stored in the custom command group corresponding to the identifier of the custom command group in the default command group of the network element device corresponding to the identifier of the specified network element device.
  • the custom command group is sent to the network element device corresponding to the identifier of the second designated network element device.
  • the NE device receives and saves the custom command group.
  • the command corresponding to the identifier of the specified command is stored in the default command group and also in the custom command group.
  • Step 205 The network management device receives a create domain user permission request input by the system administrator, where the create domain user permission request may include domain user information (eg, an account), an identifier of one or more specified command groups, and a second designated network. The identity of the metadevice.
  • domain user information eg, an account
  • identifier of one or more specified command groups e.g., an identifier of one or more specified command groups
  • the network management device obtains the identifier of one or more specified command groups from the default command group and/or the custom command group corresponding to the identifier of the second designated network element device according to the received domain user request. Corresponding one or more command groups.
  • Step 207 The network management device associates the domain user information, the identifier of the second designated network element device, and the identifier of the one or more command groups corresponding to the identifier of the second designated network element device.
  • the network management device can set the privilege information for each domain user by using the network administrator.
  • the privilege information can refer to the identifier of the network element device associated with the domain user information and the network element corresponding to the identifier of the network element device.
  • the specific implementation manner of the one or more command groups in the device may be: According to the create domain user request input by the system administrator, the create domain user permission request includes domain user information, a specified command group identifier, and a second designation.
  • the identifier of the network element device, where the user information of the domain may be an account, and the domain user information is respectively associated with the command group corresponding to the identifier of the second specified network element device and the identifier of the specified command in the request. .
  • the identifier of the specified command group in the request may be one or more, and the command group may be a default command group or a custom command group. More specifically, the command included in the one or more command groups is the command group.
  • Step 208 The network management device accepts the domain user to log in and obtain the domain user information.
  • Step 209 The network management device receives the executed command, and obtains the command group to which the executed command belongs.
  • the network management device may first receive the domain user information input by the domain user, and authenticate the user information of the domain. After the authentication is passed, after receiving the domain user login, the network user may receive the execution of the domain user input. Command, and according to the executed command, get the command group to which it belongs.
  • the number of command groups to which the network management device obtains the executed command may be one or more.
  • the command group can be a custom command group or a default command group.
  • Step 210 The network management device determines whether the command group to which the executed command belongs belongs to one or more command groups associated with the domain user information. If yes, step 211 is performed; if not, step 212 is performed.
  • Step 211 After the network management device passes the authentication, the network device sends the executed command to the network element device corresponding to the network element device identifier. After receiving the execution command, the network element device performs corresponding processing and returns an execution result.
  • the network management device After the network management device authenticates the executed command input by the domain user, the network management device sends the executed command to the network element device, and the network element device receives the executed command and does not perform the re-execution.
  • the authentication is performed directly, and the result of the execution is returned to the network management device.
  • Step 212 The network management device generates a result that the authentication fails, and notifies the domain user corresponding to the domain user information of the result of the authentication failure.
  • the network management device accepts the domain user to log in and obtains the domain user information, and receives the executed command, and then obtains the command group to which the executed command belongs, and determines whether the command group belongs to the domain user information.
  • One or more command groups if they belong, the network management device sends the executed command to the network element device, so that the network element device no longer authenticates the domain user, and performs corresponding processing according to the executed command; If it does not belong, the result of the authentication disagreement is sent to the domain user, thereby effectively Improve the processing efficiency of domain user permissions.
  • FIG. 3 is a flowchart of still another embodiment of a method for processing domain user rights according to the present invention.
  • a domain user directly accesses a network element device as an example, and the network management device can perform the embodiment of the method shown in FIG. Steps 201 to 207 describe the technical solution of the embodiment in detail.
  • the method in this embodiment includes:
  • Step 301 The network element device receives a custom command group sent by the network management device.
  • Step 302 The network element device receives a domain user login request, and the domain user login request includes domain user information (for example, an account number).
  • domain user information for example, an account number
  • the domain user login request may further include a password.
  • Step 303 The network element device carries the identifier of the network element device in the domain user login request and sends the identifier to the network management device.
  • the network management device authenticates the domain user information in the domain user login request, that is, whether the user information of the domain and the identifier of the network element device are acquired. If the authentication is passed, that is, the domain user can log in, the network element device corresponding to the identifier of the network element device is sent with the notification message that the authentication is passed, so that the network element device is configured according to the network element device.
  • the notification message accepts domain user login.
  • the network management device obtains the identifier of one or more command groups associated with the domain user information and the identifier of the network element device, and sends the identifier to the network element device. If the authentication fails, the notification message that the authentication fails is sent to the network element device corresponding to the identifier of the network element device, so that the network element device rejects the domain user login.
  • Step 304 The network element device receives the notification message that is sent by the network management device and carries the authentication, and according to the notification message, accepts the domain user to log in.
  • Step 305 The network element device receives an identifier of one or more command groups sent by the network management device.
  • Step 306 The network element device receives the executed command, and acquires a command group to which the executed command belongs.
  • Step 307 The network element device determines whether the command group to which the executed command belongs belongs to one or more command groups corresponding to one or more command group identifiers obtained in step 305; if yes, step 308 is performed; if not, Go to step 309.
  • Step 308 The network element device generates a result of the authentication pass, and performs corresponding processing according to the result of the authentication pass and the executed command.
  • Step 309 The network management device generates a result that the authentication fails, and notifies the domain user of the result that the authentication fails.
  • the network element device receives the domain user login request, and the identifier of the network element device is carried in the domain user login request and sent to the network management device, and the network management device searches for the domain according to the domain user login request.
  • the user information is authenticated. If the authentication is passed, the network element device receives the notification message that is sent by the network management device and carries the authentication, and according to the notification message, accepts the domain user to log in, and receives the user sent by the network management device and the domain user.
  • the information is associated with the identifier of the one or more command groups associated with the identifier of the network element device, and then receives the executed command, obtains the command group to which the executed command belongs, and determines whether the command group to which the executed command belongs belongs to the domain user.
  • the one or more command groups corresponding to the identifiers of the one or more command groups associated with the information, and performing corresponding processing according to the judgment result, thereby effectively improving the processing efficiency of the domain user rights.
  • the size of the identifiers of the command groups sent by the network management device to the network element device meets the size required by the communication protocol between the network management device and the network element device, the communication processing between the network management device and the network element device is relatively simple.
  • the commands included in the default command group defined in the network element device generally change. Because the domain user information is associated with the identifier of one or more command groups, The identity of one or more command groups associated with the domain user information saved on the network management device is changed, and the rights of the domain user in the network management device must be changed when the network element device is upgraded in the prior art. Adjust, otherwise the problem of loss of permissions due to the upgrade of the NE device will occur.
  • the command mode (the custom command group and the default command group) between the network element device and the network management device may be implemented in the following manners:
  • the first type, the default command group defined by the network element device is passed:
  • the default command group defined by the current version of the NE device is advertised to the NMS device.
  • the NMS merges the default command group information advertised by the NE device to the NMS device.
  • the network element device adaptation module in the middle Each network element adaptation module in the network management device is responsible for providing a default command group defined by the network element device to the network management device.
  • the adapter module corresponding to the currently upgraded NE device on the U2000 is updated to update the default command group corresponding to the currently upgraded NE device saved on the U2000.
  • the second, custom command group is passed:
  • the command mode of the custom command group on the NE device can be:
  • the NE device saves the user-defined command on the NE device before the upgrade.
  • the user-defined command group saved on the NE device meets the requirements of the software version after the NE device is upgraded.
  • the NMS automatically synchronizes the user-defined command group saved on the NE device to the NMS device.
  • the NE device When the NE user side creates or modifies a user-defined command group, the NE device sends a change notification to the network management device. After receiving the change notification, the network management device updates the customized command group from the NE device. Synchronize to the network management device.
  • the NMS can send the created or modified custom command group to the NE device, so that the NE command and the custom command group in the NMS device. Synchronize.
  • FIG. 4 is a schematic structural diagram of an embodiment of a processing device for a domain user right according to the present invention.
  • the device of this embodiment includes: a login processing device 11, a receiving device 12, an obtaining device 13, and a determining processing device 14.
  • the login processing device 1 1 is configured to accept the domain user login and acquire the domain user information;
  • the receiving device 12 is configured to receive the executed command;
  • the obtaining device 13 is configured to acquire the command group to which the executed command belongs;
  • the determination processing device 14 is configured to determine Whether the command group to which the executed command belongs belongs to one or more command groups associated with the domain user information, and performs corresponding processing according to the judgment result.
  • the processing device of the domain user right in this embodiment may perform the technical solution of the method embodiment shown in FIG. 1 , and the principles are similar, and details are not described herein again.
  • domain user information is obtained by accepting domain user login; receiving domain user by receiving Executing the command, obtaining the command group to which the executed command belongs, thereby determining whether the command group to which the executed command belongs belongs to one or more command groups associated with the domain user information, and performing corresponding processing according to the judgment result, Thereby effectively improving the processing efficiency of domain user rights.
  • FIG. 5 is a schematic structural diagram of another embodiment of a processing device for a domain user right according to the present invention.
  • a processing device with domain user rights is taken as an example of a network management device, and in the embodiment shown in FIG. 4 above.
  • the receiving device 12 is further configured to acquire a default command group defined by the network element device and an identifier of the network element device, and is also used to receive a system administrator input.
  • the custom command group creation request includes the identifier of the first designated network element device, the identifier of the custom command group, and the identifier of the specified command
  • the processing device of the domain user right further includes:
  • the command group creation device 15 and the first transmitting device 16 are customized.
  • the custom command group obtaining device 15 is configured to create a custom command group corresponding to the identifier of the customized command group, and use a command corresponding to the identifier of the specified command from the default command group corresponding to the identifier of the specified network element device.
  • the first sending device 16 is configured to send the customized command group to the network element device corresponding to the identifier of the first designated network element device.
  • the receiving device 12 is further configured to receive a domain user permission request input by the system administrator, and the processing device of the domain user right may further include: a domain user rights setting device 17 and an association setting device 18.
  • the domain user rights setting device 17 is configured to obtain one or more from a default command group and/or a custom command group corresponding to the identifier of the second designated network element device according to the received domain user rights request.
  • the association setting device 18 is configured to use one or more corresponding to the domain user information, the identifier of the second designated network element device, and the identifier of the second designated network element device. The identity of multiple command groups is associated.
  • the processing device of the domain user rights in this embodiment may perform the technical solution of the method embodiment shown in FIG. 2, and the principles are similar, and details are not described herein again.
  • the network management device accepts the domain user login and obtains the domain user information, and receives the executed command, obtains the command group to which the executed command belongs, and determines whether the command group belongs to the domain user information.
  • One or more command groups if they belong, the network management device sends the executed command
  • the network element device is sent to the network element device, so that the network element device does not perform authentication on the domain user, and performs corresponding processing according to the executed command; if not, sends the result of the authentication disagreement to the domain user, thereby effectively Improve the processing efficiency of domain user permissions.
  • the receiving device 12 when the domain user directly accesses the network element device, the receiving device 12 is further configured to receive a domain user login request sent by the network element device, where the domain user login request includes the domain user.
  • the information and the identifier of the network element device; the first sending device 16 is further configured to: if the identifier of the one or more command groups associated with the domain user information and the identifier of the network element device is acquired, send the notification message carrying the authentication pass And the identifier of the one or more commands to the network element device corresponding to the identifier of the network element device.
  • FIG. 6 is a schematic structural diagram of still another embodiment of a processing device for a domain user right according to the present invention.
  • a processing device that uses domain user rights is an example of a network element device, and the embodiment shown in FIG. 4 is used.
  • the receiving device 12 in the device of the embodiment is further configured to receive a custom command group sent by the network management device.
  • the login processing device 11 of the processing device of the domain user rights specifically includes a receiving module 111, a sending module 112, and a slanting block 113.
  • the receiving module 111 is configured to receive a domain user login request, and the domain user The login request includes the domain user information;
  • the sending module 112 is configured to carry the identifier of the network element device in the domain user login request to the network management device, so that the network management device can authenticate the domain user information in the domain user login request;
  • the module 111 is further configured to receive a notification message that is sent by the network management device and that carries the authentication.
  • the login module 113 is configured to accept the domain user to log in according to the notification message.
  • the receiving device 12 is further configured to receive an identifier of one or more command groups sent by the network management device.
  • the processing device of the domain user rights in this embodiment may perform the technical solution of the method embodiment shown in FIG. 3, and the principles are similar, and details are not described herein again.
  • the network element device receives the domain user login request, and the identifier of the network element device is carried in the domain user login request and sent to the network management device, and the network management device searches for the domain according to the domain user login request.
  • the user information is authenticated. If the authentication is passed, the network element device receives the notification message that is sent by the network management device and carries the authentication, and according to the notification message, accepts the domain user to log in, and receives the user sent by the network management device and the domain user.
  • the command of the command group receives the executed command, obtains the command group to which the executed command belongs, and determines whether the command group to which the executed command belongs belongs to one or more command groups associated with the domain user information, and according to the judgment As a result, the corresponding processing is performed, thereby effectively improving the processing efficiency of domain user rights.
  • the size of the identifiers of the command groups sent by the network management device to the network element device meets the size required by the communication protocol between the network management device and the network element device, the communication processing between the network management device and the network element device is relatively Single.
  • the commands included in the default command group defined in the network element device generally change. Because the domain user information is associated with the identifier of one or more command groups, The identity of one or more command groups associated with the domain user information of the network management device does not change, and the rights of the domain user in the network management device must be changed when the network element device is upgraded in the prior art. Make adjustments, otherwise the problem of loss of permissions due to upgrade of the NE device may occur.
  • FIG. 7 is a schematic structural diagram of an embodiment of a processing system for a domain user right according to the present invention. As shown in FIG. 7, the system in this embodiment includes: a network element device 21 and a network management device 22.
  • the network management device 22 can implement the technical solution of the device shown in FIG. 5, and the principle is similar, and details are not described herein again.
  • the network element device 21 can perform the technical solution of the device shown in FIG. 6, and the principle is similar, and details are not described herein again.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供一种域用户权限信息的处理方法、设备和***。该方法包括:接受域用户登录并获取域用户信息;接收执行的命令,并获取该执行的命令所属的命令组;判断该执行的命令所属的命令组是否属于与该域用户信息相关联的一个或多个命令组;再根据判断结果执行相应的处理。本发明的域用户权限信息的处理方法、设备和***有效地提高了对域用户权限信息的处理效率。

Description

域用户权限的处理方法、 设备和***
技术领域
本发明实施例涉及通信技术, 尤其涉及一种域用户权限的处理方法、 设 备和***。 背景技术
在采用集中用户管理机制的通信网络中, 可以将网管设备作为一个管理域, 该管理域内的域用户可以对管理域内的所有网元设备实施管理, 其中, 域用户 为由网管设备管理, 在网管设备的权限控制下能够访问管理域内所有网元设备 的用户。 另外, 域用户对网元设备的访问的权限信息可以存储在该网管设备中, 且在必要的时候将该权限信息传递到网元设备。
具体的, 域用户对管理域内的网元设备的访问可以有两种方式: 一种是通 过域用户登录网管设备来访问各网元设备, 在这种方式中, 域用户在网管设备 登录时, 网管设备对该域用户进行鉴权, 并在鉴权通过后访问网元设备时, 各 网元设备不再对该域用户进行鉴权; 另一种是域用户可以登录网元设备并直接 访问该网元设备, 在这种方式下, 域用户登录网元设备, 该网元设备需要将域 用户的相关信息传递给网关***进行鉴权, 在鉴权通过后, 网管设备将域用户 在当前网元设备上的权限信息传递给该网元设备, 使得网元设备接收该域用户 登录, 或用户可以访问网元。
在实现本发明过程中, 发明人发现现有技术中至少存在如下问题: 由于网 管设备在保存域用户的权限信息时保存的是域用户能够在各网元设备上执行的 命令的集合, 因此, 在域用户直接登录网元设备访问时, 网管设备需要将域用 户在当前网元设备的权限信息, 即所有能够在网元设备上执行的命令的集合, 传递到该网元设备上, 但是, 当命令集合超过一定大小时, 将导致网管设备发 送到网元设备的权限信息超过网管设备与网元设备之间的通信协议所要求的大 小, 使得网管设备与网元设备间的通信处理复杂而难以处理, 从而严重地影响 了域用户权限的处理效率。 发明内容
本发明实施例提供一种域用户权限的处理方法、 设备和***, 用以有效地 提高了对域用户权限的处理效率。
本发明实施例提供一种域用户权限的处理方法, 包括:
接受域用户登录并获取域用户信息;
接收执行的命令, 并获取所述执行的命令所属的命令组;
判断所述执行的命令所属的命令组是否属于与所述域用户信息相关联的一 个或多个命令组, 并根据判断结果执行相应的处理。
本发明实施例提供一种域用户权限的处理设备, 包括:
登录处理装置, 用于接受域用户登录并获取域用户信息;
接收装置, 用于接收执行的命令,
获取装置, 用于获取所述执行的命令所属的命令组;
判断处理装置, 用于判断所述执行的命令所属的命令组是否属于与所述域 用户信息相关联的一个或多个命令组, 并根据判断结果执行相应的处理。
本发明实施例提供一种域用户权限的处理***, 包括网元设备和网管设备, 其中, 所述网管设备为上述所述的域用户权限的处理设备。
本发明实施例还提供一种域用户权限的处理***, 包括网元设备和网管设 备, 其中, 所述网元设备为上述所述的域用户权限的处理设备。
本发明实施例的域用户权限的处理方法、 设备和***, 通过接受域用户登 录并获取域用户信息, 接收执行的命令, 并获取该执行的命令所属的命令组, 判断该执行的命令所属的命令组是否属于与域用户信息相关联的一个或多个命 令组, 再根据判断结果执行相应的处理, 从而有效地提高了对域用户权限的处 理效率。 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施 例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下面描 述中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出 创造性劳动性的前提下, 还可以根据这些附图获得其他的附图。
图 1为本发明域用户权限的处理方法的一个实施例的流程图;
图 2为本发明域用户权限的处理方法的另一个实施例的流程图;
图 3为本发明域用户权限的处理方法的又一个实施例的流程图;
图 4为本发明域用户权限的处理设备的一个实施例的结构示意图; 图 5为本发明域用户权限的处理设备的另一个实施例的结构示意图; 图 6为本发明域用户权限的处理设备的又一个实施例的结构示意图; 图 7为本发明域用户权限的处理***的一个实施例的结构示意图。 具体实施方式
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发明 实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中 的实施例, 本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其 他实施例, 都属于本发明保护的范围。
在本发明各实施方式中, 网元设备预先对网元设备中定义的命令按照功能 进行归类分组, 由此定义多个默认命令组, 每个默认命令组包含一类命令。 举 例来说: 网元设备中的命令有告警功能的命令, 查询功能的命令、 维护功能的 命令和配置功能的命令, 网元设备可以按照功能对该些命令进行分类, 并定义 四个默认命令组, 分别为用于表示告警功能的默认命令组、 用于表示查询功能 的默认命令组、 用于表示维护功能的默认命令组和用于表示配置功能的默认命 令组, 然后分别将告警功能的命令, 查询功能的命令、 维护功能的命令和配置 功能的命令放入到表示告警功能的默认命令组、 表示查询功能的默认命令组、 表示维护功能的默认命令组和表示配置功能的默认命令组中。
图 1为本发明域用户权限的处理方法的一个实施例的流程图, 如图 1所示, 本实施例的方法包括:
步骤 101、 接受域用户登陆并获取域用户信息。
步驟 102、 接收执行的命令, 并获取该执行的命令所属的命令组。
步骤 103、判断执行的命令所属的命令组是否属于域用户信息相关联的一个 或多个命令组, 并根据判断结果执行相应的处理。
在本实施例中, 通过接受域用户登陆, 获取域用户信息; 通过接收域用户 的执行的命令、 获取该执行的命令所属的命令组, 从而判断该执行的命令所属 的命令组是否属于该域用户信息相关联的一个或多个命令组, 再根据判断结果 执行相应的处理, 从而有效地提高了对域用户权限的处理效率。
图 2 为本发明域用户权限的处理方法的另一个实施例的流程图, 在本实施 例中, 以域用户通过网管设备访问网元设备为例, 烊细介绍本实施例的技术方 案, 如图 2所示, 本实施例的方法包括:
步骤 201、 网管设备获取网元设备定义的默认命令组和该网元设备的标识。 在本实施例中, 网管设备可以通过动态方式或者静态配置方式获取网元设 备定义的默认命令组。
步骤 202、 网管设备接收***管理员输入的自定义命令组创建倚求, 该自定 义命令组创建请求包括第一指定的网元设备的标识、 自定义命令组的标识和指 定的命令的标识。
步驟 203、 网管设备创建自定义命令组的标识对应的自定义命令组, 并从指 定的网元设备标识对应的默认命令组中, 将与该指定的命令的标识对应的命令 存储到自定义命令组的标识对应的自定义命令组中。
步骤 204、网管设备将自定义命令组发送给第一指定的网元设备的标识对应 的网元设备。
在本实施例中, 网管设备在保存了每个网元设备定义的默认命令组后, 还 可以根据用户实际需求, 创建自定义命令組, 其具体的实现方式可以为: 网管 设备接收***管理员输入的自定义命令组创建请求, 该自定义命令组创建请求 包括指定网元设备的标识、 自定义命令组的标识和指定的命令的标识, 并创建 自定义命令组的标识对应的自定义命令组, 并从指定网元设备的标识对应的网 元设备中多个默认命令组中, 将与指定的命令的标识对应的命令存储到自定义 命令组的标识对应的自定义命令组中。 最后, 将该自定义命令组发送给该第二 指定的网元设备的标识对应的网元设备。 网元设备接收并保存该自定义命令组。
需要说明的是, 创建自定义命令组后, 指定的命令的标识对应的命令既存 储在默认命令组中, 也同时存储在自定义命令组中。
步骤 205、 网管设备接收***管理员输入的创建域用户权限请求, 该创建域 用户权限请求可以包括域用户信息 (例如: 账号) 、 一个或多个指定的命令组 的标识和第二指定的网元设备的标识。
步骤 206、 网管设备根据接收的创建域用户请求, 从与第二指定的网元设备 的标识对应的默认命令组和 /或自定义命令组中, 获取与一个或多个指定的命令 组的标识对应的一个或多个命令组。
步骤 207、 网管设备将该域用户信息、 第二指定的网元设备的标识和该第二 指定到的网元设备的标识对应的一个或多个命令组的标识相关联。
在实施例中, 网管设备通过***管理员可以为每个域用户设置权限信息, 该权限信息可以指与该域用户信息相关联的网元设备的标识和该网元设备的标 识对应的网元设备下的一个或多个命令组, 其具体的实现方式可以为: 根据系 统管理员输入的创建域用户请求, 该创建域用户权限请求包括域用户信息、 指 定的命令组的标识和第二指定的网元设备的标识, 其中, 该域用户信息可以为 账号, 并分别将该域用户信息与该请求中第二指定的网元设备的标识和指定的 命令的标识对应的命令组相关联起来。 具体的, 请求中的指定的命令组的标识 对应的命令组的数量可以为一个或多个, 且该命令组可以为默认命令组, 也可 以为自定义命令组, 更为具体的, 该一个或多个命令组中包含的命令即为该域 用户的可以访问该第二指定的网元设备的标识对应的网元设备时可以执行的命 令。
步骤 208、 网管设备接受域用户登陆并获取域用户信息。
步骤 209、 网管设备接收执行的命令, 并获取该执行的命令所属的命令组。 在本实施例中, 网管设备可以先接收域用户输入的域用户信息, 并对该该 域用户信息进行认证, 在认证通过后, 即接受域用户登录后, 可以接收该域用 户输入的执行的命令, 并根据该执行的命令, 获取其所属的命令组。 需要说明 的是, 网管设备获取该执行的命令所属的命令组的数量可以是一个也可以是多 个。 另外, 该命令组可以为自定义命令组, 也可以为默认命令组。
步骤 210、网管设备判断执行的命令所属的命令组是否属于与域用户信息相 关联的一个或多个命令组, 若属于, 则执行步骤 211 ; 若不属于, 则执行步骤 212。
步骤 211、 网管设备鉴权通过后, 发送该执行的命令给网元设备标识对应的 网元设备, 网元设备接收到该执行命令后进行相应的处理并返回执行结果。
在本实施例中, 当网管设备对该域用户输入的执行的命令进行鉴权通过后, 网管设备将执行的命令发送给网元设备, 网元设备接收到该执行的命令, 不再 重新进行鉴权, 直接进行相应的处理, 并返回执行的结果给网管设备。
步骤 212、 网管设备生成鉴权不通过的结果, 并将该鉴权不通过的结果通知 域用户信息对应的域用户。
在本实施例中, 通过网管设备接受域用户登录并获取域用户信息, 并接收 执行的命令, 再获取与该执行的命令所属的命令组, 判断该命令组是否属于与 该域用户信息相关联的一个或多个命令组, 若属于, 则网管设备将执行的命令 发送给网元设备, 以使网元设备不再对该域用户进行鉴权, 根据该执行的命令 进行相应的处理; 若不属于, 则发送鉴权不同意的结果给域用户, 从而有效地 提高了对域用户权限的处理效率。
图 3 为本发明域用户权限的处理方法的又一个实施例的流程图, 在本实施 例中, 以域用户直接访问网元设备为例, 且网管设备可以执行图 2 所示方法的 实施例的步骤 201至步骤 207, 详细介绍本实施例的技术方案, 如图 3所示, 本 实施例的方法包括:
步骤 301、 网元设备接收网管设备发送的自定义命令组。
步驟 302、 网元设备接收域用户登陆请求 , 该域用户登录请求包括域用户信 息 (例如: 账号) 。
具体的, 该域用户登录请求还可以包括口令。
步骤 303、网元设备将该网元设备的标识携带在域用户登陆请求中发送给网 管设备。
在本实施例中, 当网管设备接收到该域用户登陆请求后, 对该域用户登陆 请求中的域用户信息进行鉴权, 即是否能够获取到与该域用户信息和网元设备 的标识相关联的一个或多个命令组的标识; 若鉴权通过, 即域用户能够登录, 则发送携带有鉴权通过的通知消息给网元设备的标识对应的网元设备, 以使得 网元设备根据该通知消息, 接受域用户登录。 同时, 网管设备获取与该域用户 信息和网元设备的标识相关联的一个或多个命令组的标识发送给网元设备。 若 鉴权不通过, 则发送鉴权不通过的通知消息给网元设备的标识对应的网元设备, 以使得网元设备拒绝该域用户登录。
步骤 304、 网元设备接收网管设备发送的携带有鉴权通过的通知消息, 并根 据该通知消息, 接受域用户登录。
步骤 305、 网元设备接收网管设备发送的一个或多个命令组的标识。
步骤 306、 网元设备接收执行的命令, 并获取执行的命令所属的命令组。 步骤 307、网元设备判断执行的命令所属的命令组是否属于与步骤 305获取 的一个或多个命令组标识对应的一个或多个命令组; 若属于, 则执行步驟 308; 若不属于, 则执行步骤 309。 步驟 308、 网元设备生成鉴权通过的结果, 并根据该鉴权通过的结果和执行 的命令, 执行相应的处理。
步骤 309、 网管设备生成鉴权不通过的结果, 并将该鉴权不通过的结果通知 域用户。
在本实施例中, 通过网元设备接收域用户登陆请求, 并将该网元设备的标 识携带在域用户登陆请求中发送给网管设备, 由网管设备根据该域用户登陆请 求, 对其中的域用户信息进行鉴权处理, 若认证通过, 则网元设备接收网管设 备发送的携带有鉴权通过的通知消息, 并根据该通知消息, 接受域用户登录, 并接收网管设备发送的与该域用户信息和网元设备的标识相关联的一个或多个 命令组的标识, 再接收执行的命令, 获取与该执行的命令所属的命令组, 判断 该执行的命令所属的命令组是否属于与域用户信息相关联的一个或多个命令组 的标识对应的一个或多个命令组, 并根据判断结果执行相应的处理, 从而有效 地提高了对域用户权限的处理效率。 另外, 由于网管设备发送给网元设备的该 些命令组的标识的大小满足网管设备与网元设备之间的通信协议所要求的大 小, 因此使得网管设备与网元设备之间的通信处理相对简单。
还需要说明的是, 在网元设备升级时, 网元设备中定义的默认命令组中包 含的命令一般会发生变化, 由于域用户信息相关联的是一个或多个命令组的标 识, 因此也不会导致网管设备上保存的域用户信息相关联的一个或多个命令组 的标识发生变化, 从而解决了现有技术中当网元设备升级时, 必须对网管设备 中的域用户的权限进行调整, 否则会发生因网元设备升级而导致权限丢失的问 题。
另外, 在上述实施例的基础上, 网元设备和网管设备之间的命令组 ( 自定 义命令组和默认命令组 ) 的传递方式可以有如下几种实现方式:
第一种、 网元设备定义的默认命令组的传递方式:
当网元设备的软件版本发布时, 同时向网管设备发布网元设备当前版本定 义的默认命令组; 网管设备将网元设备发布的默认命令组信息合入到网管设备 中的网元设备适配模块。 由网管设备中的各网元适配模块负责向网管设备提供 网元设备定义的默认命令组。 当网元设备升级时, 同时更新网管设备上当前升 级网元设备对应的适配模块来完成网管设备上保存的当前升级网元设备对应的 默认命令组的更新。
第二种、 自定义命令组的传递方式:
( 1 )、 当网元设备升级时, 网元设备上的自定义命令组的传递方式可以为: 当网元设备升级时, 网元设备对升级前在网元设备上保存的用户自定义命令组 进行升级转换, 以保证网元设备升级后, 保存在网元设备上的用户自定义命令 组满足网元设备升级后软件版本的要求。 在网元设备升级完成后, 通过手动或 自动方式让网管设备从网元设备上将更新后的网元设备上保存的用户自定义命 令组同步到网管设备。
( 2 ) 、 当网元设备侧创建或修改用户自定义命令组时, 网元设备发送变更 通知到网管设备; 网管设备接收到变更通知后, 从网元设备上将更新后的自定 义命令组同步到网管设备。
( 3 ) 、 当网管设备侧创建或修改用户自定义命令组时, 网管设备可以将创 建或修改后的自定义命令组发送给网元设备, 使得网元设备与网管设备中的自 定义命令组同步。
图 4 为本发明域用户权限的处理设备的一个实施例的结构示意图, 如图 4 所示, 本实施例的设备包括: 登录处理装置 11、 接收装置 12、 获取装置 13和 判断处理装置 14。 其中, 登录处理装置 1 1用于接受域用户登录并获取域用户信 息; 接收装置 12用于接收执行的命令; 获取装置 13用于获取执行的命令所属 的命令组; 判断处理装置 14用于判断执行的命令所属的命令组是否属于与域用 户信息相关联的一个或多个命令组, 并根据判断结果执行相应的处理。
本实施例的域用户权限的处理设备可以执行图 1 所示的方法实施例的技术 方案, 其原理相类似, 此处不再赘述。
在本实施例中, 通过接受域用户登陆, 获取域用户信息; 通过接收域用户 的执行的命令、 获取该执行的命令所属的命令组, 从而判断该执行的命令所属 的命令组是否属于该域用户信息相关联的一个或多个命令组, 再根据判断结果 执行相应的处理, 从而有效地提高了对域用户权限的处理效率。
图 5 为本发明域用户权限的处理设备的另一个实施例的结构示意图, 在本 实施例中, 以域用户权限的处理设备为网管设备为例, 并在上述图 4 所示的实 施例的基础上, 详细介绍本实施例的技术方案, 如图 5所示, 接收装置 12还用 于获取网元设备定义的默认命令组和该网元设备的标识, 并还用于接收***管 理员输入的自定义命令组创建请求, 该自定义命令组创建请求包括第一指定的 网元设备的标识、 自定义命令组的标识和指定的命令的标识, 则该域用户权限 的处理设备还包括: 自定义命令组创建装置 15和第一发送装置 16。 其中, 自定 义命令组获取装置 15用于创建自定义命令组的标识对应的自定义命令组, 并从 指定网元设备的标识对应的默认命令组中, 将与指定的命令的标识对应的命令 存储到该自定义命令组中; 第一发送装置 16用于将自定义命令组发送给第一指 定的网元设备的标识对应的网元设备。
进一步的,接收装置 12还用于接收***管理员输入的创建域用户权限情求, 则该域用户权限的处理设备还可以包括: 域用户权限设置装置 17和关联设置装 置 18。 具体的, 域用户权限设置装置 17用于根据接收的创建域用户权限请求, 从与第二指定的网元设备的标识对应的默认命令组和 /或自定义命令组中, 获取 与一个或多个指定的命令组的标识对应的一个或多个命令组; 关联设置装置 18 用于将域用户信息、 第二指定的网元设备的标识和第二指定的网元设备的标识 对应的一个或多个命令组的标识相关联。
本实施例的域用户权限的处理设备可以执行图 2 所示的方法实施例的技术 方案, 其原理相类似, 此处不再赘述。
在本实施例中, 通过网管设备接受域用户登录并获取域用户信息, 并接收 执行的命令, 获取与该执行的命令所属的命令组, 判断该命令组是否属于与该 域用户信息相关联的一个或多个命令组, 若属于, 则网管设备把执行的命令发 送给网元设备, 以使网元设备不再对该域用户进行鉴权, 根据该执行的命令进 行相应的处理; 若不属于, 则发送鉴权不同意的结果给域用户, 从而有效地提 高了对域用户权限的处理效率。
另外, 在上述图 5 所示实施例的基础上, 当域用户直接访问网元设备时, 该接收装置 12还用于接收网元设备发送的域用户登录请求, 该域用户登录请求 包括域用户信息和网元设备的标识; 第一发送装置 16还用于若获取到与域用户 信息和网元设备的标识相关联一个或多个命令组的标识, 则发送携带有鉴权通 过的通知消息以及一个或多个命令的标识给网元设备的标识对应的网元设备。
图 6 为本发明域用户权限的处理设备的又一个实施例的结构示意图, 在本 实施例中, 以域用户权限的处理设备为网元设备为例, 并在上述图 4 所示的实 施例的基础上, 详细介绍本实施例的技术方案, 如图 6 所示, 本实施例的设备 中的接收装置 12还用于接收网管设备发送的自定义命令组。
进一步的,该域用户权限的处理设备的登录处理装置 11具体包括接收模块 111、 发送模块 112和登斜莫块 113 , 具体的, 接收模块 111 , 用于接收域用户登录奇求, 该域用户登录请求包括域用户信息;发送模块 112用于将网元设备的标识携带在该域 用户登录请求中发送给网管设备,以供网管设备对域用户登录请求中的域用户信息进 行鉴 理; 接收模块 111还用于接收网管设备发送的携带有鉴权通过的通知消息; 登录模块 113用于根据通知消息接受域用户登录。 更为具体的, 接收装置 12还用于 接收网管设备发送的一个或多个命令组的标识。
本实施例的域用户权限的处理设备可以执行图 3 所示的方法实施例的技术 方案, 其原理相类似, 此处不再赘述。
在本实施例中, 通过网元设备接收域用户登陆请求, 并将该网元设备的标 识携带在域用户登陆请求中发送给网管设备, 由网管设备根据该域用户登陆请 求, 对其中的域用户信息进行鉴权处理, 若认证通过, 则网元设备接收网管设 备发送的携带有鉴权通过的通知消息, 并根据该通知消息, 接受域用户登录, 并接收网管设备发送的与该域用户信息和网元设备的标识相关联的一个或多个 命令组的标识, 再接收执行的命令, 获取与该执行的命令所属的命令组, 判断 该执行的命令所属的命令组是否属于与域用户信息相关联的一个或多个命令 组, 并根据判断结果执行相应的处理, 从而有效地提高了对域用户权限的处理 效率。 另外, 由于网管设备发送给网元设备的该些命令组的标识的大小满足网 管设备与网元设备之间的通信协议所要求的大小, 因此使得网管设备与网元设 备之间的通信处理相对筒单。
还需要说明的是,在网元设备升级时, 网元设备中定义的默认命令组中包含的命 令一般会发生变化, 由于域用户信息相关联的是一个或多个命令组的标识, 因此也不 会导致网管设备上^"的域用户信息相关联的一个或多个命令组的标识发生变化,从 而解决了现有技术中当网元设备升级时, 必须对网管设备中的域用户的权限进行调 整, 否则会发生因网元设备升级而导致权限丢失的问题。
图 7 为本发明域用户权限的处理***的一个实施例的结构示意图, 如图 7 所示, 本实施例的***包括: 网元设备 21和网管设备 22。
当域用户通过网管设备访问网元设备时, 该网管设备 22可以执行图 5所示 的设备的技术方案, 其原理类似, 此处不再赘述。
当域用户直接访问网元设备时, 该网元设备 21可以执行图 6所示的设备的 技术方案, 其原理类似, 此处不再赘述。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步骤可 以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机可读取存 储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述的存储 介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对其 限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通技术 人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修该, 或 者对其中部分技术特征进行等同替换; 而这些修该或者替换, 并不使相应技 术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims

权 利 要 求
1、 一种域用户权限的处理方法, 其特征在于, 包括:
接受域用户登录并获取域用户信息;
接收执行的命令, 并获取所述执行的命令所属的命令组;
判断所述执行的命令所属的命令组是否属于与所述域用户信息相关联的一 个或多个命令组, 并根据判断结果执行相应的处理。
2、 根据权利要求 1所述的域用户权限的处理方法, 其特征在于, 还包括: 获取网元设备定义的默认命令组和所述网元设备的标识;
接收***管理员输入的自定义命令组创建请求, 所述自定义命令组创建请 求包括第一指定的网元设备的标识、自定义命令组的标识和指定的命令的标识; 创建自定义命令组的标识对应的自定义命令组, 并从所迷指定网元设备的 标识对应的默认命令组中, 将与所述指定的命令的标识对应的命令存储到所述 自定义命令组中;
将所述自定义命令组发送给所述指定网元设备的标识对应的网元设备。
3、 根据权利要求 2所述的域用户权限的处理方法, 其特征在于, 还包括: 接收所述***管理员输入的创建域用户权限请求; 所述创建域用户权限请 求包括域用户信息、 一个或多个指定的命令组的标识和第二指定的网元设备的 标识;
根据接收的所述创建域用户权限请求, 从与所述第二指定的网元设备的标 识对应的默认命令组和 /或自定义命令组中,获取与所述一个或多个指定的命令 组的标识对应的一个或多个命令组;
将所述域用户信息、 第二指定的网元设备的标识和所述第二指定的网元设 备的标识对应的一个或多个命令组的标识相关联。
4、 根据权利要求 1或 3所述的域用户权限的处理方法, 其特征在于, 还包 括: 接收所述网元设备发送的域用户登录请求, 所述域用户登录请求包括域用 户信息和网元设备的标识;
若获取到与所述域用户信息和网元设备的标识相关联一个或多个命令组的 标识, 则发送携带有鉴权通过的通知消息以及一个或多个命令的标识给所述网 元设备的标识对应的网元设备。
5、 根据权利要求 1所述的域用户权限的处理方法, 其特征在于, 所述接收 域用户信息之前, 还包括:
接收网管设备发送的自定义命令组。
6、 根据权利要求 5所述的域用户权限的处理方法, 其特征在于, 所述接受 域用户登录并获取域用户信息, 包括:
接收域用户登录请求, 所述域用户登录请求包括域用户信息;
将所述网元设备的标识携带在所述域用户登录请求中发送给所述网管设 备, 以供所述网管设备对所述域用户登录请求中的域用户信息进行鉴权处理; 接收所述网管设备发送的携带有鉴权通过的通知消息, 并根据所述通知消 息接受域用户登录。
7、 根据权利要求 6所述的域用户权限的处理方法, 其特征在于, 还包括: 接收所述网管设备发送的一个或多个命令组的标识。
8、 一种域用户权限的处理设备, 其特征在于, 包括:
登录处理装置, 用于接受域用户登录并获取域用户信息;
接收装置, 用于接收执行的命令;
获取装置, 用于获取所述执行的命令所属的命令组;
判断处理装置, 用于判断所述执行的命令所属的命令组是否属于与所述域 用户信息相关联的一个或多个命令组, 并根据判断结果执行相应的处理。
9、 根据权利要求 8所述的域用户权限的处理设备, 其特征在于, 所述域 用户权限的处理设备为网管设备, 所述接收装置还用于获取网元设备定义的 默认命令组和所述网元设备的标识;并还用于接收***管理员输入的自定义命 令组创建请求, 所述自定义命令组创建请求包括第一指定的网元设备的标识、 自定义命令组的标识和指定的命令的标识, 则所述域用户权限的处理设备还包 括:
自定义命令组创建装置, 用于创建自定义命令组的标识对应的自定义命令 组, 并从所述指定网元设备的标识对应的默认命令组中, 将与所述指定的命令 的标识对应的命令存储到所述自定义命令组中;
第一发送装置, 用于将所述自定义命令组发送给所述第一指定的网元设备 的标识对应的网元设备。
10、 根据权利要求 9所述的域用户权限的处理设备, 其特征在于, 所述接 收装置还用于接收所述***管理员输入的创建域用户权限请求; 所述创建域用 户权限请求包括域用户信息、 一个或多个指定的命令组的标识和第二指定的网 元设备的标识; 则所述域用户权限的处理设备还包括:
域用户权限设置装置, 用于根据接收的所述创建域用户权限请求, 从与所 述第二指定的网元设备的标识对应的默认命令组和 /或自定义命令组中,获取与 所述一个或多个指定的命令组的标识对应的一个或多个命令组;
关联设置装置, 用于将所述域用户信息、 第二指定的网元设备的标识和所 述第二指定的网元设备的标识对应的一个或多个命令组的标识相关联。
11、 根据权利要求 9或 10所述的域用户权限的处理设备, 其特征在于, 所 述接收装置还用于接收所述网元设备发送的域用户登录请求, 所述域用户登录 请求包括域用户信息和网元设备的标识;
所述第一发送装置还用于若获取到与所述域用户信息和网元设备的标识相 关联一个或多个命令组的标识, 则发送携带有鉴权通过的通知消息以及一个或 多个命令的标识给所述网元设备的标识对应的网元设备。
12、 根据权利要求 8所述的域用户权限的处理设备, 其特征在于, 所述域 用户权限的处理设备为网元设备, 则所述接收装置还用于接收网管设备发送的 自定义命令组。
13、 根据权利要求 12所述的域用户权限的处理设备, 其特征在于, 所述登 录处理装置包括:
接收模块, 用于接收域用户登录请求, 所述域用户登录请求包括域用户信 息;
发送模块, 用于将所述网元设备的标识携带在所述域用户登录请求中发送 给所述网管设备, 以供所述网管设备对所述域用户登录请求中的域用户信息进 行鉴权处理;
所述接收模块, 还用于接收所述网管设备发送的携带有鉴权通过的通知消 息;
登录模块, 用于根据所述通知消息接受域用户登录。
14、根据权利要求 13所述的域用户权限的处理设备,其特征在于,所述接 收装置还用于接收所述网管设备发送的一个或多个命令组的标识。
15、一种域用户权限的处理***, 其特征在于, 包括网元设备和网管设备, 其中,所述网管设备为如权利要求 8至 11任一项所述的域用户权限的处理设备。
16、一种域用户权限的处理***, 其特征在于, 包括网元设备和网管设备, 其中, 所述网元设备为如权利要求 8、 12至 14任一项所述的域用户权限的处理 设备。
PCT/CN2011/074582 2011-05-24 2011-05-24 域用户权限的处理方法、设备和*** WO2011144071A2 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201180000760.7A CN102273135B (zh) 2011-05-24 2011-05-24 域用户权限的处理方法、设备和***
PCT/CN2011/074582 WO2011144071A2 (zh) 2011-05-24 2011-05-24 域用户权限的处理方法、设备和***

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/074582 WO2011144071A2 (zh) 2011-05-24 2011-05-24 域用户权限的处理方法、设备和***

Publications (2)

Publication Number Publication Date
WO2011144071A2 true WO2011144071A2 (zh) 2011-11-24
WO2011144071A3 WO2011144071A3 (zh) 2012-04-26

Family

ID=44992106

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/074582 WO2011144071A2 (zh) 2011-05-24 2011-05-24 域用户权限的处理方法、设备和***

Country Status (2)

Country Link
CN (1) CN102273135B (zh)
WO (1) WO2011144071A2 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077337B (zh) * 2013-01-09 2015-09-16 大唐移动通信设备有限公司 用户权限校验方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859153A (zh) * 2005-07-22 2006-11-08 上海华为技术有限公司 通信***中用户权限设置方法
CN101018155A (zh) * 2007-02-08 2007-08-15 华为技术有限公司 网元管理的方法、***及网元
CN101197711A (zh) * 2007-12-06 2008-06-11 华为技术有限公司 一种实现统一鉴权管理的方法、装置及***
CN101931613A (zh) * 2009-06-23 2010-12-29 中兴通讯股份有限公司 集中认证方法和集中认证***

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1154326C (zh) * 1999-03-12 2004-06-16 诺基亚网络有限公司 监听***和方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859153A (zh) * 2005-07-22 2006-11-08 上海华为技术有限公司 通信***中用户权限设置方法
CN101018155A (zh) * 2007-02-08 2007-08-15 华为技术有限公司 网元管理的方法、***及网元
CN101197711A (zh) * 2007-12-06 2008-06-11 华为技术有限公司 一种实现统一鉴权管理的方法、装置及***
CN101931613A (zh) * 2009-06-23 2010-12-29 中兴通讯股份有限公司 集中认证方法和集中认证***

Also Published As

Publication number Publication date
WO2011144071A3 (zh) 2012-04-26
CN102273135A (zh) 2011-12-07
CN102273135B (zh) 2014-05-07

Similar Documents

Publication Publication Date Title
US11641361B2 (en) Dynamic access control to network resources using federated full domain logon
CN112422532B (zh) 业务通信方法、***、装置及电子设备
US11102013B2 (en) Method and apparatus for providing secure communication among constrained devices
CN106506521B (zh) 资源访问控制方法和装置
US9172544B2 (en) Systems and methods for authentication between networked devices
EP2675127B1 (en) Method and device for automatically migrating system configuration item
EP2658207B1 (en) Authorization method and terminal device
WO2017152754A1 (zh) 软件定义网路sdn安全通信的方法及装置
CN101931613B (zh) 集中认证方法和集中认证***
WO2015196908A1 (zh) 业务处理方法、终端、服务器及***
WO2011034691A1 (en) Method and apparatus for identity verification
CN113221093B (zh) 一种基于区块链的单点登录***、方法、设备和产品
WO2014180235A1 (zh) 数据包过滤规则配置方法、装置及***
WO2017000676A1 (zh) 一种验证数字证书有效性的方法及其鉴别服务器
EP2795522B1 (en) Techniques to store secret information for global data centers
WO2014038820A1 (ko) 무선 통신 시스템에서 서버의 단말의 리소스에 대한 접근 권한을 관리하기 위한 방법 및 이를 위한 장치
CN101860551A (zh) 一种单接入端口下多用户的认证方法与***
WO2021029797A1 (en) Network nodes and methods for handling machine learning models in a communications network
WO2013182126A1 (zh) 一种泛在终端统一管理与控制方法及平台
WO2016101649A1 (zh) 一种License预鉴权方法、装置及***
CN103906050A (zh) 基于移动终端的wpki安全监控方法和***
CN112335215B (zh) 用于将终端设备联接到可联网的计算机基础设施中的方法
WO2011144071A2 (zh) 域用户权限的处理方法、设备和***
JP2017152877A (ja) 電子鍵再登録システム、電子鍵再登録方法およびプログラム
CN114900336A (zh) 一种应用***跨单位安全共享方法及***

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180000760.7

Country of ref document: CN

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11782988

Country of ref document: EP

Kind code of ref document: A2