Design of Windows Authentication and permission management

Source: Internet
Author: User
Design Scheme
    • Use LDAP for user login authentication and read the role in the user domain.
    • You can use the associated table of user roles and permissions to determine whether a user can access an operation page. If the user cannot perform the operation, the system prompts that the user has no relevant permissions and provides a return portal.
    • Records all user security logs and operation logs (including, add, modify, delete, and query logs)
    • Role-function-permission management interface
    • Function List Management
    • Function module Management
    • Event Log Management
Database backend_authorize
    • Function_list: function ID, function name, function introduction, parent function ID, function URL, and availability
    • Permission table (permission): Permission ID, permission name
    • Role permission table (role_authorized): Role permission ID, role name, User Position, function ID, permission ID
    • Event Log table (event_log): ID, user name, Client IP address, event type, function name, Module name, detailed description, Operation Time

* Verify the logic. jpg:

Note: users' positions are stored in the description column of the domain users. However, the user's description is blank in the current domain environment, so user description judgment is not performed for the moment, that is, the user's role can access the page, that is, the authentication of permissions.

Data rules

Data rules and conventions

Auto-increment, primary key

Function Name

Function Description

Parent function number. The default value is 0, indicating the basic function.

Function URL, storage rule: Value of request. url. absolutepath

Whether the function is available. The default value is 0 and the value is 1.

Auto-increment, primary key

Permission name (full control, read-only)

Auto-increment, primary key

User Role, storage rule: Save As the group name in the domain

User's position, storage rules: saved as the description of the user in the domain. If the description contains multiple positions (Leader, employee...), insert only one position in this field and store multiple records.

Authorized function ID

Authorize the user's access permissions (full control, read-only (later ))

    • New Feature
      • In the data table function_list, add
    • Allocate accessible role information for features
      • In the role_authorized table, add
    • Web applications
      • after the function page is developed, to add access control, drag and drop the user permission verification control (project \ backofficeweb \ windowsauthorized \ webusercontrol. ascx is available on the page, without the need for other Code
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.