Java Development Enterprise Level Rights Management System course e-commerce Rights Management System video Tutorials Total 18 chapters

Source: Internet
Author: User
Tags redis desktop manager

1th. Overall overview of the course (2018 companion Tutorials: E-commerce front end + E-commerce backend + e-commerce Rights Management System course)
This chapter first describes why large companies have a rights management system, and then the rights management of the popular RBAC model and expand to do a key explanation, and give the ideal of the rights management system should be what it looks like. The course will be followed by a general introduction to the course and the curriculum, and finally will introduce the technology that this course would involve, so that you can clearly understand what the course has to gain (the course provides QQ Exchange group). ...

the 2nd chapter of Spring Security Authority framework theory and practical exercises
This chapter begins by learning the architecture of the Spring Security Authority framework, and then you can learn the core concepts of the Spring security permissions framework, including * * *, database management, caching, custom decisions, and so on, and then taking you through the spring Boot+spring Security builds a set of walkthrough environments and encodes the API features commonly used by the framework under the common application scenarios of the Spring Security Authority framework ...

3rd. Apache Shiro Authority framework Theory and practical exercises
The schedule of this chapter is the same as the spring security framework, and is explained by the process of architecture, core concepts, building environment, coding walkthroughs, and pros and cons analysis. The difference is that the core concept in Shiro is to introduce the identity authentication, authorization, permission interception, session management, permission cache, etc. Through the study of two frames, it can be seen that their different design concepts, here compared with the learning effect will be better. Building environment is still used ...

The 4th chapter of the Authority Management System core table design
index of Knowledge points visit: http://www.imooc.com/article/21443, we may not know why there is a popular framework we also need to develop a set of ourselves, so this chapter began to explain this problem, Then I will demonstrate the interface of the system developed, and according to the presentation of the features we need to develop, and then lead you to complete the detailed database design (department table, user table, Permissions module table, permissions table, role table, ... )

5th Chapter Spring MVC Development Environment Construction and configuration
in this chapter, I will take you to use SPRINGMVC to build a complete development environment (not limited to the rights system project, all background system development is common), and take you to complete a variety of important configuration, including Pom.xml configuration, Web. XML configuration, Spring-servlet.xml configuration, applicationcontext.xml configuration, Durid configuration, mybatis-config.xml configuration, and Logback.xml configuration, we will learn from the many environmental configuration of the fine ...

the 6th chapter of project Preparation and core auxiliary tools development
At the beginning of this chapter, I will introduce a practical mybatis generator tool that can dynamically generate relevant Java code based on the database table design. After defining the interface specification of the project, on the basis of the exception of the interface to do a global exception encapsulation processing, and then in order to facilitate the validation of the parameters of the project, I will lead you to complete a calibration tool beanvalidator development. Because the project will involve JSON processing, I will specifically encapsulate Jsonmapper to complete the class ...

7th Chapter development of departmental modules
This chapter introduces the development of department module, which mainly involves the backend interface and front-end rendering of new department, update department and Department tree structure. Because it involves front-end development, I will use the content of the page to do some encapsulation, convenient reuse of the subsequent pages, improve code reusability. And the tools we developed in the previous chapter will also be used extensively from this chapter. The department is involved in the development of the tree structure, the Department updates the Sub-Department of recursive updating, tree-shaped ...

8th Chapter User Module Development
This chapter introduces the user module in RBAC model, in addition to the management of the user, it also handles the function of user login and logout, and stores the user login information into the Threadlocal object so as to get the information of the current logged-in user conveniently in the system. This module first involves the display of the page list, so we encapsulated a paging plug-in, convenient for the subsequent code reuse of the relevant modules, which will have a future of programming ideas ...

9th Chapter Rights Module Development
This chapter with you to develop the RBAC model of the Permissions module, because and the department module is very similar, front-end interaction is the same, this module I will teach you to improve the reference similar module for low-cost development or transformation of ideas and capabilities.

10th Chapter Development of Privilege Point module
This chapter is to take you to develop the RBAC model of the privilege point module, mainly to the authority to manage. Because it is very similar to user management, and the relevant plugins and functions are already packaged, this chapter will be easier to learn.

11th Chapter Role Module Development
This chapter will take you to develop the RBAC model of the role module, mainly to the role of management, including access to the list, add, modify, delete and corresponding front-end interaction, this chapter learning will be more relaxed.

The 12th chapter of role Authority relationship development
This chapter is to take the development of the RBAC model is the role of the Authority relationship module. This chapter involves a high level of technical requirements, first of all, the background recursive generation is based on the role of assigned permissions module and permission points to form a tree structure, and calculate the permission points under each node need to be checked and optional, and then the front end using the Ztree plug-in to dynamically render the tree structure, and allow updates. I did the details of the update, first check the permission points to update ...

13th Chapter Role User Relationship development
In this chapter, we develop the role User relationship module in RBAC model. The development of role-user relationships is relatively straightforward compared to the development of role-permission relationships, which is mainly reflected in data rendering, where we introduce Duallistbox plugins to showcase the selected and selected users. Background update operation and role permissions relationship development is basically the same, I wish you a happy study! ...

14th Chapter RBAC Model additional function development
This chapter first takes everyone to complete the department deletion, the permission deletion function development and the interaction, after completed two particularly useful interfaces, respectively is the query user already assigned role and the permission and the query permission assigned role and has the specified permission the user, This particularly helps to maintain the privileges of the administrator through various angles to the assigned permissions to view, although is a rights management system non-core, additional features, but from a product of ease of use and administrator ...

15th chapter of Rights interception module development
This chapter takes you to develop a rights interception module. On the basis of the complete function of RBAC model, using the data provided by RBAC, we use filter to intercept background requests, write our defined permission interception rules, and do special processing to requests and pages without access. Scalability is very high here, mainly to control the details of the interception, can be customized according to the needs of the business and expand. Provides a high degree of scalability for the system. ...

16th Chapter Rights Cache Module development (Redis distributed)
in this chapter we introduced Redis to do the permission cache, let the system become a distributed system, after encapsulating the Java operation Redis configuration, we will analyze the cache can be placed on which methods. And then I'll take you through the analysis of the methods involved in permission interception, analyzing the methods that need caching, and then I'll show how to cache the specified method in a targeted manner and validate the pass. In the process I will simply demonstrate using the Redis Desktop Manager client to ...

17th Chapter development of Privilege Operation record module
This chapter is particularly important for good authority management, and it is also the lack of most of the privilege system and the popular permission framework. We will be in the system Department, users, rights module, permission points, roles, roles and permissions, roles and user's new, updated log all down, on the page to display, and support based on type, operator keywords, update the keywords, updated keywords, update time period to query, This greatly facilitates the access of the system of ...

The 18th Chapter of the course summary
Congratulations to those who can persist in learning to the last chapter of the students, the course said this is about to end, sensational words do not say more, or more time to give you a summary of this set of native system relative to the popular authority framework of some advantages, and pointed out this set of native system extensibility points and flexibility, convenient for everyone ingenious, According to their business needs to choose and expand, very much hope that this course will bring you to improve and harvest, this is to do this course the most ...

: Baidu Network disk download
The article comes to Lingyun Community original address: http://linyunbbs.com/thread-2189-1-1.html

Java Development Enterprise Level Rights Management System course e-commerce Rights Management System video Tutorials Total 18 chapters

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.