J2EE integration-detailed discussion on permission Design

Source: Internet
Author: User
[Abstract]I will talk about the database design and implementation of MIS permission management. Of course, these ideas can also be applied, for example, to manage different levels of user permissions in BBS.
[Keyword]
The J2EE permission design discusses in detail the issues of permission management for networks or standalone programs involving multiple users with different permissions. The most prominent is the MIS system.

I will talk about the database design and implementation of MIS permission management. Of course, these ideas can also be applied, for example, to manage different levels of user permissions in BBS.

Permission design consists of three parts: database design, application interface (API) design, and program implementation.

These three parts are mutually dependent and inseparable. To achieve a sound permission management system, the feasibility, complexity, and even execution efficiency of each link must be taken into account.

We classify permissions into four types: Data Access Permissions, which are input, browse, modify, and delete, followed by functions, it can include all non-direct data access operations such as statistics. In addition, we may restrict the access to some fields in some key data tables. In addition, I cannot think of another permission category.

The complete permission design should be fully scalable. That is to say, the system should not bring major changes to the entire permission management system when new functions are added, the first is the rational database design, and the second is the application interface specification.

We will first discuss database design. We usually use relational databases. Here we do not discuss permission management based on Lotus products.

The permission table and related content can be described in six tables as follows:

1. Role (User Group) Table: contains three fields: ID, role name, and description of the role;

2. User table: contains three or more fields, ID, user name, description of the user, and other information (such as address and phone number );

3 Role-User table: This table records the relationship between users and roles. A user can belong to multiple roles and a role group can also have multiple users. It includes three fields: ID, role ID, and user ID;

4. Restricted content list: This table records all data tables, functions, fields, and descriptions that require permission differentiation, including three fields, ID, name, and description;

5. Permission list: This table records all permissions to be controlled, such as input, modification, deletion, and execution. It also contains three fields: ID, name, and description;

6. Permission-role-User table: Generally, the permissions of the Role/user are as follows, the user inherits all permissions of the role. All permissions within this range are allowed except explicitly, and all permissions beyond the permitted scope are prohibited. The design of this table is the focus of permission management, and there are also a lot of design ideas. It can be said that each table has its own merits. In this regard, my opinion is that, in my personal circumstances, I find myself appropriate to solve the problem.

The first and easiest way to understand is to design five fields: ID, Content ID, permission ID, role/user type (Boolean field, used to describe whether a record is a role permission or a user permission), role/user ID, and permission type (Boolean field, used to describe whether a record is allowed or not)

All right, there are these six tables. According to table 6, we can know whether a role/user has or disallows some permissions.

In other words, this design is enough, and we fully implement the required functions: You can customize permissions for roles and users separately, and also have considerable scalability. For example, new features are added, we only need to add one or more records, and the application interface does not need to be changed, which is quite feasible. However, in the process of program implementation, we found that using this method is not very scientific, for example, browsing the permissions owned by a user, it is inconvenient to perform multiple (or even recursive) queries on the database. So we need to find other methods. People who have used UNIX systems know that UNIX file systems divide file operation permissions into three types: read, write, and execute, which are identified by code 1, 2, and 4, respectively, 3 files with the same read and write permissions are recorded, that is, 1 + 2. We also
You can solve this problem in a similar way. The initial idea is to modify the permission list and add a field: ID code. For example, we can mark the input permission as 1, the Browse permission as 2, and the access permission as 4, the delete permission ID is 8 and the execution permission ID is 16. In this way, we can easily combine the permissions originally divided into several records and descriptions by accumulating the permissions. For example, assume that a user ID is 1, the restricted Content ID of the database table is 2, and the Role type is 0 and the user type is 1, we can describe the permissions that the user has to input, browse, modify, and delete the database and table.

It's really easy, isn't it? There are even more radical ways to add a column to the restricted content list and define the ID code, we can even use a simple record to describe all permissions a user has on the entire content. Of course, the premise of doing so is to limit the small amount of content. Otherwise, the Npower of 2 is increasing, but the number is amazing and it is not easy to parse.

On the surface, the above method is sufficient to achieve the purpose of implementing functions, simplifying database design, and implementing complexity. However, this method has some disadvantages, the list of permissions involved is not independent of each other, but dependent on each other. For example, modifying permissions actually includes browsing permissions. For example, we may simply set the user's access permission to the database and table to input, modify, and delete (1 + 4 + 8 = 13), but in fact, this user has (1 + 2 + 4 + 8 = 15) permissions, that is, in this solution, 13 = 15. Therefore, when we call an API to check whether a user has browsing permission, we must determine whether the user has the permission to modify the data table. Therefore, if the inclusion relationship between permissions cannot be fixed in the program, the application interface cannot be used for simple judgment. But this is "fully scalable" with our goal
Conflict.

How can this problem be solved? I think of another way to set the ID code, that is, using prime numbers. We may set the basic flag codes for entry, browsing, modification, deletion, and execution to 2, 3, 5, 7, and 11. When the permissions are mutually included, we set its identifier code to the product of two or more basic tokens. For example, we can set the identifier code of the "modify" function to 3*5 = 15, then, all permissions are multiplied to obtain the final permission id value we need. In this way, we only need to break the final value into a quality factor when asking whether the user has a certain permission. For example, we can define that a user has the permission to enter, modify, and delete a database and table as 2*15*7 = 2*3*5*7, that is, this user has the permission to enter, browse, modify, and delete the database and table.

Of course, the premise for using the above method for the permission list is that the number of records in the permission list is not too large and the relationship is not very complex. Otherwise, simply parsing the permission Code requires the machine to be fooled for half a night :)

I hope the above analysis is correct and effective (in fact, I also use these methods in more than one system), but in any case, I think permission management is implemented in this way, it is difficult to implement the database design and application interface. Therefore, I urge the comrades who have experience in similar design and implementation to put forward constructive comments and suggestions for modification.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.