The 1th Chapter overview of the course and the introduction of the Rights management system
1-1 Why enterprise-level projects require rights management
1-2 what is the core of Rights management?
1-3 What should be the right management in an ideal?
1-4 What are the mainstream open source rights management frameworks?
1-5 1-6 Introduction to the course arrangement and knowledge points
2nd Chapter Spring Security Authority framework Learning and Walkthrough
2-1 Spring security Rights Management Framework Introduction
2-2 Spring Security Common Rights interceptor explained
2-3 Spring Security Database Management explained
2-4 Spring Security Permission Cache explanation
2-5 Spring Security Custom decision-making explanation
2-6 rapid construction and verification of springsecurity environment based on Springboot
2-7 Springboot Common Annotations Explained
2-8 case practice based on springsecurity Rights management
2-9 springsecurity Rights Management Framework Summary
3rd. Apache Shiro Permission Framework Learning and Walkthrough
3-1 Apache Shiro Rights Management Framework Introduction
3-2 Apache Shiro Identity Certification explained
3-3 Apache Shiro Authorized explanation
3-4 Apache Shiro Permission interception explained
3-5 Apache Shiro Session Management explained
3-6 Apache Shiro Permissions Cache explained
3-7 Springboot-based Apache Shiro Environment Fast setup and configuration real operation
3-8 based on Springboot connection database and configuration MyBatis real
3-9 based on Apache Shiro Rights Management Case real Exercise-1
3-10 based on Apache Shiro Rights Management Case real Exercise-2
3-11 based on Apache Shiro Rights Management Case real Exercise-3
3-12+apache+shiro Rights Management Framework Summary
The 4th chapter of the Authority Management system core table design
4-1 Why should I develop a set of rights management system?
4-2 What kind of authority management system should we develop?
4-3 Departmental table Design
4-4 User table Design
4-5 Permissions Module table design
4-6 Permission table Design
4-7 Character table Design
4-8 roles-User, role-Permission Association table design
4-9 permissions-related log table design
4-10 Data Sheet design specifications and summary
5th Chapter Spring MVC Development Environment Construction and configuration
5-1 Spring MVC development Environment to build-pom.xml configuration
5-2 Spring MVC development Environment to build-web.xml configuration
5-3 Spring MVC development Environment to build-spring-servlet.xml configuration
5-4 Spring MVC development Environment to build-applicationcontext.xml configuration
5-5 Spring MVC development Environment to build-DRUID configuration
5-6 SPRINGMVC development environment to build-mybatis-config.xml configuration
5-7 SPRINGMVC development environment to build-logback.xml configuration
5-8 SPRINGMVC Development Environment validation
The 6th chapter of project Preparation and core auxiliary tools development
6-1 Core class Generation-mybatis Generator
6-2 Project Interface Definition-json,page
6-3 interface Request Global exception handling-design and validation
6-4 Calibration Tool-beanvalidator Development
6-5 JSON conversion Tool-jsonmapper development
6-6 Get Spring Context tool-applicationcontexthelper development
6-7 HTTP request before and after monitoring tool-httpinterceptor development
7th Chapter development of departmental modules
7-1 New Department Interface Development
7-2 sector-level tree interface development
7-3 Update Department Interface Development
7-4 new Department, departmental hierarchy tree, updated departmental interface self-test
7-5 basic architecture development of departmental list interface
7-6 Department list tree Type structure interface development
7-7 Department list interactive function development (new department, delete Department, update department)-1
7-8 Department list interactive function development (new department, delete Department, update department)-2
7-9 Department list interactive function development (new department, delete Department, update department)-3
8th Chapter User Module Development
8-1 user Parameter Object Userparam written
8-2 new user Interface Development-1
8-3 new user Interface Development-2
8-4 User Login interface and interface development-1
8-5 User Login interface and interface Development-2
8-6 User Exit Interface development
8-7 List of page plug-in development
8-8 User Paged List development-1
8-9 User Paged List development-2
8-10 new users, editing user interface and interactive function development
8-11 Threadlocal,loginfilter enable interception of login requests
8-12 IP Get Tool class, introduction of sending mail tool class and code optimization
9th Chapter Rights Module Development
9-1 Permission Module Parameter Object Aclmoduleparam written
9-2 New rights Interface development
9-3 Update Permissions and sub-module interface development
9-4 Permissions Module Tree interface development
9-5 Permissions Module Interface rendering
9-6 Permissions Module Interface Interactive function implementation-1
9-7 Permissions Module Interface Interactive function implementation-2
10th chapter Development of Privilege Point module
10-1 Adding and updating the privilege point interface development
10-2 get permission point interface and interface development according to permission module-1
10-3 get permission point interface and interface development according to permission module-2
10-4 new permission point, edit permission Point interactive function implementation
11th Chapter Role Module Development
11-1 new, updated role interface development-1
11-2 new, updated role interface development-2
11-3 Role Module Interface development
11-4 Role Module Interactive function implementation
The 12th chapter of role Authority relationship development
12-1 Role Permissions tree Structure interface development-1
12-2 Role Permissions tree structure interface Development-2
12-3 Role Permissions tree structure interface Development-3
12-4 configuration of the role permission tree structure framework Ztree
12-5 role permission tree structure data acquisition
12-6 Role Permissions tree structure interface rendering and interactive function implementation-1
12-7 Role Permissions tree structure interface rendering and interactive function implementation-2
12-8 Role Permissions tree structure interface rendering and interactive function implementation-3
13th Chapter Role User Relationship Development
13-1 role Permissions and role user tab switching function implementation
13-2 role User Module interface development
13-3 role User Module interface development
13-4 Role User module interactive function implementation
14th Chapter RBAC Model Additional function development
14-1 Delete Department & delete permissions feature development
14-2 Getting user rights data
14-3 getting the user and role data for a permission point assignment
15th chapter of Rights interception module development
15-1 privilege Interception feature development-1
15-2 privilege interception feature development-2
15-3 privilege interception feature development-3
15-4 privilege interception feature development-4
16th chapter Rights Cache Module development (Redis distributed)
16-1 Redis Distributed cache Introduction and save cache function implementation
16-2 Updating the Redis cache feature implementation
16-3 Caching Scenario Analysis
16-4 Permissions caching feature implementation
17th Chapter development of privilege Operation record module
17-1 privilege Operation Record Module interface development
17-2 permissions operation record module interface self test
17-3 rights Operation Record module interface development-1
17-4 rights Operation Record module interface Development-2
17-5 Rights Operation record Module interactive function implementation-1
17-6 Rights Operation record Module interactive function implementation-2
The 18th chapter of the course summary
18-1 Course Summary
Link: https://pan.baidu.com/s/1pYVh_xIbWVJvaCx0v2WLEg Password: xxxx
Penguin Resource Group: 817504406
Java Development Enterprise level Rights Management System video tutorial