RDIFramework. NET. NET quick information system development framework) Web version Introduction
B/S structure Browser/Server, Browser/Server mode), is a kind of network structure mode after the rise of WEB, WEB Browser is the main application software of the client. This mode unifies the client and focuses the core components of system functions on the server, simplifying system development, maintenance, and usage. Only one Browser is installed on the client), such as Netscape Navigator or Internet Explorer. The Server installs Oracle, Sybase, Informix, SQL Server, and other databases. The browser interacts with the database through the Web Server. This greatly simplifies the Client Computer load, reduces the cost and workload of system maintenance and upgrade, and reduces the overall cost (TCO) of users ). Compared with the WinForm structure, the B/S structure has the biggest advantage in that it can be operated anywhere without installing any specialized software. Only one computer that can access the Internet can be used, and the client has no maintenance. The scalability of the system is very easy to use as long as you can access the Internet. Of course, the B/S structure is also insufficient compared with WinForm, for example, the B/S architecture is weaker than the CS architecture in terms of graphic performance and running speed. Another critical weakness is that it is restricted by the running environment. Because the B/S architecture depends on the browser, and the browser has a wide variety of versions, the core architecture of many browsers is also very different, resulting in a great impact on web page compatibility, especially in CSS layout, the execution of JAVASCRIPT scripts has a great impact, and the running efficiency of the B/S structure is not as high as that of the WinForm structure.
RDIFramework. NET. NET rapid information system development and integration framework) not only supports the development of powerful WinForm structures, but also supports the development of B/S structures synchronously, the core of the framework used remains unchanged.We strongly recommend that you checkB/SBefore introducing the version, read the previous chapters about the framework.WinFormBecauseWeb VersionAnd WinForm..The following shows the Web version of the framework one by one. You will find that the Web version of the Framework is basically the same as that of the WinForm version. Many users are concerned about the compatibility of Web browsers. Here I can tell you that the Web version of the framework has been strictly tested during development, and the compatibility of mainstream browsers is good, you can use it with peace of mind.
8.1 Web configuration, logon, and main interface
The Web Version configuration is quite simple. The configuration items are written on the Web. in the config file, you can refer to the Config. description of the xml file. The meaning of each configuration item is as follows.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5C63-0.png "alt =" "/>
For details about how to deploy RDIFramework. NET on IIS, see related articles.) enter the logon interface, as shown in:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K525K-1.png "alt =" "/>
Enter the correct user name and password. By default, the super Administrator user name and password are the same: Administrator), and then enter the main interface, as shown in:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5JL-2.png "alt =" "/>
The navigation menu on the left side of the main interface, and the workspace on the right side. Select the corresponding navigation items from the navigation menu on the left side to open the corresponding function list. In the workspace on the right, you can right-click the page to close the page.
8.2 employee management
Employees) management mainly refers to the management of employees within the group, enterprises and institutions. Includes the following functions: add employees, modify employees, delete employee data, export data, and move employees. Main Interface of employee management
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5C55-3.png "alt =" "/>
1. Add employees.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51239-4.png "alt =" "/>
Ii. Employee staff) modification.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5AL-5.png "alt =" "/>
3. Delete employees.
4. Employees) move.
5. Employees) export data.
8.3 user management
The user management module manages users that can log on to the system. Subsequent work, such as user roles, permission assignment, corresponding functional modules of users, and permission assignment of various business systems, is based on this. The main operations of user management include adding users, modifying users, deleting users, setting users' default roles, setting user passwords, setting user validity, and exporting user data. Shows the main user management interface:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52U7-6.png "alt =" "/>
1. Add a user.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51W6-7.png "alt =" "/>
2. User modification.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K53K1-8.png "alt =" "/>
3. Set the user password.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52614-9.png "alt =" "/>
4. delete a user.
5. Export user data.
8.4 role management
The role management module facilitates the allocation of framework permissions, improves the efficiency of permission allocation, and reduces the workload of repeatedly setting permissions. Role user group) The management module allows operators to flexibly configure roles or user groups contained in the entire framework. Note: Here I propose the concept of user groups. Some commercial users will not separately set the "user group" function module during use, roles are also a grouping method, and user groups are also a grouping method. To avoid complexity, this Framework stipulates that roles are used to group corresponding users in a unified manner. Of course, roles are also classified, we strongly recommend that you use the access system to properly plan and classify roles to avoid confusion in the future ). The "role management" function modules mainly include: the entire framework has the operation permissions/module menus of those roles, users of the corresponding roles, and roles, and sorts, adds, modifies, and deletes roles, search for roles and perform other operations on the role management page.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52518-10.png "alt =" "/>
I,Add a role.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5E19-11.png "alt =" "/>
II,Modify the role.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5BF-12.png "alt =" "/>
III,Role user settings.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5G46-13.png "alt =" "/>
In, you can add, remove, and clear users in the current role.
Select Add to open the "Select User" window, as shown in:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K512W-14.png "alt =" "/>
IV,Delete a role.
8.5 Organization Management
The organization management module provides intuitive and convenient organization management, and displays the organization systems of units and departments in a tree structure, you can add, modify, delete, or move the organizational unit as needed. Shows the organizational unit management interface:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K53b5-15.png "alt =" "/>
I,Add organization.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52b5-16.png "alt =" "/>
II,Organization modification.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5B30-17.png "alt =" "/>
III,User-Organization) permission settings.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54645-18.png "alt =" "/>
IV,Role-Organization) permission settings.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K53356-19.png "alt =" "/>
V,Delete organization data.
VI,Organization data export.
8.6 module menu) Management
Module menu) management is the core of the entire framework. It is mainly intended for system administrators and developers. It is recommended that you do not grant the permission to access this module to common users, to avoid unnecessary errors affecting the operation of the entire framework. The functional modules shown in the framework are configured here, And the configuration information is saved in the database. Module menu) management is mainly used to add, modify, and delete functional modules of the entire framework, move and merge modules, enable and disable modules, and set whether the modules are public modules, assign the role and user's Module Access Permissions, set Module visibility, and so on, module menu) The management main interface is shown in:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5BD-20.png "alt =" "/>
1. Add modules.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K56049-21.png "alt =" "/>
On the Right of the icon, you can select the icon of this module, as shown in:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54a2-22.png "alt =" "/>
Ii. module menu.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51452-23.png "alt =" "/>
Iii. User module menu) Set permissions in batches.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K55A6-24.png "alt =" "/>
Iv. Role module menu) Set permissions in batches.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K56038-25.png "alt =" "/>
5. module menu) configuration.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51252-26.png "alt =" "/>
8.7 operation permission management
With the development of economic globalization and the intensification of competition between enterprises, enterprises' requirements for management are constantly changing and increasing. More and more information shows that permission management must develop in a finer and deeper direction, the purpose is to give full play to the supervision function, separate and restrict incompatible resources, supervise and restrict important matters, and emphasize the requirements of refined management. The operation permission management module is the core of framework permission control and runs through the entire framework application. The operation permissions here cannot be simply understood as some common addition, deletion, modification, and query operations, and should be further analyzed and mined. For example, you can access the framework, access, edit, delete, deny access to certain columns, and manage framework resources. When developing a system, it is impossible to abstract these permissions completely at once. This is a step-by-step process. Reasonable permission granularity abstraction makes it easier for later management. Shows the main interface for permission management:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K53432-27.png "alt =" "/>
1. Add operation permission items.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54147-28.png "alt =" "/>
2. Modify operation permission items.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K55041-29.png "alt =" "/>
3. Batch set user operation permissions.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52639-30.png "alt =" "/>
4. Set permissions for role operations in batches.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51919-31.png "alt =" "/>
8.8 user permission management
In practical applications, we will find that permission control changes frequently. For example, to adjust the role allocation, You need to revoke and grant some roles and modules that can be accessed by users) if you do not have a flexible and reliable configuration management tool, permission control becomes very troublesome. The user permission management module is developed to facilitate centralized and unified management of users and role permissions. In the user permission management module, the operator can add or move a user to a specified role, and assign or grant a specified user a module menu) permissions, permissions that can be revoked or assigned to a specified user) permissions, permissions that can be set for all users, roles, module menus, and operation functions, user-authorized settings, table field permissions, and Table constraint conditions. Shows the user permission management interface:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51639-32.png "alt =" "/>
1. Set user permissions.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54M2-33.png "alt =" "/>
2. User Role Association.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51Z7-34.png "alt =" "/>
3. Set User Roles in batches in a centralized manner.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51A4-35.png "alt =" "/>
3. Set User Permissions in batches.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52X4-36.png "alt =" "/>
8.9 role permission management
The role permission management module sets the permissions of a role in a centralized manner. In the role permission management module, the administrator can add or remove users included in a specified role, and can assign or assign a specified role to a module menu) permissions, permissions, permissions for all roles, users, module menus, and operation functions, user authorization scope settings are similar to user authorization scope settings), table field permission settings, and table constraints permission settings. Shows the main page of role permission management:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K55608-37.png "alt =" "/>
1. Set role permissions.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5M53-38.png "alt =" "/>
2. Role-User Association.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54253-39.png "alt =" "/>
3. Set roles and users in batches in a centralized manner.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K55018-40.png "alt =" "/>
4. Configure role permissions in batches.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54221-41.png "alt =" "/>
8.10 data dictionary management
The data dictionary module manages the data dictionary required by the framework, that is, the option data. The entire data dictionary data is shared by the framework, the operator can flexibly control the optional data in the entire framework, mainly list data in the drop-down box ). Improve data reuse and accelerate the development efficiency of new projects. Shows the data dictionary management interface:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K53948-42.png "alt =" "/>
1. Add a dictionary category.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K56135-43.png "alt =" "/>
2. Modify the dictionary category.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54X5-44.png "alt =" "/>
3. delete a dictionary category.
4. Details of new options.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54R0-45.png "alt =" "/>
5. Edit option details.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52X7-46.png "alt =" "/>
6. delete option details.
8.11 table Field Management
Table fields) the main function of the comprehensive management module is to control the fields of the table itself. The main interface for table field management is shown in:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K51027-47.png "alt =" "/>
8.12 system logs and exception management
When a software is put into operation, it is impossible to have no exceptions. If any exceptions occur in the software, we can track them in time to solve the exceptions, avoid exceptions from happening again. There are two types of exceptions: client exceptions and server exceptions. Exceptions on the client are usually popped up in a timely manner. You can view the exceptions and send them to us. Exceptions generated by the server are automatically recorded in the database. The administrator can view the exceptions in the framework.
Framework log management plays an important role in the security audit of the Framework. User Login and logout, Module Access, service calling, and function operations should all be recorded, it is also convenient for management personnel to view the usage of the entire system, so that abnormal use problems can be handled even.
Main Log Management Interface
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54a0-48.png "alt =" "/>
Log details
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52218-49.png "alt =" "/>
Main Interface for system Exception management
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K5JQ-50.png "alt =" "/>
Exception details
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52633-51.png "alt =" "/>
8.13 database connection management
We often see that many software directly put the database connection string in the configuration file under the software execution directory, which directly places the database connection string regardless of encryption or not) on the client is not safe. In our framework, we can mount countless different types of databases and store these connection strings in the database through special processing, front-end developers only need to call the corresponding database access interface. It is extremely convenient to change the database server address. shows the main interface for database connection management. All database connections are determined by the "connection name.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K52M3-52.png "alt =" "/>
1. New database connections.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131229/124K53a2-53.png "alt =" "/>
1. Modify the database connection.
650) this. width = 650; "style =" display: block; margin-left: auto; margin-right: auto; "src =" http://www.bkjia.com/uploads/allimg/131229/124K54W8-54.png "alt =" "/>
Welcome to the Group for communication:
. NET Framework exchange group:16653241
Database Exchange Group:190401986
Discussion Group on software development technology:5682891