Rdiframework.net━. NET rapid Information System Development Framework v3.2-> new User Rights settings interface for Web version

Source: Internet
Author: User

In the actual application we will find that the rights control will change frequently, such as: need to adjust the role of the allocation, need to reclaim and grant some roles, the user can access the module (menu) and the corresponding operation permissions, need to add to certain roles and remove the corresponding user, etc. Without a flexible and reliable configuration management tool, permissions control can become cumbersome. User Authorization Management module is a module developed to facilitate centralized and unified management of user and role privileges. In the user authorization management module, the operator can add or move users to a specified role, can assign or grant access rights to a specified user's module (menu), can reclaim or assign action (function) permissions for a specified user, and can set bulk settings for all users, roles, modules (menus), Actions (functions) permissions, Settings within the scope of User authorization, table field permission settings, and the setting of the constraint permissions for tables.

User authorization management from the beginning of the 3.2 version to enable the new interface organization, more reasonable and fast, subversion of all previous versions, operability greatly improved, the module selection to the subsystem to load, the module's Operation permission is also the choice of the module dynamic loading, only set the module's access rights can set its corresponding module operation rights, for The load speed and handling flexibility of large systems is beyond doubt.

User authorization manages the main interface as shown in:

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701094833008-586456238. PNG "style=" border:0px; "/>

The following is a web version of user authorization management of all the features, including: User rights settings, User Role Association, User role set batch settings, user authorization Range Settings, table field permission settings, constraints permission settings, advanced search, lock users, unlock users.

1 , User rights settings

User rights settings can centrally set the currently selected user's module (menu) Access rights, the permissions to operate, is a feature that is often used in permission settings. The user rights settings are as shown. In the "User Rights settings" screen, we can easily clear the current user has all the rights, you can also set the module and Operation permissions.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701094908321-1015111451. PNG "style=" border:0px; "/>

in the User Rights settings interface, the entire interface adopted a new layout, the top is the business System selection drop-down list, here is a list of all subsystems to choose from, select a subsystem, the following will show the current subsystem all the modules list. Select the check box in front of the corresponding module to give the current module access to the permissions, select a module to the right will list all the current module Operation permission Item list, similarly to grant an action permission entry, just select the previous check box, cancel the permission only need to cancel the check box selection. The check box on the right can be manipulated as long as the checkbox to its corresponding module on the left is selected. Otherwise the gray is not selectable, such as:

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701095326102-998021863. PNG "style=" border:0px; "/>

2. User Role Association

User role associations can be easily added and removed from the role that the currently selected user belongs to, and the user is assigned to a role, which means that the user "inherits" all the permissions that the role has. The user role is associated as shown. On the User Role association operator interface, we can add available roles for the current user, or remove roles already owned.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701095348024-1998373467. PNG "style=" border:0px; "/>

3 , user role set in bulk

The batch settings in the user role set can be used to grant or retract the appropriate roles to all valid login users in one operation interface, user-friendly operations, and the batch settings in the users role set as shown.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701095359305-972114390. PNG "style=" border:0px; "/>

4 , user authorization range settings

The user authorization scope setting can realize the authorization redistribution very well, for the big group enterprise can obviously reduce the burden and the pressure which the administrator authority allocates, the user authorization scope may in the current user own permission, again has the choice assigns to other operators. Popular point is that some of the people who work on the job is the administrator, but not all business administrators, just a business area of the administrator, he should have all the authority in this business area, but also can entrust others to manage, can authorize others to manage a business, this is the user authorization scope management, Similar to the Cascade authorization in database permissions, the user authorization scope is as shown.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701095712961-1621254302.png "style=" border:0px; "/>

in the Users and Roles tabs, the action user can set the user and role that the currently selected user can authorize and click the Save button to make the settings effective. For the "organization", "Module (menu)", "assignable operations (function) Permissions" Three tabs, we can right-click, in the Popup shortcut menu to select the appropriate function to operate, as shown in: 650) this.width=650; "Src=" http ://images2015.cnblogs.com/blog/157572/201707/157572-20170701095720618-228115461.png "style=" border:0px; "/>

5 , table field permission settings

in some applications, we sometimes need to set their access to specific tables, access to columns, and edit permissions for different logged-in users. In table field permission settings, we can set the data tables that users can access, as well as access, edit, and deny access to data table columns. The User's table field permission is set as shown in. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701095756899-1617229816.png "style=" border:0px; "/>

in the table field Permission Settings window, the data table listed on the left, select to have access to the table, cancel will deny access to the table, and the table corresponding to the column access, edit, deny access rights are also canceled synchronously. If the data tables we need are not listed on the left, you can set them through the Set Permissions Control Table feature in table field management.  

6 , constraint permission settings

sometimes we need to set the conditions for different users to see the data for a data table, and here we are the constraints, as shown in the user's table constraint settings. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701095832055-1213221331.png "style=" border:0px; "/>

In, we set the selected user "Chen Junxi" to the Data Table "Module (menu) Table" constraint is "ENABLED = 1", in the development process, through our service interface to get this constraint expression, the corresponding user can be the table data constraints control.

to set constraints on the corresponding data table, we can click the Set conditional expression button to make the selected table set the currently selected user constraint, as shown in. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701095843227-504244169.png "style=" border:0px; "/>

7 , Advanced Search

when the user is too many, fast search becomes very important, in the "User Rights Management" main interface click the "Search" button to open the framework of the Advanced Query dialog box for multi-condition data query as shown: 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701095851227-1824724172.png "style=" border:0px; "/>

8 , lock users

when a user needs to be restricted from logging in, we can lock the user for a period of time (the length of the lock can be set by configuring the variable: passworderrorlockcycle, which is 30 minutes by default) before allowing it to log in and lock the user as shown: 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701095911993-1805334345.png "style=" border:0px; "/>

After the lock succeeds as shown:

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701095929852-865716362. PNG "style=" border:0px; "/>

for the locked user, the user cannot log in, as the next user who is locked in the login will be prompted to "login account is locked." 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701095941274-2085646996.png "style=" border:0px; "/>

9 , unlock users

If you need to manually unlock the user, you can select the corresponding user, and then click the "Unlock User" button under the Toolbar Access control drop-down. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701100006383-244200125.png "style=" border:0px; "/>

Related articles:

rdiframework Platform Code generator V3.2 release version

rdiframework.net-based on. NET rapid Information System development Framework-Series catalogue

Rdiframework.net━.net Rapid Information System Development framework- Introduction to Workflow Components

For a few years, thanks to the supporters and users of the rdiframework.net framework, you can find out more at the address below.

rdiframework.net official website:http://www.rdiframework.net/

rdiframework.net Official blog:http://blog.rdiframework.net/

At the same time need to be explained, all the technical articles in the future to the official website as the subject, welcome to our collection!

rdiframework.net Framework by the professional team for a long time to build, has been updated, has been upgrading, please rest assured that use!

Welcome to Rdiframework.net Framework Official public (No.:rdiframework-net), keep abreast of the latest developments.

Scan QR code for immediate attention

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201610/157572-20161008152933504-462402858. PNG "style=" border:0px; "/>


This article is from the "Rapid Information System Development Framework" blog, please be sure to keep this source http://chinahuyong.blog.51cto.com/2721990/1943627

Rdiframework.net━. NET rapid Information System Development Framework v3.2-> new User Rights settings interface for Web version

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.