Rdiframework.net━. NET rapid Information System Development Framework V3.2->web version New role Authorization management interface more efficient, more standardized

Source: Internet
Author: User

The role authorization Management module focuses on setting the appropriate permissions for the role. In the Role Rights Management module, an administrator can add or remove users who are included in a specified role, access rights to modules (menus) that can be assigned or granted a specified role, actions (functions) permissions that can be reclaimed or assigned to a specified role, all roles, users, modules (menus), The operation (function) Permission is centralized batch setting, the setting of the Role user authorization scope (similar to the setting of users authorization scope), the setting of the table field permission, and the setting of the permissions of the constraint condition.

Role authorization management starting from the 3.2 version of the new interface to organize the way, more reasonable and fast, subversion of all previous versions, operability greatly improved, the choice of modules to the subsystem to load, the operation of the module is also a module of the choice of dynamic loading, only set the access rights of the module can set its corresponding module operation rights, for The load speed and handling flexibility of large systems is beyond doubt.

The role authority manages the main interface as shown in:

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105330827?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" Border:none;height:auto; "/>

The following is a description of all the features of the Web Edition role authorization management, including: Role permissions settings, role associated users, role user centralized batch settings, role authorization range settings, table field permission settings, constraints permission settings, Advanced search.

1. Role Permissions Settings

The role permission settings can centrally set the module (menu) Access permissions for the currently selected role, and the permissions that are available, which is a feature that is often used in permission settings. The role permission settings are as shown. In the "Role permission Settings" screen, we can easily clear the current role has all the permissions, but also to the module and Operation permissions settings.

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105408075?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

In the role of the permissions settings interface, the entire interface adopted a new layout, the top is the business System selection drop-down list, here is a list of all subsystems to choose from, select a subsystem, the following will show the current subsystem all the modules list. Select the check box in front of the corresponding module to give the current module access to the permissions, select a module to the right will list all the current module Operation permission Item list, similarly to grant an action permission entry, just select the previous check box, cancel the permission only need to cancel the check box selection. The check box on the right can be manipulated as long as the checkbox to its corresponding module on the left is selected. Otherwise the gray is not selectable, such as:

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105421138?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

2. Role User Association

Role user affinity can be easily added and removed by the user of the current selection role, and the user belongs to a role, which means that the user "inherits" all the permissions that the role has. The role User Association is shown. On the Role Association interface, we can add available users to the current role, or remove users who already have them.

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105434600?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

3, Role user centralized batch setup

The role user set in bulk settings can be batched in one interface for all roles or to retract the users that they contain, and the role user sets the batch settings as shown in.

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105449807?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

4. Role Authorization Range Settings

The role authorization scope setting can implement the authorization redistribution very well, for the big group enterprise can obviously reduce the burden and the pressure of the Administrator privilege assignment, the role authorization scope can be assigned to other operators again selectively under the permission of the current role. Popular point is that some of the people who work on the job is the administrator, but not all business administrators, just a business area of the administrator, he should have all the authority in this business area, but also can entrust others to manage, can authorize others to manage a business, this is the role of authorization scope management, Similar to the Cascade authorization in database permissions, the role authorization scope is as shown.

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105540911?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

In the Users and Roles tabs, the action user can set the user and role to be authorized by the currently selected role and click the Save button to make the settings effective. For the Organization, module (menu) Two tabs, we can do this by right-clicking and selecting the appropriate function in the popup shortcut menu, as shown in:

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105551449?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

5. Table field permission settings

In some applications, we sometimes need to set their access to specific tables, access to columns, and edit permissions for different roles. In table field permission settings, we can set the data tables that the role can access, as well as access, edit, and deny access to the data table columns. The table field permissions for the role are set as shown in.

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105611589?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

In the table field Permission Settings window, the data table listed on the left, select to have access to the table, cancel will deny access to the table, and the table corresponding to the column access, edit, deny access rights are also canceled synchronously. If the data tables we need are not listed on the left, you can set them through the Set Permissions Control Table feature in table field management.

6. Restriction permission Setting

Sometimes we need to set the conditions for different roles to see the data for a data table, and here we are the constraints, which are shown under the table constraint setting.

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105625941?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

In, we set the selected role "System Configurator" to the data table "role table" constraint is "CATEGORY = ' systemrole '", in the development process, through our service interface to get this constraint expression, the corresponding user can be controlled by the table data constraints.

To set constraints on the corresponding data table, we can click the Set conditional expression button to make the selected table set the currently selected user constraint, as shown in.

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105637785?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>

7. Advanced Search

Fast search becomes very important when you have too many characters, and you can open the query for multi-criteria data in the Advanced Query dialog box of the framework by clicking the Search button in the role Authorization management Main interface:

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105647663?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" Border:none;height:auto; "/>


related articles:



rdiframework Platform Code generator V3.2 release version

rdiframework.net-based on. NET rapid Information System development Framework-Series catalogue

Rdiframework.net━.net Rapid Information System Development framework- Introduction to Workflow Components

Rdiframework.net━. NET rapid Information System Development Framework v3.2-> Web version New User Rights setting interface more efficient, more standardized

Rdiframework.net━. NET rapid Information System Development Framework V3.2->winform version New User Rights setting interface more efficient, more standardized

For a few years, thanks to the supporters and users of the rdiframework.net framework, you can find out more at the address below.

rdiframework.net official website:http://www.rdiframework.net/

rdiframework.net Official blog:http://blog.rdiframework.net/

At the same time need to be explained, all the technical articles in the future to the official website as the subject, welcome to our collection!

rdiframework.net Framework by the professional team for a long time to build, has been updated, has been upgrading, please rest assured that use!

Welcome to Rdiframework.net Framework Official public (No.:rdiframework-net), keep abreast of the latest developments.

Scan QR code for immediate attention

650) this.width=650; "Src=" http://img.blog.csdn.net/20170731105813955?watermark/2/text/ ahr0cdovl2jsb2cuy3nkbi5uzxqvy2hpbmfodxlvbmc=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70/gravity/ Center "style=" border:none; "/>


This article is from the "Rapid Information System Development Framework" blog, please be sure to keep this source http://chinahuyong.blog.51cto.com/2721990/1952275

Rdiframework.net━. NET rapid Information System Development Framework V3.2->web version New role Authorization management interface more efficient, more standardized

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.