Rdiframework.net━. NET rapid Information System Development Framework V3.2->winform version New role Authorization management interface more efficient, more standardized

Source: Internet
Author: User

The role authorization Management module focuses on setting the appropriate permissions for the role. In the Role Rights Management module, an administrator can add or remove users who are included in a specified role, access rights to modules (menus) that can be assigned or granted a specified role, actions (functions) permissions that can be reclaimed or assigned to a specified role, all roles, users, modules (menus), The operation (function) Permission is centralized batch setting, the setting of the Role user authorization scope (similar to the setting of users authorization scope), the setting of the table field permission, and the setting of the permissions of the constraint condition.

In the role authorization Management module, you can assign and retract the assigned roles, add and remove the users owned by the role, centralize batch settings such as the functions owned by the role, the module access rights, etc.

Role authorization management starting from the 3.2 version of the new interface to organize the way, more reasonable and fast, subversion of all previous versions, operability greatly improved, the choice of modules to the subsystem to load, the operation of the module is also a module of the choice of dynamic loading, only set the access rights of the module can set its corresponding module operation rights, for The load speed and handling flexibility of large systems is beyond doubt.

The role authority manages the main interface as shown in:

Under the role authorization Management Role permission settings, Role User Association, role user centralized batch settings, role authorization range settings, table field permission settings, constraints permission settings, etc. are explained separately.

1 , role permission settings

The role permission settings can centrally set the module (menu) Access permissions for the currently selected role, and the permissions that are available, which is a feature that is often used in permission settings. The role permission settings are as shown. In the "Role permission Settings" screen, we can easily clear the current role has all the permissions, but also to the module and Operation permissions settings.

In the role of the permissions settings interface, the entire interface adopted a new layout, the top is the business System selection drop-down list, here is a list of all subsystems to choose from, select a subsystem, the following will show the current subsystem all the modules list. Select the check box in front of the corresponding module to give the current module access to the permissions, select a module to the right will list all the current module Operation permission Item list, similarly to grant an action permission entry, just select the previous check box, cancel the permission only need to cancel the check box selection. The check box on the right can be manipulated as long as the checkbox to its corresponding module on the left is selected. Otherwise the gray is not selectable, such as:

2 , Role User Association

Role user affinity can be easily added and removed by the user of the current selection role, and the user belongs to a role, which means that the user "inherits" all the permissions that the role has. The role User Association is shown. On the Role Association interface, we can add available users to the current role, or remove users who already have them.

In the Role User Association window, you can see the user that is owned by the current role, a user who no longer belongs to this role, you can remove the user, or you can add a valid user to this role so that it inherits all the permissions that this role has. Click "Add User" to open the "User Selection" dialog box to make the user's choice, as shown in:

In the user selection interface you can press the control key to make multiple selections, otherwise, select a good user and click the Select button to add our selected users to the current role. If there are too many users, we can also make fuzzy queries or show them by role categories, as shown in:

3 , role user centralized batch setup

The role user set in bulk settings can be batched in one interface for all roles or to retract the users that they contain, and the role user sets the batch settings as shown in.


4 , role authorization range settings

The role authorization scope setting can implement the authorization redistribution very well, for the big group enterprise can obviously reduce the burden and the pressure of the Administrator privilege assignment, the role authorization scope can be assigned to other operators again selectively under the permission of the current role. Popular point is that some of the people who work on the job is the administrator, but not all business administrators, just a business area of the administrator, he should have all the authority in this business area, but also can entrust others to manage, can authorize others to manage a business, this is the role of authorization scope management, Similar to the Cascade authorization in database permissions, the role authorization scope is as shown.

Below we set the appropriate module-wide access permissions to the role "System Configurator", as shown in.

In our role "System Configurator" set the "System Management" module under the scope of access permissions, as shown below, we use "System Configurator" the user "Roting-tyluo" to log in to the system to see the scope of the modules they can access as shown, has been displayed correctly according to our settings results.

A lot of use, such as a large group of systems containing a lot of subsystems, developed by different development teams, so that we can assign to different development teams in the framework of their own module scope by themselves to manage, reduce the pressure of management staff. And so on, there are many other similar applications that can be easily implemented.

5 , table field permission settings

In some applications, we sometimes need to set their access to specific tables, access to columns, and edit permissions for different roles. In table field permission settings, we can set the data tables that the role can access, as well as access, edit, and deny access to the data table columns. The table field permissions for the role are set as shown in.

In the table field Permission Settings window, the data table listed on the left, select to have access to the table, cancel will deny access to the table, and the table corresponding to the column access, edit, deny access rights are also canceled synchronously. If the data tables we need are not listed on the left, you can set them through the Set Permissions Control Table feature in table field management.

6 , constraint permission settings

The role constraint setting is to set the conditions for different roles to see the data for a data table, and here we are the constraints where the role's constraints on the table are set as shown. In the table Constraints window, we can set the constraint expression for the current role's selected table, delete the constraint expression, and export all the table constraint detail data in the current role into Excel.

We set the selected role "System Configurator" to the data table "Product information sheet" constraints are "productprice> andproductcategory= ' software products '", in the Conditional Expression Settings window, we set the constraints, We can also verify that we set the constraint expression to meet the requirements, but also to see the selected role under the constraints set by the table to see the data (by looking at the constrained data set), set up, you can call our interface to do the corresponding data control, the constraint Settings window as shown.

For the set expression we can also verify that it is correct, or you can view the constrained dataset as shown.

7 , Advanced Search

Fast searching becomes very important when there are too many characters, and in the role authorization range, we can either enter a role number or role name to blur all the roles, or you can query all the roles under the category by the role category. Blur the query by "role number" or "role name" as shown in the two figure below.

Related articles:

rdiframework Platform Code generator V3.2 release version

rdiframework.net-based on. NET rapid Information System development Framework-Series catalogue

Rdiframework.net━.net Rapid Information System Development framework- Introduction to Workflow Components

Rdiframework.net━. NET rapid Information System Development Framework v3.2-> Web version New User Rights setting interface more efficient, more standardized
Rdiframework.net━. NET rapid Information System Development Framework V3.2->winform version New User Rights setting interface more efficient, more standardized

Rdiframework.net━. NET rapid Information System Development Framework V3.2->web version New role Authorization management interface more efficient, more standardized

  

For a few years, thanks to the supporters and users of the rdiframework.net framework, you can find out more at the address below.

rdiframework.net official website:http://www.rdiframework.net/

rdiframework.net Official blog:http://blog.rdiframework.net/

At the same time need to be explained, all the technical articles in the future to the official website as the subject, welcome to our collection!

rdiframework.net Framework by the professional team for a long time to build, has been updated, has been upgrading, please rest assured that use!

Welcome to Rdiframework.net Framework Official public (No.:rdiframework-net), keep abreast of the latest developments.

Scan QR code for immediate attention

Rdiframework.net━. NET rapid Information System Development Framework V3.2->winform version New role Authorization management interface more efficient, more standardized

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.