Rdiframework.net━. NET rapid Information System Development Framework V3.2->winform version New user Rights settings interface

Source: Internet
Author: User

In the actual application we will find that the rights control will change frequently, such as: need to adjust the role of the allocation, need to reclaim and grant some roles, the user can access the module (menu) and the corresponding operation permissions, need to add to certain roles and remove the corresponding user, etc. Without a flexible and reliable configuration management tool, permissions control can become cumbersome. User Authorization Management module is a module developed to facilitate centralized and unified management of user and role privileges. In the user authorization management module, the operator can add or move users to a specified role, can assign or grant access rights to a specified user's module (menu), can reclaim or assign action (function) permissions for a specified user, and can set bulk settings for all users, roles, modules (menus), Actions (functions) permissions, Settings within the scope of User authorization, table field permission settings, and the setting of the constraint permissions for tables.

User authorization management from the beginning of the 3.2 version to enable the new interface organization, more reasonable and fast, subversion of all previous versions, operability greatly improved, the module selection to the subsystem to load, the module's Operation permission is also the choice of the module dynamic loading, only set the module's access rights can set its corresponding module operation rights, for The load speed and handling flexibility of large systems is beyond doubt.

User authorization to manage the main interface as shown in: 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701103417961-1323324359.png "style=" border:0px; "/>

The following is the WinForm version of the user authorization management of all the features, mainly include: User rights settings, User Role Association, user role set in bulk settings, user authorization Range Settings, table field permission settings, constraints permission settings, lock users, unlock users.

1 , User rights settings

User rights settings can centrally set the current selected user's attribution role, module (menu) Access rights, the permissions to operate, is a feature that is often used in permission settings. The user rights settings are as shown. In the "User Rights settings" screen, we can easily clear the current user has all the rights, you can also set the module and Operation permissions. Select the check box to have the appropriate permissions, and deselect to reclaim its corresponding permissions.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701103715664-573055446. PNG "style=" border:0px; "/>

User Rights settings interface, the entire interface adopted a new layout, the top is the business System selection drop-down list, here is a list of all subsystems to choose from, select a subsystem, the following will show the current subsystem all the modules list. Select the check box in front of the corresponding module to give the current module access to the permissions, select a module to the right will list all the current module Operation permission Item list, similarly to grant an action permission entry, just select the previous check box, cancel the permission only need to cancel the check box selection. The check box on the right can be manipulated as long as the checkbox to its corresponding module on the left is selected. Otherwise the gray is not selectable, as shown in.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701103730696-1071898389. PNG "style=" border:0px; "/>

2 , User Role Association

User role associations can be easily added and removed from the role that the currently selected user belongs to, and the user is assigned to a role, which means that the user "inherits" all the permissions that the role has. The user role is associated as shown. On the User Role association operator interface, we can add available roles for the current user, remove roles already owned, and view access to modules (menus) owned by the currently selected role.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701103803368-325388990. PNG "style=" border:0px; "/>

Click the Add Roles button to open the Select Roles window and select the appropriate role to attach the selected role to the specified user. Select role as shown in. If you have too many roles, you can filter by role classification.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701103840993-1955190276. PNG "style=" border:0px; "/>

To remove a role just select the role you want to remove in the User Role Association window and click "Remove". It is necessary to note that the role is removed, and the user no longer has the appropriate module (menu) Access and the appropriate operation permissions for the role. It is important to note that the user default role cannot be removed here and needs to be modified by modifying the user to select the default role. On the User Role Association interface, we can also view the module (menu) Access that the selected role has, and provide the basis for making the right role assignments. As shown in the Role Module (menu) permissions.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701103930524-1945590490. PNG "style=" border:0px; "/>

3 , user role set in bulk

Click User Role affinity in the user authorization management main interface to open the Batch Setup window in the user role set. The batch settings in the user role set can be used to grant or retract the appropriate roles to all valid login users in one operation interface, user-friendly operations, and the batch settings in the users role set as shown. Clear role clears all roles owned by the currently selected user, and the copy role and paste roles feature buttons make it easy to set the role of the currently selected user to another role, avoiding the hassle of repeatedly clicking on the role and increasing the efficiency of the role assignment. When you click the appropriate user on the left, the role it belongs to is selected in the right-hand role list.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701104029914-195427362. PNG "style=" border:0px; "/>

4 , user authorization range settings

The user authorization scope setting can realize the authorization redistribution very well, for the big group enterprise can obviously reduce the burden and the pressure which the administrator authority allocates, the user authorization scope may in the current user own permission, again has the choice assigns to other operators. Popular point is that some of the people who work on the job is the administrator, but not all business administrators, just a business area of the administrator, he should have all the authority in this business area, but also can entrust others to manage, can authorize others to manage a business, this is the user authorization scope management, Similar to the Cascade authorization in database permissions, the user authorization scope is as shown.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701104059414-1800702003. PNG "style=" border:0px; "/>

Below we demonstrate the scope permissions, such as the organization-wide permissions granted by the current user "Van Guardian" as shown:

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701104202196-891761965. PNG "style=" border:0px; "/>

Below we open the Organization management module with "Van-fanwei" login framework, such as viewing the user's effect on the organization's licensing scope settings. You can see that the scope of the organization that the user "Van-fanwei" has access to is already within our limits, so that managers in different regions can manage their own organization without showing all the organization and scope of the authority.

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701104216055-1514648792. PNG "style=" border:0px; "/>

5 , table field permission settings

in some applications, we sometimes need to set their access to specific tables, access to columns, and edit permissions for different logged-in users. In table field permission settings, we can set the data tables that users can access, as well as access, edit, and deny access to data table columns. The User's table field permission is set as shown in. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104246649-260605488.png "style=" border:0px; "/>

in the table field Permission Settings window, the data table listed on the left, select to have access to the table, cancel will deny access to the table, and the table corresponding to the column access, edit, deny access rights are also canceled synchronously. If the data table we need is not listed on the left, you can set it up by "setting up a data table that requires Table permission control."  

6 , constraint permission settings

sometimes we need to set the conditions for different users to see the data in a data table, and here we are the constraints, and the user sets the table constraints as shown. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104404508-944721951.png "style=" border:0px; "/>

In, we set the selected user "Fanwei" to the data table "Product table" constraint is "productprice>500", in the development process, through our service interface to get this constraint expression, the corresponding user can be the table data constraints control.

to set constraints on the corresponding data table, we can click the Set Constraint Expression button to make the selected table set for the currently selected user constraint, as shown in. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104453414-1009126509.png "style=" border:0px; "/>

When set up, we can also verify that the constraint expression we set is compliant, as well as view the data that the selected user sees under constraints set by the table (by looking at the constrained dataset), as well as verifying that the expression we set conforms to the syntax requirements, as shown in. Once set up, we can call our interface to do the corresponding table data control. Click Export in the Table Constraints window to export the table constraints for the current user to Excel. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104511493-1039841937.png "style=" border:0px; "/>

We can also view the datasets under the constraints currently set, as shown in the View constrained Datasets window, and we can export the viewed datasets to Excel. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104553664-1412956201.png "style=" border:0px; "/>

7 , lock users

when a user needs to be restricted from logging in, we can lock the user for a period of time (the length of the lock can be set by configuring the variable: passworderrorlockcycle, which is 30 minutes by default) before allowing it to log in and lock the user as shown: 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104646539-1956801347.png "style=" border:0px; "/>

After the lock succeeds as shown:

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/157572-20170701104733930-749326482. PNG "style=" border:0px; "/>

For a locked user, the user cannot log in, as shown in the following log-in with a locked-in user will prompt "login account is locked".

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104746774-15466581.png "style=" border:0px; "/>

8 , unlock users

If you need to manually unlock the user, you can select the corresponding user, and then click the "Unlock User" button under the toolbar "access control" to unlock the user as shown. 650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201707/ 157572-20170701104757727-1646341748.png "style=" border:0px; "/>

Related articles:

rdiframework Platform Code generator V3.2 release version

rdiframework.net-based on. NET rapid Information System development Framework-Series catalogue

Rdiframework.net━.net Rapid Information System Development framework- Introduction to Workflow Components

For a few years, thanks to the supporters and users of the rdiframework.net framework, you can find out more at the address below.

rdiframework.net official website:http://www.rdiframework.net/

rdiframework.net Official blog:http://blog.rdiframework.net/

At the same time need to be explained, all the technical articles in the future to the official website as the subject, welcome to our collection!

rdiframework.net Framework by the professional team for a long time to build, has been updated, has been upgrading, please rest assured that use!

Welcome to Rdiframework.net Framework Official public (No.:rdiframework-net), keep abreast of the latest developments.

Scan QR code for immediate attention

650) this.width=650; "Src=" http://images2015.cnblogs.com/blog/157572/201610/157572-20161008152933504-462402858. PNG "style=" border:0px; "/>


This article is from the "Rapid Information System Development Framework" blog, please be sure to keep this source http://chinahuyong.blog.51cto.com/2721990/1943633

Rdiframework.net━. NET rapid Information System Development Framework V3.2->winform version New user Rights settings interface

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.