CN107145777A - The authorization management method of virtual management system client - Google Patents
The authorization management method of virtual management system client Download PDFInfo
- Publication number
- CN107145777A CN107145777A CN201710322319.XA CN201710322319A CN107145777A CN 107145777 A CN107145777 A CN 107145777A CN 201710322319 A CN201710322319 A CN 201710322319A CN 107145777 A CN107145777 A CN 107145777A
- Authority
- CN
- China
- Prior art keywords
- registration
- function button
- icenter
- activation
- management system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the authorization management method of virtual management system client, methods described in iCenter clients by adding " iCenter license managements ";When user is unregistered, open iCenter when, sequential monitoring layer can monitor it is unregistered, by partial function button show un-activation, partial function button hide does not show;After user registration success, then un-activation function button is shown as state of activation, and hiding function button displays that out.The inventive method is installed on a machine after registration iCenter, because have modified registration table during registration and carried out encryption, even if unloading is mounted with iCenter also without re-registration again, after succeeding in registration, input registration code need not be repeated from now on;Registration improves professional and confidentiality in use, need the license agent authorizeds of agent authorized and main frame to be consistent;Enhance the management and control of product.
Description
Technical field
The present invention relates to iCenter client jurisdiction administrative skills field, and in particular to a kind of virtual management system visitor
The authorization management method at family end, mainly for the rights management of virtual management system client;Virtual management system has master
Machine node(inode), client(iCenter)Composition(CS frameworks), user, which operates, and use virtual management system is main exists
ICenter, then want to carry out certain operations authority limitation to user in iCenter, it is necessary to limit it in client
System.
Background technology
In production management, rights management is increasingly taken seriously, and rights management can ensure the information in production management
Safety, is that different objects distribute different authorities.In production management, rights management how is carried out, it is more and more important.
Virtual management system is made up of service end and client two parts(CS frameworks), in main frame(inode)On behaviour
Rights management can be carried out by license by making authority, and client then not be configured authority to it, anyone only it is to be understood that
Main frame(inode)Address, username and password iCenter clients can be just installed institute's functional operation is carried out to it,
Such as add main frame, establishing resource pond, open HA, therefore information security is also on the hazard.
It is therefore necessary to increase empowerment management function in iCenter clients, installing unauthorized after iCenter can not then create
Build pond, open the operation such as HA.
The content of the invention
The technical problem to be solved in the present invention is:There is provided a kind of virtual management system visitor for problem above by the present invention
The authorization management method at family end.
The technical solution adopted in the present invention is:
The authorization management method of virtual management system client, methods described in iCenter clients by with the addition of
" iCenter license managements ";When user is unregistered, when opening iCenter, sequential monitoring layer can monitor unregistered, general
Partial function button shows un-activation, and partial function button, which is hidden, not to be shown;After user registration success, then un-activation function is pressed
Button is shown as state of activation, and hiding function button displays that out.
Methods described is provided with registration code on probation, official register code according to demand.
Methods described keeps the certificate granting unit one of agent authorized and main frame by increasing agent authorized on registration code
Cause., it is necessary to verify whether host authorization unit consistent with iCenter agent authorizeds, unanimously then passes through when creating pond, it is inconsistent then
Pond can not be created.
It is as follows that methods described includes step:
Step 101:Rights expression rule, the unregistered time-division two ways of program are set, and one kind is that function button is put ash and shown
Show un-activation, another is that function button is hidden and do not shown;Then un-activation function button is shown normally after registration, hiding function
Button displays that out;
Step 102:Set extent of competence, it is unregistered in the case of which function button put ash and display un-activation, which function
Button is hidden;
Step 103:Agent authorized, after registration code succeeds in registration, according to registration code presentation of information agent authorized, iCenter registrations
Agent authorized is consistent with the certificate granting unit of main frame;
Step 104:Registration code rule and management:Registration code has trial edition, formal version;Trial edition has useful life, and formal version makes
It is permanent with the time limit.
Beneficial effects of the present invention are:
The inventive method is installed on a machine after registration iCenter, because have modified registration table during registration and added
Close processing, even if unloading is mounted with iCenter also without re-registration again, after succeeding in registration, need not be repeated defeated from now on
Enter registration code(Installed again even if having unloaded);Registration is in use, need agent authorized and main frame(inode)License authorize
Unit is consistent, and improves professional and confidentiality;Enhance the management and control of product.
Brief description of the drawings
Fig. 1 is the inventive method flow chart;
Fig. 2 is rights management flow chart.
Embodiment
According to Figure of description, with reference to embodiment, the present invention is further described:
Embodiment 1
The authorization management method of virtual management system client, methods described in iCenter clients by with the addition of
" iCenter license managements ";When user is unregistered, when opening iCenter, sequential monitoring layer can monitor unregistered, wound
Build the function buttons such as pond, high availability, disaster recovery, export resource data, pond attribute and show un-activation, add the work(such as server
Energy button, which is hidden, not to be shown;After user registration success, then state of activation is shown as, hiding function button button is also showed that
Come.
Rights management flow is as shown in Figure 2:The iCenter of unlatching is unregistered, and input registration code succeeds in registration, oracle listener
After detecting, then triggering provides rights service;Newly-built pond, high availability, disaster recovery, export resource data, property button become
For activation operable state, addition server, it is added to the hiding button in pond and shows.
Embodiment 2
On the basis of embodiment 1, the present embodiment methods described is provided with registration code on probation according to demand(30 days), official register
Code(Forever).
Embodiment 3
On the basis of embodiment 1 or 2, the present embodiment methods described keeps authorizing by increasing agent authorized on registration code
Unit and main frame(inode)Certificate(license)Agent authorized is consistent., it is necessary to verify main frame during establishment pond(inode)Authorize
Whether unit is consistent with iCenter agent authorizeds, unanimously then passes through, inconsistent, can not create pond.
Embodiment 4
As shown in figure 1, on the basis of embodiment 3, it is as follows that the present embodiment methods described includes step:
Step 101:Rights expression rule, the unregistered time-division two ways of program are set, and one kind is that function button is put ash and shown
Show un-activation, another is that function button is hidden and do not shown;Then function button is shown normally after registration, hiding function button
Show;
Step 102:Set extent of competence, it is unregistered in the case of which function button put ash and display un-activation(Newly-built pond, height
Availability, disaster recovery, export resource data, attribute), which function button hide(Addition server, the addition clothes of pond rank
Device be engaged in pond);
Step 103:Agent authorized, after registration code succeeds in registration, according to registration code presentation of information agent authorized, iCenter registrations
Agent authorized wants and main frame(inode)Certificate(license)E agent authorizeds are consistent;
Step 104:Registration code rule and management:Registration code has trial edition, formal version;Trial edition useful life is 30 days, formally
Version useful life is permanent.
Embodiment is merely to illustrate the present invention, and not limitation of the present invention, about the ordinary skill of technical field
Personnel, without departing from the spirit and scope of the present invention, can also make a variety of changes and modification, therefore all equivalent
Technical scheme fall within scope of the invention, scope of patent protection of the invention should be defined by the claims.
Claims (4)
1. the authorization management method of virtual management system client, it is characterised in that methods described passes through in iCenter client
" iCenter license managements " is added on end;When user is unregistered, when opening iCenter, sequential monitoring layer can be monitored not
Registration, un-activation is shown by partial function button, and partial function button, which is hidden, not to be shown;After user registration success, then do not swash
Function button living is shown as state of activation, and hiding function button displays that out.
2. the authorization management method of virtual management system client according to claim 1, it is characterised in that the side
Method is provided with registration code on probation, official register code according to demand.
3. the authorization management method of virtual management system client according to claim 1 or 2, it is characterised in that institute
Method is stated by increasing agent authorized on registration code, keeps agent authorized consistent with the certificate granting unit of main frame.
4. the authorization management method of virtual management system client according to claim 3, it is characterised in that the side
It is as follows that method includes step:
Step 101:Rights expression rule, the unregistered time-division two ways of program are set, and one kind is that function button is put ash and shown
Show un-activation, another is that function button is hidden and do not shown;Then un-activation function button is shown normally after registration, hiding function
Button displays that out;
Step 102:Set extent of competence, it is unregistered in the case of which function button put ash and display un-activation, which function
Button is hidden;
Step 103:Agent authorized, after registration code succeeds in registration, according to registration code presentation of information agent authorized, iCenter registrations
Agent authorized is consistent with the certificate granting unit of main frame;
Step 104:Registration code rule and management:Registration code has trial edition, formal version;Trial edition has useful life, and formal version makes
It is permanent with the time limit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710322319.XA CN107145777A (en) | 2017-05-09 | 2017-05-09 | The authorization management method of virtual management system client |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710322319.XA CN107145777A (en) | 2017-05-09 | 2017-05-09 | The authorization management method of virtual management system client |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107145777A true CN107145777A (en) | 2017-09-08 |
Family
ID=59778252
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710322319.XA Pending CN107145777A (en) | 2017-05-09 | 2017-05-09 | The authorization management method of virtual management system client |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107145777A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111712814A (en) * | 2017-10-06 | 2020-09-25 | Ca公司 | System and method for monitoring baits to protect users from security threats |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1831836A (en) * | 2006-04-12 | 2006-09-13 | 北京金山软件有限公司 | Method and system of saftware using license |
CN102088351A (en) * | 2009-12-08 | 2011-06-08 | 长春吉大正元信息技术股份有限公司 | Authorization management system and implementation method thereof |
CN103186725A (en) * | 2011-12-31 | 2013-07-03 | 北大方正集团有限公司 | Software authorization method and device |
CN106355052A (en) * | 2016-11-03 | 2017-01-25 | 广东浪潮大数据研究有限公司 | Authorization centralized management method, device and system |
-
2017
- 2017-05-09 CN CN201710322319.XA patent/CN107145777A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1831836A (en) * | 2006-04-12 | 2006-09-13 | 北京金山软件有限公司 | Method and system of saftware using license |
CN102088351A (en) * | 2009-12-08 | 2011-06-08 | 长春吉大正元信息技术股份有限公司 | Authorization management system and implementation method thereof |
CN103186725A (en) * | 2011-12-31 | 2013-07-03 | 北大方正集团有限公司 | Software authorization method and device |
CN106355052A (en) * | 2016-11-03 | 2017-01-25 | 广东浪潮大数据研究有限公司 | Authorization centralized management method, device and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111712814A (en) * | 2017-10-06 | 2020-09-25 | Ca公司 | System and method for monitoring baits to protect users from security threats |
CN111712814B (en) * | 2017-10-06 | 2021-06-08 | Ca公司 | System and method for monitoring baits to protect users from security threats |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11683183B2 (en) | Autonomously generated portable accounts | |
CN106462718B (en) | Store the rapid data protection of equipment | |
CN106575342B (en) | Kernel program including relational database and the method and apparatus for performing described program | |
CN100568212C (en) | Shielding system and partition method | |
CN104537300B (en) | Security password setting and verification mode | |
TWI450559B (en) | Computer-implemented methods, computing system, andcomputer program product for domain-authenticated control of platform resources | |
CN100504717C (en) | Computing device with a process-based keystore and method for operating a computing device | |
CN103561034A (en) | Secure file sharing system | |
CN101908113B (en) | Authentication method and authentication system | |
CN103944881A (en) | Cloud resource authorizing method under cloud computing environment | |
CN101840478B (en) | Password management method | |
CN103825741A (en) | Solving method of injecting signed certificate in encryption equipment production process | |
CN106936797A (en) | The management method and system of magnetic disk of virtual machine and file encryption key in a kind of cloud | |
CN103186723A (en) | Digital content security cooperation method and system | |
CN107145777A (en) | The authorization management method of virtual management system client | |
CN102983969B (en) | Security login system and security login method for operating system | |
CN113592497A (en) | Financial transaction service security authentication method and device based on block chain | |
KR100641884B1 (en) | Identification system in use of portable memory-stick device and a method using thereof | |
CN103198241A (en) | Safety management method for software license | |
CN112530053A (en) | Control method and system of intelligent lock, lock equipment, server and storage medium | |
CN105991524A (en) | Family information security system | |
CN115021894A (en) | Data protection method and system and electronic equipment | |
CN103678973A (en) | System capable of realizing access control of host and virtual machine simultaneously and working method thereof | |
CN105654582A (en) | Outdoor multimedia information display safety protection method | |
CN108345801B (en) | Ciphertext database-oriented middleware dynamic user authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170908 |