CN108614976A - Authority configuring method, device and storage medium - Google Patents
Authority configuring method, device and storage medium Download PDFInfo
- Publication number
- CN108614976A CN108614976A CN201810401117.9A CN201810401117A CN108614976A CN 108614976 A CN108614976 A CN 108614976A CN 201810401117 A CN201810401117 A CN 201810401117A CN 108614976 A CN108614976 A CN 108614976A
- Authority
- CN
- China
- Prior art keywords
- authority
- destination
- destination path
- permissions list
- path
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of authority configuring method, device and storage mediums, belong to field of computer technology, and this method includes:The authority application request that user terminal is sent is received, authority application request includes at least user identifier, operating right and destination path;According to stored competence profile, the destination path permissions list to match with destination path is determined;When being not determined by destination path permissions list, hierarchical decomposition is carried out to destination path, obtains the parent directory path of destination path;According to competence profile, the permissions list to match with parent directory path is determined as destination path permissions list;User identifier and operating right are added in destination path permissions list;It can solve the problems, such as that manually adding permission leads to the less efficient of authority configuration;The efficiency of authority configuration can be improved.
Description
Technical field
This application involves a kind of authority configuring method, device and storage mediums, belong to field of computer technology.
Background technology
Version control system (or Version Management Software) (Subversion, SVN) is a kind of multiple developers of support
The Version Management Software of the same project of joint development increased income.
During using SVN, if user needs to open the temporary authority in some warehouse, configuration management team is artificial
Modification authority configuration file is added operation, so that the temporary authority of the user is added in competence profile.
However, when the catalogue level of code is more in the warehouse quantity in server is larger and/or warehouse, manually perform
It is relatively low to add operating efficiency, leads to the less efficient of authority configuration.
Invention content
This application provides a kind of authority configuring method, device and storage medium, can solve to manually perform addition operation
It is less efficient, lead to the less efficient problem of authority configuration.The application provides the following technical solutions:
In a first aspect, providing a kind of authority configuring method, this method includes:
The authority application request that user terminal is sent is received, the authority application request is including at least user identifier, operation
Permission and destination path;
According to stored competence profile, the destination path permissions list to match with the destination path is determined;
When being not determined by the destination path permissions list, hierarchical decomposition is carried out to the destination path, is obtained described
The parent directory path of destination path;
According to the competence profile, the permissions list to match with the parent directory path is determined as the target
Path permissions list;
The user identifier and the operating right are added in the destination path permissions list.
Optionally, the destination path includes the server identification of destination server;
After the authority application request for receiving user terminal transmission, further include:
The locking mark of the destination server is obtained according to the server identification;
When the untreated authority application to the destination server of the locking mark instruction is asked, the target is taken
Business device locks.
Optionally, after the locking mark that the destination server is obtained according to the server identification, further include:
When locking mark instruction is handling the request of the authority application to the destination server, to the user
Terminal returns to busy notice, and the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
It is optionally, described that the user identifier and the operating right are added in the destination path permissions list,
Including:
Determine whether the destination path permissions list includes the user identifier;
When the destination path permissions list includes the user identifier, deletes and remember in the destination path permissions list
The corresponding original right of the user identifier of record;
The user identifier and the operating right are added in the destination path permissions list.
Optionally, described according to stored competence profile, determine the target road to match with the destination path
After diameter permissions list, further include:
Determine in the first permissions list of the subdirectory of the destination path whether include the user identifier;
When first permissions list includes the user identifier, recorded in deletion first permissions list described
The corresponding original right of user identifier;
The user identifier and the operating right are added in first permissions list.
Optionally, described according to stored competence profile, determine the target road to match with the destination path
After diameter permissions list, further include:
Determine in the second permissions list of the upper directory of the destination path whether include the user identifier;
When second permissions list does not include the user identifier, the use is added in second permissions list
Family identifies and the read-only authority of the user identifier.
Optionally, described that the user identifier and the operating right are added to it in the destination path permissions list
Afterwards, further include:
It is generated according to the updated destination path permissions list and increases authority and updated authority configuration text newly
Part;
The newly-increased authority and the updated competence profile are sent to the destination server, it is described
Newly-increased authority and the updated competence profile are used for for the rights management warehouse pair in the destination server
The newly-increased authority and the updated competence profile merge, and obtain final competence profile, described
Rights management warehouse is used to be managed collectively the competence profile in at least one other warehouse run in the destination server.
Second aspect provides a kind of authority configuring method, the method includes:
Receive the newly-increased authority and updated competence profile that management server is sent, the newly-increased permission text
Part and the updated competence profile are behaviour of the management server according to the authority application request instruction received
Make what permission, destination path and user identifier generated;
Triggering rights management warehouse merges the newly-increased authority and updated competence profile, obtains
Final competence profile, the rights management warehouse be used for be managed collectively run in the destination server it is at least one its
The competence profile in its warehouse;
The access rights of user terminal are determined according to the final competence profile.
The third aspect, provides a kind of authority configuration device, and described device includes:
Request receiving module, the authority application request for receiving user terminal transmission, the authority application request is at least
Including user identifier, operating right and destination path;
First matching module is used for according to stored competence profile, what the determining and destination path matched
Destination path permissions list;
Path decomposing module, for when being not determined by the destination path permissions list, being carried out to the destination path
Hierarchical decomposition obtains the parent directory path of the destination path;
Second matching module is used for according to the competence profile, the permission that will be matched with the parent directory path
List is determined as the destination path permissions list;
Permission add module is arranged for the user identifier and the operating right to be added to the destination path permission
In table.
Optionally, the destination path includes the server identification of destination server;Described device further includes:
Identifier acquisition module, after being asked in the authority application for receiving user terminal transmission, according to the server
Mark obtains the locking mark of the destination server;
Module is locked, for indicating that the untreated authority application to the destination server is asked in the mark that locks
When, the destination server is locked.
Optionally, described device further includes:
Notice returns to module, after the locking for obtaining the destination server according to the server identification identifies,
When locking mark instruction is handling the request of the authority application to the destination server, returned to the user terminal
Busy notice, the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
Optionally, the permission add module, including:
Determination unit, for determining whether the destination path permissions list includes the user identifier;
Deleting unit, for when the destination path permissions list includes the user identifier, deleting the target road
The corresponding original right of the user identifier recorded in diameter permissions list;
Adding device, for the user identifier and the operating right to be added to the destination path permissions list
In.
Optionally, described device further includes:
First determining module is used for according to stored competence profile, what the determining and destination path matched
After destination path permissions list, determine in the first permissions list of the subdirectory of the destination path whether include the user
Mark;
Removing module, for when first permissions list includes the user identifier, deleting the first permission row
The corresponding original right of the user identifier recorded in table;
First add module, for the user identifier and the operating right to be added to first permissions list
In.
Optionally, described device further includes:
Second determining module is used for according to stored competence profile, what the determining and destination path matched
After destination path permissions list, determine in the second permissions list of the upper directory of the destination path whether include the use
Family identifies;
Second add module, for when second permissions list does not include the user identifier, being weighed described second
The read-only authority of the user identifier and the user identifier is added in limit list.
Optionally, described device further includes:
File generating module is arranged for the user identifier and the operating right to be added to the destination path permission
After in table, is generated according to the updated destination path permissions list and increase authority and updated authority configuration text newly
Part;
File sending module, for the newly-increased authority and the updated competence profile to be sent to institute
Destination server is stated, the newly-increased authority and the updated competence profile are used for in the destination server
Rights management warehouse the newly-increased authority and the updated competence profile are merged, finally weighed
Configuration file is limited, the rights management warehouse is for being managed collectively at least one other warehouse run in the destination server
Competence profile.
Fourth aspect, provides a kind of authority configuration device, and described device includes:
File reception module, the newly-increased authority for receiving management server transmission and updated authority configuration text
Part, the newly-increased authority and the updated competence profile are the management servers according to the permission received
What operating right, destination path and the user identifier of application request instruction generated;
Permission merging module, for triggering rights management warehouse to the newly-increased authority and updated authority configuration
File merges, and obtains final competence profile, the rights management warehouse is for being managed collectively the destination server
The competence profile at least one other warehouse of middle operation;
Permission determining module, the access rights for determining user terminal according to the final competence profile.
5th aspect, provides a kind of authority configuration device, described device includes processor and memory;In the memory
It has program stored therein, described program is loaded by the processor and executed to realize the authority configuring method described in first aspect;Or
Person realizes the authority configuring method described in second aspect.
6th aspect, provides a kind of computer readable storage medium, has program stored therein in the storage medium, described program
It is loaded by the processor and is executed to realize the authority configuring method described in first aspect;Alternatively, realizing described in second aspect
Authority configuring method.
The advantageous effect of the application is:The authority application request sent by receiving user terminal;According to the permission Shen
It please ask to add the permission of some user automatically;Can solve manually to add permission causes the less efficient of authority configuration to be asked
Topic;Due to being not necessarily to configuration management team human configuration permission, but management server automatic identification authority application is asked, according to this
Authority application asks to add the permission of some user automatically, it is thus possible to improve the efficiency of authority configuration.
In addition, if competence profile stores the corresponding permission of catalogue of each level, with the rule of catalogue in warehouse
Mould expands, and the permission stored needed for competence profile increases therewith, and the memory space that competence profile occupies also can be larger;
And in the present embodiment, in such a way that subdirectory inherits the permissions list of parent directory so that competence profile without depositing in advance
Store up the corresponding permission of catalogue of each level, it can also be ensured that user can apply for the permission of the subdirectory of arbitrary level-one.
Above description is only the general introduction of technical scheme, in order to better understand the technological means of the application,
And can be implemented in accordance with the contents of the specification, below with the preferred embodiment of the application and coordinate attached drawing be described in detail as after.
Description of the drawings
Fig. 1 is the structural schematic diagram for the authority configuration system that the application one embodiment provides;
Fig. 2 is the flow chart for the authority configuring method that the application one embodiment provides;
Fig. 3 is the flow chart for the authority configuring method that the application one embodiment provides;
Fig. 4 is the flow chart of the authority configuring method of the application another embodiment offer;
Fig. 5 is the flow chart of the authority configuring method of the application another embodiment offer;
Fig. 6 is the block diagram for the authority configuration device that the application one embodiment provides;
Fig. 7 is the block diagram for the authority configuration device that the application one embodiment provides;
Fig. 8 is the block diagram for the authority configuration device that the application one embodiment provides.
Specific implementation mode
With reference to the accompanying drawings and examples, the specific implementation mode of the application is described in further detail.Implement below
Example is not limited to scope of the present application for illustrating the application.
First, to this application involves several nouns explain.
Version control system (or Version Management Software) (Subversion, SVN) is the version of an open source code
Control system is used for multiple same projects of developer's joint development.Support (SuSE) Linux OS and Windows operations system
System etc..
During the use of SVN, if developer needs to create a project, establishment one is needed to manage the project
Warehouse.
Warehouse (or the libraries SVN) is for storing program code and/or document.Gather around that there are one independent for each warehouse
Competence profile, be stored with subscriber group information in the competence profile, and to a certain in a manner of user or user group
The permission of hierarchical directory is allocated.Wherein, permission include to the access limit (write) of the content in a certain hierarchical directory,
Read-only authority (read) and limitation access at least one of (none).
User group:Refer to dividing the user with identical permission into one group to obtain.For same user group, as long as to this
User group assigns certain permission, then the user in the group is with regard to permission having the same.Subscriber group information, which includes at least, to be corresponded to
User group user group mark.User group mark can be the mark of some department, alternatively, being that at least one user is constituted
Mark, the present embodiment are not construed as limiting user group mark.
Optionally, the application is not construed as limiting the title of user group, and in other embodiments, user group is referred to as weighing
Limit group etc..
Path:It is used to indicate the access process for accessing a certain hierarchical directory.Such as:Path is repos/test/trunk:
Then illustrate that the process for accessing trunk catalogues is:Root repos is first accessed, the subdirectory under root repos is visited again
Test finally accesses the subdirectory trunk under subdirectory test.
Fig. 1 is the structural schematic diagram for the authority configuration system that the application one embodiment provides, as shown in Figure 1, the system
It includes at least:User terminal 110, management server 120 and destination server 130.
User terminal 110, which can be mobile phone, computer, wearable device, portable computer etc., has communication function
Electronic equipment, the present embodiment is not construed as limiting the type of user terminal 110.
User terminal 110 is sent to management server for generating authority application request, and by authority application request
120。
Wherein, authority application request includes at least user identifier, operating right and destination path.Authority application request is used
The access rights for the content that the user identifier indicates destination path are added in request, which indicates with the operating right
Permission it is identical.
User terminal 110 is established with management server 120 by cable network or wireless network and is communicated to connect.Schematically
Ground, user terminal 110 are based on hypertext transfer protocol (HyperTextTransferProtocol, HTTP) and management server
120 establish communication connection.
Optionally, management server 120 can be independent server host;Alternatively, can also be multiple server masters
Mechanism at server cluster.Schematically, management server 120 can be webpage (web) server.
Management server 120 is used to receive the authority application request of the transmission of user terminal 110;Matched according to stored permission
File is set, determines the destination path permissions list to match with destination path;It is right when being not determined by destination path permissions list
Destination path carries out hierarchical decomposition, obtains the parent directory path of destination path;It, will be with parent directory path according to competence profile
The permissions list to match is determined as destination path permissions list;User identifier and operating right are added to destination path permission
In list.
Optionally, management server 120, which is additionally operable to be generated according to updated destination path permissions list, increases permission text newly
Part and updated competence profile;Newly-increased authority and updated competence profile are sent to destination server
130。
Wherein, it increases authority newly and updated competence profile is used for for the permission pipe in destination server 130
Reason warehouse 131 merges newly-increased authority and updated competence profile, obtains final competence profile.
Optionally, management server 120 carries out communication link with destination server 130 by cable network or wireless network
It connects.
Destination server 130 can be independent server host;Alternatively, can also be what multiple server hosts were constituted
Server cluster.Schematically, operation has SVN in destination server 130,
Destination server 130 is used to receive the newly-increased authority of the transmission of management server 120 and updated permission is matched
Set file;Triggering rights management warehouse 131 merges newly-increased authority and updated competence profile, obtains most
Whole competence profile;The access rights of user terminal are determined according to final competence profile.
Wherein, newly-increased authority and updated competence profile are management servers 120 according to the power received
What operating right, destination path and the user identifier of limit application request instruction generated.
Optionally, being created in each destination server 130 has at least one other warehouse and a rights management warehouse
131, other warehouses are used for Storage Item destination code and/or document, and rights management warehouse 131 is for being managed collectively destination server
The competence profile at least one other warehouse of middle operation.
It should be added that the present embodiment is only one with the quantity of user terminal 110, destination server 130 is
Example illustrates, in actual implementation, user terminal 110 and destination server 130 or multiple, the present embodiment to this not
It is construed as limiting.
Fig. 2 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method
For in authority configuration system shown in FIG. 1, and for the executive agent of each step is management server 120 in the system
It illustrates.This method includes at least following steps:
Step 201, the authority application request that user terminal is sent is received.
Wherein, authority application request includes at least user identifier, operating right and destination path.
Such as:The authority application that management server receives is asked:{ tjf, http://192.123.1.1/repos/
Test/trunk writes }.Wherein, " tjf " is user identifier, and " writing " is operating right, " http://192.123.1.1/repos/
Test/trunk " is destination path.
Step 202, according to stored competence profile, determine that the destination path permission to match with destination path arranges
Table.
Optionally, when management server is not determined by destination path permissions list, step 203 is executed;In management service
When device determines destination path permissions list, step 205 is executed.
Optionally, the competence profile stored in management server can be downloaded from destination server and be obtained;
It is imported alternatively, the competence profile is configuration management team, the present embodiment is not construed as limiting this.
Competence profile is stored in the form of structured storage in the database of management server.
Schematically, the competence profile stored in management server is as shown in following table one:
Table one:
Management server can identify the path structure of destination path, then, according to the path structure in competence profile
It is middle to search corresponding permission and subscriber group information, obtain the destination path permissions list of the destination path.
Step 203, when being not determined by destination path permissions list, hierarchical decomposition is carried out to destination path, obtains target
The parent directory path in path.
Optionally, if competence profile stores the corresponding permission of catalogue of each level, with catalogue in warehouse
Popularization, the permission stored needed for competence profile increase therewith, and the memory space that competence profile occupies also can be compared with
Greatly.In the present embodiment, in such a way that subdirectory inherits parent directory permissions list so that competence profile is each without storage
The corresponding permission of catalogue of level, simplifies the structure of competence profile.
Optionally, management server is divided and is stored according to pre-defined rule to destination path, by last layer of catalogue
The path of last layer catalogue be determined as the parent directory path of destination path.Such as:By destination path according to vertical suitable
Sequence is in turn divided into:Access protocol, access address, warehouse address, root, first layer subdirectory, second layer specific item
Record ... n-th layer subdirectories etc..
Such as:Destination path is:A/b/c/d then can not determine a/b/c/d pairs in the competence profile shown in table one
The permissions list answered, at this point, management server determines that the parent directory path of destination path is a/b/c/.
Step 204, according to competence profile, the permissions list to match with parent directory path is determined as destination path
Permissions list.
Such as:The corresponding permissions lists of parent directory path a/b/c/ are searched in Table 1, obtain target permissions list
{ none, Human Resource Department }.
Step 205, user identifier and operating right are added in destination path permissions list.
Such as:The corresponding permissions lists of parent directory path a/b/c/ are searched in Table 1, obtain target permissions list
User identifier " tjf " and operating right " write " are then added the target permissions list, obtained down by { none, Human Resource Department }
Table two:
Table two:
none | Human Resource Department |
write | tjf |
Optionally, management server is when user identifier and operating right to be added in destination path permissions list, first
Determine destination path permissions list whether including the user identifier in authority application request;Including in destination path permissions list should
When user identifier, the corresponding original right of user identifier that is recorded in the permissions list of delete target path;By user identifier and behaviour
It is added in destination path permissions list as permission;When destination path permissions list does not include the user identifier, will directly use
Family identifies and operating right is added in destination path permissions list.
Optionally, whether it includes using that management server can also determine in the first permissions list of the subdirectory of destination path
Family identifies;When the first permissions list includes user identifier, the corresponding original of user identifier recorded in the first permissions list is deleted
Beginning permission;User identifier and operating right are added in the first permissions list;Do not include user identifier in the first permissions list
When, user identifier and operating right are added in the first permissions list.This step can execute before step 205;Alternatively,
It can also execute after step 205;Alternatively, can also be performed simultaneously with step 205, this implementation is not construed as limiting this.
Such as:Destination path is a/b/, and the subdirectory of the destination path is a/b/c/, then management server not only needs
User identifier " tjf " and operating right " write " are added in the corresponding target permissions lists of a/b/ { read, sales department }, obtains
Permissions list shown in table three, it is also necessary in corresponding first permissions lists of subdirectory a/b/c/ { none, Human Resource Department }
User identifier " tjf " and operating right " write " is added, obtains permissions list shown in table two.
Table three:
read | Sales department |
write | tjf |
Optionally, management server can also determine in the second permissions list of the upper directory of destination path whether include
User identifier;When the second permissions list does not include user identifier, user identifier and user's mark are added in the second permissions list
The read-only authority of knowledge.This step can execute before step 205;Alternatively, can also execute after step 205;Alternatively, also
It can be performed simultaneously with step 205, this implementation is not construed as limiting this.
The upper directory of destination path refers to the mesh on the upper layer that including root, each grade is located at the destination path
Record.
Such as:Destination path is a/b/c/, and the upper directory of the destination path is a/, a/b/, then management server needs
User identifier " tjf " is added in corresponding second permissions lists of a/ and read-only authority obtains following table four;In a/b/ corresponding
User identifier " tjf " is added in two permissions lists and read-only authority obtains following table five.
Table four:
write | Product manager portion |
read | tjf |
Table five:
read | Sales department |
read | tjf |
In conclusion authority configuring method provided in this embodiment, is asked by receiving the authority application that user terminal is sent
It asks;Add the permission of some user automatically according to authority application request;Can solve manually to add permission leads to authority configuration
Less efficient problem;Due to being not necessarily to configuration management team human configuration permission, but management server automatic identification permission
Application request adds the permission of some user according to authority application request, it is thus possible to improve the effect of authority configuration automatically
Rate.
In addition, if competence profile stores the corresponding permission of catalogue of each level, with the rule of catalogue in warehouse
Mould expands, and the permission stored needed for competence profile increases therewith, and the memory space that competence profile occupies also can be larger;
And in the present embodiment, in such a way that subdirectory inherits the permissions list of parent directory so that competence profile without depositing in advance
Store up the corresponding permission of catalogue of each level, it can also be ensured that user can apply for the permission of the subdirectory of arbitrary level-one.
In addition, adding read-only authority by corresponding second permissions list of upper directory in destination path so that user
The content for the upper directory that arbitrary level-one has permission can be downloaded.
Optionally, after step 205, management server can also be generated according to updated destination path permissions list
Newly-increased authority and updated competence profile;Newly-increased authority and updated competence profile are sent to
Destination server.
Fig. 3 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method
For in authority configuration system shown in FIG. 1, and for the executive agent of each step is destination server 130 in the system
It illustrates.After step 205, this method includes at least following steps:
Step 301, the newly-increased authority and updated competence profile that management server is sent are received.
Newly-increased authority and updated competence profile are that management server is asked according to the authority application received
The operating right, destination path and user identifier of instruction is asked to generate.
Newly-increased authority and updated competence profile are used for for the rights management warehouse pair in destination server
Newly-increased authority and updated competence profile merge, and obtain final competence profile.
Rights management warehouse is used to be managed collectively the authority configuration in at least one other warehouse run in destination server
File.
Schematically, it is tmp.auth files to increase authority newly, and updated competence profile is conf files.
Step 302, triggering rights management warehouse merges newly-increased authority and updated competence profile,
Obtain final competence profile.
There are one rights management warehouses for setting in each destination server, and rights management warehouse is for being managed collectively target clothes
The competence profile in at least one other warehouse run in business device.Such as:Rights management warehouse is SVN_Manager.
Destination server is additionally provided with hook (hook) function, and newly-increased authority and update are received in destination server
When rear competence profile, can automatic trigger hook function pairs increase authority newly and updated competence profile carries out
Parsing, then, the two is merged, obtains final competence profile.
Optionally, rights management warehouse merges newly-increased authority and the rule of updated competence profile is:If
Permission catalogue in newly-increased authority is not present, then the permission catalogue and the power are added in competence profile in the updated
Limit the corresponding permission of catalogue;If the permission catalogue in newly-increased authority is existing, adds and correspond in the permission catalogue tail portion
Permission.
Step 303, the access rights of user terminal are determined according to final competence profile.
In conclusion when same destination server manages multiple warehouses, the present embodiment passes through in the destination server
Rights management warehouse is set to be managed collectively the competence profile in each warehouse, reduces the authority configuration for managing multiple warehouses
The difficulty of file.
Optionally, it is based on above-mentioned each embodiment, if management server has at least one when processing authority application is asked
A other user terminals need to apply for the permission of destination server, then management server can lock destination server, to carry
Show that at least one other user terminal management server is changing the permission of destination server, this way it is possible to avoid multiple
User terminal changes the permission of destination server simultaneously, and permission is caused to change the problem of conflicting.
Fig. 4 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method
For in authority configuration system shown in FIG. 1, and for the executive agent of each step is management server 120 in the system
It illustrates.After step 201, this method includes at least following steps:
Step 401, the locking that destination server is obtained according to the server identification in destination path identifies.
Optionally, server identification can be the server address of destination server.
Optionally, mark is locked to be stored in the rights management warehouse of destination server.Management server gets permission
After application request, the server address of the destination path instruction in being asked according to authority application downloads to rights management warehouse
It is local;Determine whether management server is handling the permission of the destination server according to the locking mark in rights management warehouse
Application request.
Optionally, it locks mark and is used to indicate the untreated authority application request to destination server;Alternatively, being used to indicate
Handling the authority application request to destination server.
Optionally, when the untreated authority application to destination server of locking mark instruction is asked, step 402 is executed;
When locking the authority application request for identifying and indicating handling to destination server, step 403 is executed.
Step 402, when the untreated authority application to destination server of locking mark instruction is asked, to destination server
It locks, executes step 202.
When the untreated authority application to destination server of locking mark instruction is asked, illustrate that current management server does not have
There is the authority application request that processing other user terminals are sent therefore can continue with the permission of active user's terminal transmission
Application request.
Wherein, it refers to that the locking mark of destination server is being revised as instruction just that management server, which locks destination server,
The authority application of destination server is asked in processing.
Correspondingly, target clothes are sent in step 205 or by newly-increased authority and updated competence profile
It is engaged in after device, management server also needs to lock to identify to be revised as indicating that the untreated authority application to destination server is asked
It asks.
Step 403, when locking the authority application request for identifying and indicating handling to destination server, to user terminal
Busy notice is returned to, flow terminates.
Wherein, busy notice is used to indicate the authority application request handled to destination server.
In conclusion locking mark by being arranged for destination server in the present embodiment so that there are multiple user terminals
Simultaneously need apply destination server permission when, management server can serially to each user terminal send authority application
Request is handled;Permission can be caused to change the problem of conflicting to avoid the identical permission of multiple user terminal applications.
Optionally, it is based on above-mentioned each embodiment, after step 201, management server can also judge user terminal
Whether operating right in authority application request can be applied for;If can apply for the operating right in authority application request,
According to stored competence profile, whether the user identifier in the application request that defines the competence has possessed the operating right;
When user identifier does not possess the operating right, step 202 is executed.
Optionally, it is based on above-mentioned each embodiment, what authority application request may be applied is temporary authority, that is, the permission
With timeliness, and in specified duration effectively, the duration permission is specified to be recovered more than this.At this point, after step 302,
Destination server can detect catalogue of the deadline more than current time that come into force in newly-increased authority, and obtain catalogue correspondence
Permissions list, updated newly-increased authority is generated according to the permissions list, which is sent out
It send to rights management warehouse.
Optionally, destination server by preassembled detection script come detect come into force in newly-increased authority cut-off when
Between be more than current time catalogue.The detection script can detect in real time, alternatively, can also be detected every certain time length, this reality
Example is applied to be not construed as limiting this.
Wherein, come into force deadline can be authority application request in carry.
In order to be more clearly understood that authority configuring method provided by the present application, a reality is lifted to the authority configuring method below
Example illustrates.
Fig. 5 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method
For illustrating in authority configuration system shown in FIG. 1.
Step 501, management server receives the authority application request that user terminal is sent, and authority application request is at least wrapped
Include user identifier, operating right and destination path.
The associated description of this step refers to step 201, and therefore not to repeat here for the present embodiment.
Step 502, management server determines that the server identification in destination path obtains the locking mark of destination server.
Optionally, when locking the authority application request for identifying and indicating handling to destination server, step is executed
503;When the untreated authority application to destination server of locking mark instruction is asked, step 504 is executed.
Step 503, management server returns to busy notice to user terminal, and flow terminates.
Busy notice is used to indicate the authority application request handled to destination server.
Step 504, management server locks destination server.
This step refers to step 402, this implementation is not construed as limiting this.
Step 505, management server determines the target to match with destination path according to stored competence profile
Path permissions list.
Optionally, when determining destination path permissions list, step 508 is executed;It is being not determined by destination path permission
When list, step 506 is executed.
Step 506, management server carries out level point when being not determined by destination path permissions list to destination path
Solution, obtains the parent directory path of destination path.
Step 507, management server determines the permissions list to match with parent directory path according to competence profile
For destination path permissions list.
Step 508, user identifier and operating right are added in destination path permissions list by management server.
Step 509, management server generates according to updated destination path permissions list and increases authority and update newly
Competence profile afterwards.
Step 510, newly-increased authority and updated competence profile are sent to destination service by management server
Device.
Step 511, destination server receives the newly-increased authority and updated authority configuration that management server is sent
File.
Step 512, destination server triggering rights management warehouse is to newly-increased authority and updated authority configuration text
Part merges.
Step 513, destination server increases deadline of coming into force in authority newly more than current by detecting script detection
The catalogue of time, and obtain the corresponding permissions list of the catalogue;Updated newly-increased authority is generated according to the permissions list,
The updated newly-increased authority is sent to rights management warehouse.
Fig. 6 is the block diagram for the authority configuration device that the application one embodiment provides, and the present embodiment is with this device application
It is illustrated for management server 120 in authority configuration system shown in FIG. 1.The device includes at least following mould
Block:Request receiving module 610, the first matching module 620, path decomposing module 630, the second matching module 640, permission add mould
Block 650.
Request receiving module 610, for receive user terminal transmission authority application request, the authority application ask to
Include user identifier, operating right and destination path less;
First matching module 620, for according to stored competence profile, determination to match with the destination path
Destination path permissions list;
Path decomposing module 630, for when being not determined by the destination path permissions list, to the destination path into
Row hierarchical decomposition obtains the parent directory path of the destination path;
Second matching module 640 is used for according to the competence profile, the power that will be matched with the parent directory path
Limit list is determined as the destination path permissions list;
Permission add module 650 is weighed for the user identifier and the operating right to be added to the destination path
It limits in list.
Optionally, the destination path includes the server identification of destination server;Described device further includes:
Identifier acquisition module, after being asked in the authority application for receiving user terminal transmission, according to the server
Mark obtains the locking mark of the destination server;
Module is locked, for indicating that the untreated authority application to the destination server is asked in the mark that locks
When, the destination server is locked.
Optionally, described device further includes:
Notice returns to module, after the locking for obtaining the destination server according to the server identification identifies,
When locking mark instruction is handling the request of the authority application to the destination server, returned to the user terminal
Busy notice, the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
Optionally, the permission add module 650, including:
Determination unit, for determining whether the destination path permissions list includes the user identifier;
Deleting unit, for when the destination path permissions list includes the user identifier, deleting the target road
The corresponding original right of the user identifier recorded in diameter permissions list;
Adding device, for the user identifier and the operating right to be added to the destination path permissions list
In.
Optionally, described device further includes:
First determining module is used for according to stored competence profile, what the determining and destination path matched
After destination path permissions list, determine in the first permissions list of the subdirectory of the destination path whether include the user
Mark;
Removing module, for when first permissions list includes the user identifier, deleting the first permission row
The corresponding original right of the user identifier recorded in table;
First add module, for the user identifier and the operating right to be added to first permissions list
In.
Optionally, described device further includes:
Second determining module is used for according to stored competence profile, what the determining and destination path matched
After destination path permissions list, determine in the second permissions list of the upper directory of the destination path whether include the use
Family identifies;
Second add module, for when second permissions list does not include the user identifier, being weighed described second
The read-only authority of the user identifier and the user identifier is added in limit list.
Optionally, described device further includes:
File generating module is arranged for the user identifier and the operating right to be added to the destination path permission
After in table, is generated according to the updated destination path permissions list and increase authority and updated authority configuration text newly
Part;
File sending module, for the newly-increased authority and the updated competence profile to be sent to institute
Destination server is stated, the newly-increased authority and the updated competence profile are used for in the destination server
Rights management warehouse the newly-increased authority and the updated competence profile are merged, finally weighed
Configuration file is limited, the rights management warehouse is for being managed collectively at least one other warehouse run in the destination server
Competence profile.
Correlative detail refers to above method embodiment.
Fig. 7 is the block diagram for the authority configuration device that the application one embodiment provides, and the present embodiment is with this device application
It is illustrated for destination server 130 in authority configuration system shown in FIG. 1.The device includes at least following mould
Block:File reception module 710, permission merging module 720 and permission determining module 730.
File reception module 710, newly-increased authority and updated permission for receiving management server transmission are matched
Set file, the newly-increased authority and the updated competence profile are the management servers according to receiving
What operating right, destination path and the user identifier of authority application request instruction generated;
Permission merging module 720, for triggering rights management warehouse to the newly-increased authority and updated permission
Configuration file merges, and obtains final competence profile, the rights management warehouse is for being managed collectively the target clothes
The competence profile in at least one other warehouse run in business device;
Permission determining module 730, the access rights for determining user terminal according to the final competence profile.
Correlative detail refers to above method embodiment.
It should be noted that:The authority configuration device provided in above-described embodiment is when carrying out authority configuration, only with above-mentioned
The division progress of each function module, can be as needed and by above-mentioned function distribution by different for example, in practical application
Function module is completed, i.e., the internal structure of authority configuration device is divided into different function modules, described above to complete
All or part of function.In addition, the authority configuration device that above-described embodiment provides belongs to same with authority configuring method embodiment
One design, specific implementation process refer to embodiment of the method, and which is not described herein again.
Fig. 8 is the block diagram for the authority configuration device that the application one embodiment provides, which can be comprising shown in Fig. 1
Authority configuration system in test controller 110 device, such as:Smart mobile phone, tablet computer, laptop or desk-top
Computer.Authority configuration device is also possible to be referred to as user equipment, portable terminal, laptop terminal, terminal console, control terminal
Deng the present embodiment is not construed as limiting this.The device includes at least processor 810 and memory 820.
Processor 801 may include one or more processing cores, such as:4 core processors, 8 core processors etc..Place
DSP (Digital SignalProcessing, Digital Signal Processing), FPGA (Field- may be used in reason device 801
Programmable GateArray, field programmable gate array), PLA (Programmable LogicArray, it is programmable to patrol
Volume array) at least one of example, in hardware realize.Processor 801 can also include primary processor and coprocessor, main place
Reason device is the processor for being handled data in the awake state, also referred to as CPU (Central Processing
Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.
In some embodiments, processor 801 can be integrated with GPU (Graphics Processing Unit, image processor),
GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 801 can also wrap
AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processors are for handling related machine learning
Calculating operation.
Memory 802 may include one or more computer readable storage mediums, which can
To be non-transient.Memory 802 may also include high-speed random access memory and nonvolatile memory, such as one
Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 802 can
Storage medium is read for storing at least one instruction, at least one instruction is for performed to realize this Shen by processor 801
Please in embodiment of the method provide authority configuring method.
In some embodiments, authority configuration device is also optional includes:Peripheral device interface and at least one periphery are set
It is standby.It can be connected by bus or signal wire between processor 801, memory 802 and peripheral device interface.Each peripheral equipment
It can be connected with peripheral device interface by bus, signal wire or circuit board.Schematically, peripheral equipment includes but not limited to:
Radio circuit, touch display screen, voicefrequency circuit and power supply etc..
Certainly, authority configuration device can also include fewer or more components, and the present embodiment is not construed as limiting this.
Optionally, the application is also provided with a kind of computer readable storage medium, in the computer readable storage medium
It has program stored therein, described program is loaded by processor and executed to realize the authority configuring method of above method embodiment.
Optionally, the application is also provided with a kind of computer product, which includes computer-readable storage medium
Matter has program stored therein in the computer readable storage medium, and described program is loaded by processor and executed to realize above-mentioned side
The authority configuring method of method embodiment.
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, it is all considered to be the range of this specification record.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (12)
1. a kind of authority configuring method, which is characterized in that the method includes:
The authority application request that user terminal is sent is received, the authority application request is including at least user identifier, operating right
And destination path;
According to stored competence profile, the destination path permissions list to match with the destination path is determined;
When being not determined by the destination path permissions list, hierarchical decomposition is carried out to the destination path, obtains the target
The parent directory path in path;
According to the competence profile, the permissions list to match with the parent directory path is determined as the destination path
Permissions list;
The user identifier and the operating right are added in the destination path permissions list.
2. authority configuring method as described in claim 1, which is characterized in that the destination path includes the clothes of destination server
Business device mark;
After the authority application request for receiving user terminal transmission, further include:
The locking mark of the destination server is obtained according to the server identification;
When the untreated authority application to the destination server of the locking mark instruction is asked, to the destination server
It locks.
3. authority configuring method as claimed in claim 2, which is characterized in that described according to described in server identification acquisition
After the locking mark of destination server, further include:
When locking mark instruction is handling the request of the authority application to the destination server, to the user terminal
Busy notice is returned to, the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
4. authority configuring method as described in any one of claims 1 to 3, which is characterized in that it is described by the user identifier and
The operating right is added in the destination path permissions list, including:
Determine whether the destination path permissions list includes the user identifier;
When the destination path permissions list includes the user identifier, deletes and recorded in the destination path permissions list
The corresponding original right of the user identifier;
The user identifier and the operating right are added in the destination path permissions list.
5. authority configuring method as described in any one of claims 1 to 3, which is characterized in that described according to stored permission
After the destination path permissions list that configuration file, determination and the destination path match, further include:
Determine in the first permissions list of the subdirectory of the destination path whether include the user identifier;
When first permissions list includes the user identifier, the user recorded in first permissions list is deleted
Identify corresponding original right;
The user identifier and the operating right are added in first permissions list.
6. authority configuring method as described in any one of claims 1 to 3, which is characterized in that described according to stored permission
After the destination path permissions list that configuration file, determination and the destination path match, further include:
Determine in the second permissions list of the upper directory of the destination path whether include the user identifier;
When second permissions list does not include the user identifier, user's mark is added in second permissions list
Know the read-only authority with the user identifier.
7. authority configuring method as described in claim 1, which is characterized in that described by the user identifier and the operating rights
After limit is added in the destination path permissions list, further include:
It is generated according to the updated destination path permissions list and increases authority and updated competence profile newly;
The newly-increased authority and the updated competence profile are sent to the destination server;
Wherein, the newly-increased authority and the updated competence profile are used for for the power in the destination server
Limit management warehouse merges the newly-increased authority and the updated competence profile, obtains final permission and matches
File is set, the rights management warehouse is used to be managed collectively the power in at least one other warehouse run in the destination server
Limit configuration file.
8. a kind of authority configuring method, which is characterized in that the method includes:
Receive management server send newly-increased authority and updated competence profile, the newly-increased authority and
The updated competence profile is operating rights of the management server according to the authority application request instruction received
What limit, destination path and user identifier generated;
Triggering rights management warehouse merges the newly-increased authority and updated competence profile, obtains final
Competence profile, the rights management warehouse is for being managed collectively at least one other storehouse run in the destination server
The competence profile in library;
The access rights of user terminal are determined according to the final competence profile.
9. a kind of authority configuration device, which is characterized in that described device includes:
Request receiving module, the authority application request for receiving user terminal transmission, the authority application request include at least
User identifier, operating right and destination path;
First matching module, for according to stored competence profile, determining the target to match with the destination path
Path permissions list;
Path decomposing module, for when being not determined by the destination path permissions list, level to be carried out to the destination path
It decomposes, obtains the parent directory path of the destination path;
Second matching module is used for according to the competence profile, the permissions list that will be matched with the parent directory path
It is determined as the destination path permissions list;
Permission add module, for the user identifier and the operating right to be added to the destination path permissions list
In.
10. a kind of authority configuration device, which is characterized in that described device includes:
File reception module, the newly-increased authority for receiving management server transmission and updated competence profile,
The newly-increased authority and the updated competence profile are the management servers according to the permission Shen received
The operating right, destination path and user identifier of instruction please be ask to generate;
Permission merging module, for triggering rights management warehouse to the newly-increased authority and updated competence profile
It merges, obtains final competence profile, the rights management warehouse is transported for being managed collectively in the destination server
The competence profile in capable at least one other warehouse;
Permission determining module, the access rights for determining user terminal according to the final competence profile.
11. a kind of authority configuration device, which is characterized in that described device includes processor and memory;It is deposited in the memory
Program is contained, described program is loaded by the processor and executed to realize that permission as described in any one of claim 1 to 7 is matched
Set method;Alternatively, realizing authority configuring method as claimed in claim 8.
12. a kind of computer readable storage medium, which is characterized in that it has program stored therein in the storage medium, described program quilt
For realizing authority configuring method as described in any one of claim 1 to 7 when processor executes;Alternatively, realizing as right is wanted
Seek the authority configuring method described in 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810401117.9A CN108614976A (en) | 2018-04-28 | 2018-04-28 | Authority configuring method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810401117.9A CN108614976A (en) | 2018-04-28 | 2018-04-28 | Authority configuring method, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108614976A true CN108614976A (en) | 2018-10-02 |
Family
ID=63661248
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810401117.9A Pending CN108614976A (en) | 2018-04-28 | 2018-04-28 | Authority configuring method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108614976A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109829330A (en) * | 2018-12-28 | 2019-05-31 | 恒生电子股份有限公司 | A kind of svn authority setting method, device, system, electronic equipment |
CN110413262A (en) * | 2019-07-23 | 2019-11-05 | 北京启迪区块链科技发展有限公司 | A kind of management method of business function, apparatus and system |
CN111125743A (en) * | 2018-10-31 | 2020-05-08 | 上海哔哩哔哩科技有限公司 | Authority management method, system, computer device and computer readable storage medium |
CN111259376A (en) * | 2020-01-17 | 2020-06-09 | 中国平安人寿保险股份有限公司 | Authority configuration method, device, server and storage medium |
CN111552671A (en) * | 2019-12-31 | 2020-08-18 | 远景智能国际私人投资有限公司 | Permission setting method, device and equipment of file directory and storage medium |
CN112181480A (en) * | 2020-09-29 | 2021-01-05 | 北京达佳互联信息技术有限公司 | Authority management method and device of version management system |
CN112181481A (en) * | 2020-09-29 | 2021-01-05 | 北京达佳互联信息技术有限公司 | Authority updating method and device of version management system |
CN112507298A (en) * | 2020-11-30 | 2021-03-16 | 北京达佳互联信息技术有限公司 | User authentication method, device, server and storage medium |
CN113190829A (en) * | 2021-05-18 | 2021-07-30 | 京东数科海益信息科技有限公司 | Authority data identification method, device, equipment and medium |
CN113625968A (en) * | 2021-08-12 | 2021-11-09 | 网易(杭州)网络有限公司 | File authority management method and device, computer equipment and storage medium |
CN115146317A (en) * | 2022-07-29 | 2022-10-04 | 北京字跳网络技术有限公司 | Authority control method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103150394A (en) * | 2013-03-25 | 2013-06-12 | 中国人民解放军国防科学技术大学 | Distributed file system metadata management method facing to high-performance calculation |
CN103368765A (en) * | 2012-04-10 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Management system permission adding method and device |
CN106301940A (en) * | 2016-08-25 | 2017-01-04 | 厦门易灵网络科技有限公司 | A kind of authority configuring method |
CN106528300A (en) * | 2016-10-20 | 2017-03-22 | 厦门美图移动科技有限公司 | Console game synchronizing method, device and terminal |
CN107403105A (en) * | 2017-06-30 | 2017-11-28 | 华为技术有限公司 | The authority setting method and device of a kind of file system |
CN107451486A (en) * | 2017-06-30 | 2017-12-08 | 华为技术有限公司 | The authority setting method and device of a kind of file system |
-
2018
- 2018-04-28 CN CN201810401117.9A patent/CN108614976A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368765A (en) * | 2012-04-10 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Management system permission adding method and device |
CN103150394A (en) * | 2013-03-25 | 2013-06-12 | 中国人民解放军国防科学技术大学 | Distributed file system metadata management method facing to high-performance calculation |
CN106301940A (en) * | 2016-08-25 | 2017-01-04 | 厦门易灵网络科技有限公司 | A kind of authority configuring method |
CN106528300A (en) * | 2016-10-20 | 2017-03-22 | 厦门美图移动科技有限公司 | Console game synchronizing method, device and terminal |
CN107403105A (en) * | 2017-06-30 | 2017-11-28 | 华为技术有限公司 | The authority setting method and device of a kind of file system |
CN107451486A (en) * | 2017-06-30 | 2017-12-08 | 华为技术有限公司 | The authority setting method and device of a kind of file system |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125743B (en) * | 2018-10-31 | 2022-02-08 | 上海哔哩哔哩科技有限公司 | Authority management method, system, computer device and computer readable storage medium |
CN111125743A (en) * | 2018-10-31 | 2020-05-08 | 上海哔哩哔哩科技有限公司 | Authority management method, system, computer device and computer readable storage medium |
CN109829330A (en) * | 2018-12-28 | 2019-05-31 | 恒生电子股份有限公司 | A kind of svn authority setting method, device, system, electronic equipment |
CN110413262A (en) * | 2019-07-23 | 2019-11-05 | 北京启迪区块链科技发展有限公司 | A kind of management method of business function, apparatus and system |
CN111552671A (en) * | 2019-12-31 | 2020-08-18 | 远景智能国际私人投资有限公司 | Permission setting method, device and equipment of file directory and storage medium |
CN111552671B (en) * | 2019-12-31 | 2024-01-05 | 远景智能国际私人投资有限公司 | File directory authority setting method, device, equipment and storage medium |
CN111259376A (en) * | 2020-01-17 | 2020-06-09 | 中国平安人寿保险股份有限公司 | Authority configuration method, device, server and storage medium |
CN112181481A (en) * | 2020-09-29 | 2021-01-05 | 北京达佳互联信息技术有限公司 | Authority updating method and device of version management system |
CN112181480A (en) * | 2020-09-29 | 2021-01-05 | 北京达佳互联信息技术有限公司 | Authority management method and device of version management system |
CN112507298A (en) * | 2020-11-30 | 2021-03-16 | 北京达佳互联信息技术有限公司 | User authentication method, device, server and storage medium |
CN113190829A (en) * | 2021-05-18 | 2021-07-30 | 京东数科海益信息科技有限公司 | Authority data identification method, device, equipment and medium |
CN113190829B (en) * | 2021-05-18 | 2024-04-09 | 京东科技信息技术有限公司 | Authority data identification method, device, equipment and medium |
CN113625968A (en) * | 2021-08-12 | 2021-11-09 | 网易(杭州)网络有限公司 | File authority management method and device, computer equipment and storage medium |
CN113625968B (en) * | 2021-08-12 | 2024-03-01 | 网易(杭州)网络有限公司 | File authority management method and device, computer equipment and storage medium |
CN115146317A (en) * | 2022-07-29 | 2022-10-04 | 北京字跳网络技术有限公司 | Authority control method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108614976A (en) | Authority configuring method, device and storage medium | |
US11740891B2 (en) | Providing access to a hybrid application offline | |
US10585691B2 (en) | Distribution system, computer, and arrangement method for virtual machine | |
CN105677250B (en) | The update method and updating device of object data in object storage system | |
US9805209B2 (en) | Systems and methodologies for managing document access permissions | |
CN106462430A (en) | Method and device for obtaining application upgrade packages | |
US11768883B2 (en) | System and method for in-place record content management | |
CN114064563A (en) | Data migration method and server based on object storage | |
CN112580315A (en) | Webpage table display method and device, terminal equipment and medium | |
CN108154024A (en) | A kind of data retrieval method, device and electronic equipment | |
CN113127430B (en) | Mirror image information processing method, mirror image information processing device, computer readable medium and electronic equipment | |
CN111552956A (en) | Role authority control method and device for background management | |
CN116108233A (en) | Data processing method, device, equipment and storage medium | |
CN106776055A (en) | A kind of distributed lock method and system | |
CN112084003B (en) | Method, device, medium and electronic equipment for isolating data | |
US11451627B2 (en) | System and method for content management with intelligent data store access across distributed stores | |
CN114328521A (en) | Index library updating method and device | |
CN115237545A (en) | Method and device for accessing data | |
CN117950690A (en) | Container group upgrading method, device, equipment, storage medium and program product | |
CN116489016A (en) | Server management method, device, apparatus, storage medium, and program product | |
CN113961206A (en) | Patch package installation method and device, electronic equipment and storage medium | |
CN114647630A (en) | File synchronization method, information generation method, file synchronization device, information generation device, computer equipment and storage medium | |
US8645316B2 (en) | Storing records in databases in a randomized manner to effectively utilize database servers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181002 |
|
RJ01 | Rejection of invention patent application after publication |