CN116305175A - Account authority configuration method, device, equipment and storage medium - Google Patents

Account authority configuration method, device, equipment and storage medium Download PDF

Info

Publication number
CN116305175A
CN116305175A CN202211405455.2A CN202211405455A CN116305175A CN 116305175 A CN116305175 A CN 116305175A CN 202211405455 A CN202211405455 A CN 202211405455A CN 116305175 A CN116305175 A CN 116305175A
Authority
CN
China
Prior art keywords
name information
user name
registered
user
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211405455.2A
Other languages
Chinese (zh)
Inventor
蔡振江
陈保文
吴佳欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hexin Technology Suzhou Co ltd
Hexin Technology Co ltd
Original Assignee
Hexin Technology Suzhou Co ltd
Hexin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hexin Technology Suzhou Co ltd, Hexin Technology Co ltd filed Critical Hexin Technology Suzhou Co ltd
Priority to CN202211405455.2A priority Critical patent/CN116305175A/en
Publication of CN116305175A publication Critical patent/CN116305175A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the field of file system management, in particular to an account authority configuration method, an account authority configuration device, account authority configuration equipment and a storage medium, which comprise the following steps: receiving an account registration instruction, wherein the account registration instruction comprises user name information to be registered; if the user name information to be registered does not exist in the registered user name information database, adding the user name information to be registered to the registered user name information database; establishing a volume corresponding to the user name information to be registered, configuring memory amount for the volume, and generating mounting points corresponding to the volume; and setting user access rights for the user name information to be registered based on a first preset rule, wherein the user access rights are rights for the user to access the volume corresponding to the user name information of other people. The user access authority is set for the user name information to be registered based on the first preset rule, and compared with the manual setting of the user access authority, the error rate is low, and the working efficiency can be greatly improved.

Description

Account authority configuration method, device, equipment and storage medium
Technical Field
The present invention relates to the field of file system management, and in particular, to a method, an apparatus, a device, and a storage medium for configuring account rights.
Background
Currently, centralized file systems are more commonly used, and distributed file systems are relatively cool, and have many advantages that centralized file systems do not have, such as supporting oversized files, high fault tolerance, high data throughput, and streaming data access.
When using a distributed file system, it is usually necessary to assign corresponding access rights to the registered user, and if the access rights are set for the registered user by means of manual mode, the error rate is high and the efficiency is too low.
Disclosure of Invention
Therefore, the invention aims to solve the technical problems of high error rate and low efficiency of user permission setting, thereby providing an account permission configuration method which is applied to a distributed file system and comprises the following steps:
receiving an account registration instruction, wherein the account registration instruction comprises user name information to be registered;
if the user name information to be registered does not exist in the registered user name information database, adding the user name information to be registered to the registered user name information database;
establishing a volume corresponding to the user name information to be registered, configuring memory amount for the volume, and generating a mounting point corresponding to the volume;
and setting user access rights for the user name information to be registered based on a first preset rule, wherein the user access rights are rights for users to access volumes corresponding to the user name information of other people.
Preferably, the setting the user access right for the to-be-registered user name information based on the first preset rule includes:
identifying position information and special authority information carried in the account registration instruction;
and setting user access rights for the user name information to be registered based on the job position information and the special rights information.
Preferably, the method further comprises:
if the user name information to be registered exists in the registered user name information database, encoding the user name information to be registered according to a second preset rule to form new user name information to be registered;
if the new to-be-registered user name information does not exist in the registered user name information database, storing the new to-be-registered user name information into the registered user name information database;
and if the registered user name information database stores the new user name information to be registered, encoding the new user name information to be registered according to a second preset rule again to form updated user name information to be registered.
Preferably, the second preset rule is adding system time to the user name information to be registered.
Preferably, the method further comprises:
if the user name information to be registered exists in the registered user name information database, encoding the user name information to be registered according to a second preset rule to form new user name information to be registered;
displaying a plurality of pieces of new user name information to be registered, wherein the plurality of pieces of new user name information to be registered do not exist in a registered user name information database;
and receiving an account registration instruction of selecting new user name information to be registered by a user, and adding the new user name information to be registered selected by the user to the registered user name information database.
Preferably, the account registration instruction further includes group information, wherein the group information is a group to which the user corresponding to the user name information to be registered belongs;
after adding the to-be-registered user name information to the registered user name information database, the method further includes:
adding the user name information to be registered to a corresponding group based on the group information;
if the user name information to be registered is not successfully added to the corresponding group, detecting whether the corresponding group exists or not;
if the corresponding group does not exist, the corresponding group is newly established, and the user name information to be registered is added to the corresponding group;
if the corresponding group exists, error information is fed back to the administrator.
Preferably, after the user name information to be registered is successfully added to the corresponding group, the method includes:
receiving a set instruction of group access authority, wherein the group access authority is the access authority of all users in a group to volumes of other group users;
and setting the group access rights of the group based on the setting instruction.
The invention also provides an account authority configuration device which is applied to the distributed file system and comprises:
the receiving module is used for receiving an account registration instruction, wherein the account registration instruction comprises user name information to be registered;
an adding module, configured to add the to-be-registered user name information to a registered user name information database if the to-be-registered user name information does not exist in the registered user name information database;
the volume setting module is used for establishing a volume corresponding to the user name information to be registered, configuring memory amount for the volume and generating a mounting point corresponding to the volume;
and the permission setting module is used for setting user access permission for the user name information to be registered based on a first preset rule, wherein the user access permission is the permission of a user to access a volume corresponding to the user name information of other people.
The present invention also provides a computer device comprising: the system comprises a memory and a processor, wherein the memory and the processor are in communication connection, the memory stores computer instructions, and the processor executes the computer instructions so as to execute the account authority configuration method.
The invention also provides a computer readable storage medium, wherein the computer readable storage medium stores computer instructions, and the computer instructions are used for enabling a computer to execute the account authority configuration method.
The technical scheme of the invention has the following advantages:
1. after an account registration instruction is received, if user name information to be registered contained in the account registration instruction does not exist in a registered user name information database, the user name information to be registered is added into the registered user name information database, namely, the account registration corresponding to the user name information to be registered is completed, and a corresponding volume and an allocated memory amount are established for the user name information to be registered. The user access authority is set for the user name information to be registered based on the first preset rule, and compared with the manual setting of the user access authority, the user access authority setting method has the advantages that the error rate is low, the working efficiency can be greatly improved, and the experience of operators is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an account authority configuration method according to embodiment 1 of the present invention;
fig. 2 is a flowchart of generating user name information in the account authority configuration method of embodiment 1 of the present invention;
fig. 3 is another flowchart of generating user name information in the account authority configuration method of embodiment 1 of the present invention;
fig. 4 is a flowchart of adding user name information to a group in the account authority configuration method of embodiment 1 of the present invention;
fig. 5 is a block diagram of an account authority configuration device according to embodiment 2 of the present invention;
fig. 6 is a schematic structural diagram of a computer device according to embodiment 3 of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the description of the present invention, it should be noted that the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, the technical features of the different embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
When using the distributed file system, each registered user is set with a corresponding access right, and the current method for setting the access right for the registered user generally adopts a manually setting method, namely, an administrator sets the access right for the registered user during registration. However, the mode of manually setting the access permission has high error rate, low efficiency and serious influence on the use experience.
Example 1
The present embodiment provides an account authority configuration method, as shown in fig. 1, fig. 1 is a flowchart illustrating that the present embodiment receives an account registration instruction, adds user name information to be registered to a registered user name information database, and sets user access authority for the user name information to be registered based on a first preset rule. While the processes described below include a number of operations that occur in a particular order, it should be clearly understood that the processes may include more or less operations that may be performed sequentially or in parallel (e.g., using a parallel processor or a multi-threaded environment).
The embodiment provides an account authority configuration method which is applied to a distributed file system to reduce error rate and improve efficiency. Various management command suites are integrated in the distributed file system, including a protection server command suite, a volume location server command suite, a file server command suite and the like, and the command suites are integrated to realize unified operation on users, groups, volumes, mounting points and access rights. As shown in fig. 1, the method comprises the following steps:
s101, receiving an account registration instruction.
In the implementation step, the account registration instruction may be triggered by an administrator through a command, for example, by clicking a button, voice or gesture, so that the terminal device receives the account registration instruction for performing a subsequent operation. The terminal equipment comprises, but is not limited to, a mobile phone, a computer, a tablet computer, a smart watch, a smart bracelet and the like.
The account registration instruction comprises user name information to be registered, a password, an IP address and the like, in the distributed file system, the user information which is registered previously exists in a registered user name information database, namely, the user name in the registered user name information database is registered with a corresponding account, and if the user name information to be registered is the same as the user name information in the registered user name information database, the account registration using the user name information to be registered fails.
S102, judging whether the user name information to be registered exists in a registered user name information database.
In the implementation step, if the to-be-registered user name information does not exist in the registered user name information database, a corresponding account may be registered according to the to-be-registered user name information, that is, step S103 may be performed.
S103, adding the user name information to be registered to the registered user name information database.
In the implementation step, the user name information to be registered is added into a registered user name information database, namely, a corresponding account is registered according to the user name information to be registered.
S104, establishing a volume corresponding to the user name information to be registered, configuring memory amount for the volume, and generating a mounting point corresponding to the volume.
In the implementation step, after the registration of the account is completed by the user name information to be registered, a corresponding volume is established for the account, and a corresponding memory amount is configured for the volume, wherein the size of the memory amount can be set automatically by a system or can be set by receiving an order of an administrator. Meanwhile, in order to facilitate access to the volume, mounting points corresponding to the volume are generated.
For convenience in management and operation, the volume can be backed up and copied, and the backup volume refers to the backup of all data contained in the volume so far; copying a volume refers to backing up not only all of the data contained in the volume so far, but also the data subsequently added to the volume.
S105, setting user access rights for the user name information to be registered based on a first preset rule.
In the implementation step, the user access authority is the authority of the user to access the volume corresponding to the user name information of the other people, namely, the authority of the user name to be registered to access the volume of the other people is set, and the authority of the other people to access the volume of the user to be registered is also set. The access authority of each user does not need to be manually operated, and the operation steps can be greatly saved, so that the time is saved.
For example, after the user a completes the registration of the account, the system establishes a corresponding volume a for the user a, the user B and the user C are users who complete the registration prior to the user a, and after the user a completes the establishment of the volume, the user access authority is set for the user a based on a first preset rule, that is, the authority of the user a to access the volume B corresponding to the user B, the authority of the user a to access the volume C corresponding to the user C, the authority of the user B to access the volume a corresponding to the user a, and the authority of the user C to access the volume a corresponding to the user a are set.
In the above embodiment, after receiving the account registration instruction, if the to-be-registered user name information included in the account registration instruction does not exist in the registered user name information database, the to-be-registered user name information is added to the registered user name information database, that is, the registration of the account corresponding to the to-be-registered user name information is completed, and a corresponding volume and an allocated memory amount are established for the to-be-registered user name information. The user access authority is set for the user name information to be registered based on the first preset rule, and compared with the manual setting of the user access authority, the user access authority setting method has the advantages that the error rate is low, the working efficiency can be greatly improved, and the experience of operators is improved.
In one or more embodiments, the account registration instructions include job information and special rights information. Setting user access rights for user name information to be registered based on a first preset rule, including:
identifying position information and special authority information carried in the account registration instruction;
and setting user access rights for the user name information to be registered based on the job position information and the special rights information.
The position information and the special authority information can be filled in by an administrator when an account registration application is performed. In some embodiments, the account registration instruction may only carry position information or only carry special authority information.
In one or more embodiments, as shown in fig. 2, if the above step S102 determines that the to-be-registered user name information already exists in the registered user name information database, the following steps may be performed:
s106, coding the user name information to be registered according to a second preset rule to form new user name information to be registered.
In the implementation step, the second preset rule may be adding a system time to the to-be-registered user name information, where the system time may be: the/month/day can also be: the format of the day/time/minute and the system time can be reasonably selected by a person skilled in the art according to the actual situation. For example, when the system time is 3 months and 14 days, the new user name information to be registered is A3 months and 14 days.
S107, judging whether new user name information to be registered exists in the registered user name information database.
In the implementation step, the new user name information to be registered is compared with the user name information existing in the registered user name information database, so as to further judge whether the new user name information to be registered is registered.
If the registered user name information database does not have new user name information to be registered, step S109 is performed to store the new user name information to be registered to the registered user name information database. The registration of the account is completed by using the new user name information to be registered, rather than feeding back to the administrator, so that the administrator modifies the user name information to be registered. Therefore, the working efficiency is improved, and the user experience is also improved.
In step S107, if there is new user name information to be registered in the registered user name information database, step S108 is performed.
S108, encoding the new user name information to be registered again according to a second preset rule to form updated user name information to be registered.
In the implementation step, since the new to-be-registered user name information exists in the registered user name information database, the registration of the account cannot be completed by using the new to-be-registered user name information. And encoding the new user name information to be registered by using a second preset rule again to form updated user name information to be registered.
Comparing the updated user name information to be registered with the user name information existing in the registered user name information database again, and if the updated user name information to be registered does not exist in the registered user name information database, completing account registration by utilizing the updated user name information to be registered; if the updated to-be-registered user name information exists in the registered user name information database, the updated to-be-registered user name information is encoded again according to a second preset rule, and the like until the to-be-registered user name information formed by the last encoding does not exist in the registered user name information database.
For example, if the to-be-registered user name information a exists in the registered user name information database, encoding the to-be-registered user name information a by using a second preset rule to form to-be-registered user name information B, and if the to-be-registered user name information B does not exist in the registered user name information database, completing account registration by using the to-be-registered user name information B; and if the to-be-registered user name information B exists in the registered user name information database, encoding the to-be-registered user name information B again by using a second preset rule to form to-be-registered user name information C.
The user name information C to be registered and the user name information B to be registered are executed in the same steps, and if the user name information C to be registered does not exist in the registered user name information database, account registration is completed by using the user name information C to be registered; and if the to-be-registered user name information C exists in the registered user name information database, encoding the to-be-registered user name information C again by using a second preset rule.
In some embodiments, as shown in fig. 3, if the above step S102 determines that the to-be-registered user name information already exists in the registered user name information database, the following steps may be performed:
s110, coding the user name information to be registered according to a second preset rule to form new user name information to be registered.
The implementation steps are the same as step S106, and will not be described here again. However, in step S106, only one new user name information to be registered that is not present in the registered user name information database needs to be generated, whereas in step S110, several new user name information to be registered that is not present in the registered user name information database needs to be generated.
S111, displaying a plurality of new user name information to be registered.
In the implementation step, a plurality of pieces of new user name information to be registered are displayed on the display interface of the terminal device, and the displayed pieces of new user name information to be registered are not present in the registered user name information database. The administrator can select one from a plurality of pieces of new user name information to be registered according to the requirement, and can reset one piece of user name information to be registered.
S112, receiving an account registration instruction of selecting new user name information to be registered by the user, and adding the new user name information to be registered selected by the user to the registered user name information database.
In the implementation step, the user selects one of the displayed user name information to be registered, namely, re-triggers an account registration instruction, wherein the account registration instruction comprises the user name information to be registered which is not in the registered user name information database. And adding the new user name information to be registered selected by the user into a registered user name information database, and completing the registration of the corresponding account.
For example, the to-be-registered user name information a is encoded according to the second preset rule to form to-be-registered user name information B and to-be-registered user name information C, and the to-be-registered user name information B and the to-be-registered user name information C are displayed on the display interface of the terminal device, because the to-be-registered user name information a exists in the registered user name information database.
The administrator can select the to-be-registered user name information B or the to-be-registered user name information C, so that the account number is registered by using the to-be-registered user name information B or the to-be-registered user name information C.
While the above-described processes include a plurality of operations that occur in a particular order, it should be understood that these processes may include additional or fewer operations, which may be performed in sequence or in parallel (e.g., using a parallel processor or a multi-threaded environment).
In one or more embodiments, the account registration instruction may further include group information, where the group information is a group to which a user corresponding to the to-be-registered user name information belongs, and the group may be a storage space in the system.
After adding the user name information to be registered to the registered user name information database, that is, after completing the registration of the corresponding account, the method may further include the steps of:
adding user name information to be registered to a corresponding group based on the group information;
if the user name information to be registered is not successfully added to the corresponding group, detecting whether the corresponding group exists;
if the corresponding group does not exist, a corresponding group is newly established, and the user name information to be registered is added to the corresponding group; if the corresponding group exists, an error message is fed back to the administrator.
The group to which the user belongs can be set by an administrator, and the user accounts of the same group can be placed in the same group so as to facilitate the management of the user. When the error information is fed back to the administrator, the error information can be fed back to the administrator through a mailbox, instant messaging software or a mode of displaying the error information on a display interface of the terminal equipment, so that the administrator can modify the error in time.
In one or more embodiments, after the user name information to be registered is successfully added to the corresponding group, the method further includes:
receiving a set instruction of group access authority, wherein the group access authority is the access authority of all users in a group to volumes of other group users; and setting the group access rights of the group based on the setting instruction.
For example, after the user name information a to be registered is added to the group a, a setting instruction of the group access right of the group a is received, and a uniform access right is set for all members of the group a. And simultaneously, a set instruction of the group access authority of the group b can be received, and uniform access authority can be set for all members of the group b.
The above operation steps can be recorded by the system and generate a record list, so that the subsequent inquiry is facilitated.
Example 2
The embodiment provides an account authority configuration device, which is applied to a distributed file system, as shown in fig. 5, and includes:
the receiving module 301 is configured to receive an account registration instruction, where the account registration instruction includes user name information to be registered. Please refer to the related description of step S101 in embodiment 1 for details, which are not repeated here.
An adding module 302, configured to add the to-be-registered user name information to the registered user name information database if the to-be-registered user name information does not exist in the registered user name information database. Please refer to the related descriptions of step S102 and step S103 in embodiment 1 for details, which are not repeated here.
And the volume setting module 303 is configured to establish a volume corresponding to the user name information to be registered, configure a memory amount for the volume, and generate a mount point corresponding to the volume. Please refer to the related description of step S104 in embodiment 1 for details, which are not repeated here.
And the permission setting module 304 is configured to set a user access permission for the to-be-registered user name information based on a first preset rule, where the user access permission is a permission for a user to access a volume corresponding to user name information of another person. Please refer to the related description of step S105 in embodiment 1 for details, which are not repeated here.
In the above embodiment, the receiving module 301 receives the account registration instruction, and if the to-be-registered user name information included in the account registration instruction does not exist in the registered user name information database, the adding module 302 adds the to-be-registered user name information to the registered user name information database, that is, completes the registration of the account corresponding to the to-be-registered user name information. The volume setting module 303 establishes a corresponding volume for the user name information to be registered and allocates a memory amount. The permission setting module 304 sets user access permission for the user name information to be registered based on a first preset rule, and compared with manually setting the user access permission, the permission setting module has low error rate, can greatly improve the working efficiency and improve the experience of operators.
Example 3
The present embodiment provides a computer device, as shown in fig. 6, which includes a processor 401 and a memory 402, where the processor 401 and the memory 402 may be connected by a bus or other means, and in fig. 6, the connection is exemplified by a bus.
The processor 401 may be a central processing unit (Central Processing Unit, CPU). The processor 401 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), graphics processor (Graphics Processing Unit, GPU), embedded Neural network processor (Neural-network Processing Unit, NPU) or other dedicated deep learning coprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc., or a combination of the above.
The memory 402, as a non-transitory computer readable storage medium, may be used to store a non-transitory software program, a non-transitory computer executable program, and modules, such as program instructions/modules (e.g., the receiving module 301, the adding module 302, the volume setting module 303, and the permission setting module 304 shown in fig. 4) corresponding to the account permission configuration method in the embodiment of the present invention. The processor 401 executes various functional applications of the processor and data processing by running non-transitory software programs, instructions, and modules stored in the memory 402, that is, implements the account authority configuration method in the above-described method embodiment 1.
Memory 402 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created by the processor 401, or the like. In addition, memory 402 may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 402 may optionally include memory located remotely from processor 401, such remote memory being connectable to processor 401 through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules are stored in the memory 402 and when executed by the processor 401, perform the account authority configuration method in the embodiment shown in fig. 1.
In this embodiment, the memory 402 stores program instructions or modules of the account authority configuration method, and when the processor 401 executes the program instructions or modules stored in the memory 402, receives an account registration instruction, if the to-be-registered user name information included in the account registration instruction does not exist in the registered user name information database, adds the to-be-registered user name information to the registered user name information database, that is, completes the registration of the account corresponding to the to-be-registered user name information, and establishes a corresponding volume and allocates a memory amount for the to-be-registered user name information. The user access authority is set for the user name information to be registered based on the first preset rule, and compared with the manual setting of the user access authority, the user access authority setting method has the advantages that the error rate is low, the working efficiency can be greatly improved, and the experience of operators is improved.
The embodiment of the invention also provides a non-transitory computer storage medium, which stores computer executable instructions, and the computer executable instructions can execute the account authority configuration method in any of the method embodiments. Wherein the storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a Flash Memory (Flash Memory), a Hard Disk (HDD), or a Solid State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
It is apparent that the above examples are given by way of illustration only and are not limiting of the embodiments. Other variations or modifications of the above teachings will be apparent to those of ordinary skill in the art. It is not necessary here nor is it exhaustive of all embodiments. While still being apparent from variations or modifications that may be made by those skilled in the art are within the scope of the invention.

Claims (10)

1. An account authority configuration method is applied to a distributed file system and is characterized by comprising the following steps:
receiving an account registration instruction, wherein the account registration instruction comprises user name information to be registered;
if the user name information to be registered does not exist in the registered user name information database, adding the user name information to be registered to the registered user name information database;
establishing a volume corresponding to the user name information to be registered, configuring memory amount for the volume, and generating a mounting point corresponding to the volume;
and setting user access rights for the user name information to be registered based on a first preset rule, wherein the user access rights are rights for users to access volumes corresponding to the user name information of other people.
2. The account authority configuration method according to claim 1, wherein the setting the user access authority for the user name information to be registered based on the first preset rule includes:
identifying position information and special authority information carried in the account registration instruction;
and setting user access rights for the user name information to be registered based on the job position information and the special rights information.
3. The account authority configuration method according to claim 1, wherein the method further comprises:
if the user name information to be registered exists in the registered user name information database, encoding the user name information to be registered according to a second preset rule to form new user name information to be registered;
if the new to-be-registered user name information does not exist in the registered user name information database, storing the new to-be-registered user name information into the registered user name information database;
and if the registered user name information database stores the new user name information to be registered, encoding the new user name information to be registered according to a second preset rule again to form updated user name information to be registered.
4. An account authority configuration method according to claim 3, wherein the second preset rule is the user name information to be registered plus a system time.
5. The account authority configuration method according to claim 1, wherein the method further comprises:
if the user name information to be registered exists in the registered user name information database, encoding the user name information to be registered according to a second preset rule to form new user name information to be registered;
displaying a plurality of pieces of new user name information to be registered, wherein the plurality of pieces of new user name information to be registered do not exist in a registered user name information database;
and receiving an account registration instruction of selecting new user name information to be registered by a user, and adding the new user name information to be registered selected by the user to the registered user name information database.
6. The account authority configuration method according to any one of claims 1 to 5, wherein the account registration instruction further includes group information, wherein the group information is a group to which a user corresponding to the user name information to be registered belongs;
after adding the to-be-registered user name information to the registered user name information database, the method further includes:
adding the user name information to be registered to a corresponding group based on the group information;
if the user name information to be registered is not successfully added to the corresponding group, detecting whether the corresponding group exists or not;
if the corresponding group does not exist, the corresponding group is newly established, and the user name information to be registered is added to the corresponding group;
if the corresponding group exists, error information is fed back to the administrator.
7. The account authority configuration method according to any one of claims 1 to 6, comprising, after successfully adding the user name information to be registered to a corresponding group:
receiving a set instruction of group access authority, wherein the group access authority is the access authority of all users in a group to volumes of other group users;
and setting the group access rights of the group based on the setting instruction.
8. An account authority configuration device applied to a distributed file system is characterized by comprising the following components:
the receiving module is used for receiving an account registration instruction, wherein the account registration instruction comprises user name information to be registered;
an adding module, configured to add the to-be-registered user name information to a registered user name information database if the to-be-registered user name information does not exist in the registered user name information database;
the volume setting module is used for establishing a volume corresponding to the user name information to be registered, configuring memory amount for the volume and generating a mounting point corresponding to the volume;
and the permission setting module is used for setting user access permission for the user name information to be registered based on a first preset rule, wherein the user access permission is the permission of a user to access a volume corresponding to the user name information of other people.
9. A computer device, comprising: a memory and a processor, the memory and the processor being communicatively connected to each other, the memory having stored therein computer instructions, the processor executing the computer instructions to perform the account authority configuration method of any one of claims 1-7.
10. A computer-readable storage medium storing computer instructions for causing a computer to perform the account authority configuration method of any one of claims 1 to 7.
CN202211405455.2A 2022-11-10 2022-11-10 Account authority configuration method, device, equipment and storage medium Pending CN116305175A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211405455.2A CN116305175A (en) 2022-11-10 2022-11-10 Account authority configuration method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211405455.2A CN116305175A (en) 2022-11-10 2022-11-10 Account authority configuration method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116305175A true CN116305175A (en) 2023-06-23

Family

ID=86811898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211405455.2A Pending CN116305175A (en) 2022-11-10 2022-11-10 Account authority configuration method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116305175A (en)

Similar Documents

Publication Publication Date Title
US9935847B2 (en) Dynamic grouping of managed devices
CN110851253B (en) Remote operation and maintenance method, system, storage medium and electronic equipment
CN103544020A (en) Method and mobile terminal for displaying application software icons
CN111382008B (en) Virtual machine data backup method, device and system
CN111625810B (en) Equipment login method, equipment and system
CN108900627B (en) Network request method, terminal device and storage medium
CN112286723A (en) Computer room disaster recovery control method, terminal and storage medium
CN112631686A (en) Data processing method, data processing device, computer equipment and storage medium
CN113760611B (en) System site switching method and device, electronic equipment and storage medium
CN110807537A (en) Conference room reservation processing method and device, electronic equipment and storage medium
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN105468706A (en) Page display method and device
US9577967B2 (en) Method and system for managing an informational site using a social networking application
CN106933932B (en) Data processing method and device and application server
CN108984238B (en) Gesture processing method and device of application program and electronic equipment
CN116305175A (en) Account authority configuration method, device, equipment and storage medium
CN106941411B (en) Terminal control method and system
CN109656936A (en) Method of data synchronization, device, computer equipment and storage medium
CN111294377A (en) Network request sending method of dependency relationship, terminal device and storage medium
CN110768855B (en) Method and device for testing linkmzation performance
CN113986995A (en) Request distribution method and device, storage medium and electronic equipment
CN110445869B (en) Content publishing method, terminal and server based on distributed subscription
CN108924270B (en) Method for updating terminal contact information, server and storage medium
CN108351843B (en) Output control device and communication system
CN113852919B (en) Method and device for generating early warning message, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication