Font Size: a A A

The Design And Implemnetation Of User Permission Management System For Joincheer Development And Application

Posted on:2016-02-29Degree:MasterType:Thesis
Country:ChinaCandidate:D X YangFull Text:PDF
GTID:2308330503450419Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Development and application platform(DNA) is JOIN-CHEER with independent intellectual property rights of software development platform, DNA user permission management system is the basis of platform function, is the business data security. JOIN-CHEER implemented a series of products based on the DNA platform, then to implement projects through product. Regardless of the JQR or GMC, whether GSM or BI, needs to have user permission management functions.Therefore, put more energy and strength in DNA platform to realize the user permission management function, for the company’s various products, both to avoid the repeated development, reduce the cost of product research and development and maintenance, also improve the quality of the product user permission management functions.During design and implement DNA user permission management system, the first comb the company’s products business and non-business demand for user permissions.Then, research the access control model and application scenario, the logic framework underlying framework injection of resources and the management pattern, permissions inheritance and inheritance path, the rule of the declaration and registration method, determining the selection of access control model, forming documents including the architecture, the relationship between the class diagram, data table structure design.System implementation process of the spiral development mode, the system prototype, forming first, based on the prototype gradually improve, after many iterations, finally completed the user privilege management, rights management, auditing, right, authority for examination and approval of operation configuration seven function point of five modules.Solved key problems such as the access multiple inheritance, user identity, the declaration and registration of the rules, and lazy loading authority.System is used in the company’s products, the Technical Support Specialist and the end user’s give the high praise, achieved the target of the original design.
Keywords/Search Tags:Permission inheritance, Permission rule, User identity
PDF Full Text Request
Related items