CN115758303A - Authority control method, device, equipment and storage medium - Google Patents
Authority control method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN115758303A CN115758303A CN202211663588.XA CN202211663588A CN115758303A CN 115758303 A CN115758303 A CN 115758303A CN 202211663588 A CN202211663588 A CN 202211663588A CN 115758303 A CN115758303 A CN 115758303A
- Authority
- CN
- China
- Prior art keywords
- authority
- identity
- proxy
- permission
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 230000008859 change Effects 0.000 claims description 32
- 238000012508 change request Methods 0.000 claims description 27
- 239000003795 chemical substances by application Substances 0.000 description 87
- 238000013475 authorization Methods 0.000 description 19
- 238000007726 management method Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本申请涉及信息安全领域,尤其涉及一种权限控制方法、装置、设备及存储介质。The present application relates to the field of information security, and in particular to an authority control method, device, equipment and storage medium.
背景技术Background technique
目前常见的权限管理方法包括基于角色的权限控制(英文简称RBAC),通过角色关联用户,角色关联权限的方式间接赋予用户权限。The current common authority management methods include role-based authority control (abbreviated as RBAC in English), in which roles are associated with users and roles are associated with authority to indirectly grant user authority.
但是基于角色的权限控制RBAC在授权灵活度和维护性上受限,若现有的角色权限不满足某用户的权限需求,只能针对该用户设置新角色并逐条配置该角色对应配置权限,对权限的维护较为困难,无法针对各用户对权限需求的差异进行快速、灵活的权限配置。However, role-based authority control RBAC is limited in authorization flexibility and maintainability. If the existing role authority does not meet the authority requirements of a user, you can only set a new role for the user and configure the corresponding configuration authority of the role one by one. The maintenance of permissions is difficult, and it is impossible to quickly and flexibly configure permissions according to the differences in permission requirements of various users.
发明内容Contents of the invention
本申请提供一种权限控制方法、装置、设备及存储介质,用以解决的问题。The present application provides a permission control method, device, equipment and storage medium to solve the problem.
第一方面,本申请提供一种权限控制方法,包括:In a first aspect, the present application provides a permission control method, including:
获取实体用户终端发送的代理权限设置请求;所述代理权限设置请求中包括:个人用户标识、至少一个权限集对应标识;所述权限集中包括至少一条权限;Obtaining a proxy permission setting request sent by an entity user terminal; the proxy permission setting request includes: an individual user identifier, at least one corresponding identifier of a permission set; the permission set includes at least one permission;
根据代理权限设置请求为所述个人用户标识生成代理身份标识并将所述代理身份标识与个人用户标识关联存储于数据库中;Generate a proxy identity for the personal user ID according to the proxy authority setting request, and store the proxy ID in a database in association with the personal user ID;
根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限,以根据所述代理身份标识与所述个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。Determine the authority corresponding to at least one authority set as the authority corresponding to the agent identity according to the agent authority setting request, so as to determine the authority corresponding to the agent identity as the individual user according to the association relationship between the agent identity and the personal user identity corresponding permissions.
可选地,预先设置所述权限集中包括的权限,包括:Optionally, the permissions included in the permission set are preset, including:
获取通过实体用户终端中权限集设置界面发送的权限集生成请求,并确定在权限集设置界面选中的至少一条权限;所述选中的至少一条权限在实体用户标识对应权限中;Obtaining the permission set generation request sent through the permission set setting interface in the entity user terminal, and determining at least one permission selected on the permission set setting interface; the selected at least one permission is in the permission corresponding to the entity user identifier;
生成权限集对应标识并将选中的至少一条权限确定为该权限集中包括的权限。Generate a corresponding identifier of the permission set and determine at least one selected permission as a permission included in the permission set.
可选地,所述根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限之后,还包括:Optionally, after determining the authority in at least one authority set corresponding identifier as the authority corresponding to the agent identity identifier according to the agent authority setting request, the method further includes:
获取通过实体用户终端中权限管理界面发送的代理权限变更请求;所述代理权限变更请求包括代理身份标识及对应的权限变更信息;Obtaining an agent authority change request sent through the authority management interface in the entity user terminal; the agent authority change request includes the agent identity and corresponding authority change information;
根据对应的权限变更信息采用访问控制列表更改代理身份标识对应权限。Use the access control list to change the corresponding authority of the proxy identity according to the corresponding authority change information.
可选地,第一方面所述的方法,还包括:Optionally, the method described in the first aspect further includes:
获取通过实体用户终端中权限管理界面发送的实体用户权限变更请求;所述实体用户权限变更请求包括实体用户标识及对应的权限变更信息;Obtaining an entity user authority change request sent through the authority management interface in the entity user terminal; the entity user authority change request includes an entity user identifier and corresponding authority change information;
根据对应的权限变更信息采用访问控制列表更改实体用户标识对应权限。According to the corresponding authority change information, the access control list is used to change the authority corresponding to the entity user ID.
可选地,所述根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限之后,还包括:Optionally, after determining the authority in at least one authority set corresponding identifier as the authority corresponding to the agent identity identifier according to the agent authority setting request, the method further includes:
获取个人用户终端发送的访问请求;Obtain access requests sent by individual user terminals;
若确定访问请求中不包括代理身份标识,则根据个人通用基础权限对访问请求进行用户级鉴权;If it is determined that the proxy identity is not included in the access request, user-level authentication is performed on the access request according to the personal general basic authority;
若确定用户级鉴权通过,则确定按所述访问请求执行访问操作。If it is determined that the user-level authentication passes, it is determined to perform an access operation according to the access request.
可选地,所述获取个人用户终端发送的访问请求之后,还包括:Optionally, after obtaining the access request sent by the personal user terminal, it also includes:
若确定访问请求中包括代理身份标识,则根据访问控制列表确定代理身份标识对应权限,并根据代理身份标识对应权限对访问请求进行代理级鉴权;If it is determined that the access request includes the proxy identity, then determine the authority corresponding to the agent identity according to the access control list, and perform proxy-level authentication on the access request according to the authority corresponding to the agent identity;
若确定代理级鉴权通过,则确定按所述访问请求执行访问操作。If it is determined that the proxy-level authentication passes, it is determined to perform an access operation according to the access request.
可选地,代理权限设置请求中还包括:实体用户标识;将所述代理身份标识与个人用户标识关联存储于数据库中,包括:Optionally, the proxy authority setting request also includes: an entity user ID; storing the proxy ID in a database in association with the personal user ID, including:
将代理权限设置请求中的实体用户标识与代理身份标识关联存储于数据库中;Store the entity user ID in the proxy authority setting request in association with the proxy ID in the database;
所述访问请求中包括鉴权模式信息;所述根据代理身份标识对应权限对访问请求进行代理级鉴权求之前,还包括:The access request includes authentication mode information; before performing proxy-level authentication on the access request according to the authority corresponding to the proxy identity, it also includes:
若根据鉴权模式信息确定将对所述访问请求进行二次鉴权,则确定与代理身份标识具有关联关系的实体用户标识;If it is determined according to the authentication mode information that the second authentication will be performed on the access request, then determine the entity user identifier associated with the proxy identity identifier;
根据访问控制列表及实体用户标识确定实体用户对应权限,并根据实体用户对应权限对访问请求进行根级鉴权;Determine the corresponding authority of the entity user according to the access control list and the entity user ID, and perform root-level authentication on the access request according to the corresponding authority of the entity user;
若确定根级鉴权通过,则根据代理身份标识对应权限对访问请求进行代理级鉴权。If it is determined that the root-level authentication is passed, the proxy-level authentication is performed on the access request according to the authority corresponding to the proxy identity.
第二方面,本申请提供一种权限控制装置,包括:In a second aspect, the present application provides an authority control device, including:
获取模块,用于获取实体用户终端发送的代理权限设置请求;所述代理权限设置请求中包括:个人用户标识、至少一个权限集对应标识;所述权限集中包括至少一条权限;An acquisition module, configured to acquire a proxy permission setting request sent by an entity user terminal; the proxy permission setting request includes: an individual user identifier, at least one corresponding identifier of a permission set; the permission set includes at least one permission;
存储模块,用于根据代理权限设置请求为所述个人用户标识生成代理身份标识并将所述代理身份标识与个人用户标识关联存储于数据库中;A storage module, configured to generate an agent identity for the personal user identity according to the agent authority setting request and store the agent identity in association with the individual user identity in the database;
确定模块,用于根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限,以根据所述代理身份标识与所述个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。A determining module, configured to determine the authority corresponding to at least one authority set as the authority corresponding to the agent identity according to the agent authority setting request, so as to determine the authority corresponding to the agent identity according to the association relationship between the agent identity and the personal user identity The authority is determined as the authority corresponding to the individual user.
第三方面,本申请提供一种电子设备,包括:处理器,以及与所述处理器通信连接的存储器及收发器;In a third aspect, the present application provides an electronic device, including: a processor, and a memory and a transceiver communicatively connected to the processor;
所述存储器存储计算机执行指令;所述收发器用于收发数据;The memory stores computer-executable instructions; the transceiver is used to send and receive data;
所述处理器执行所述存储器存储的计算机执行指令,以实现上述任一方面所述的权限控制方法。The processor executes the computer-executable instructions stored in the memory, so as to implement the permission control method described in any one of the above aspects.
第四方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,所述计算机执行指令被处理器执行时用于实现上述任一方面所述的权限控制方法。In a fourth aspect, the present application provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, they are used to realize the authority described in any of the above-mentioned aspects Control Method.
第五方面,本申请提供一种计算机程序产品,包括计算机执行指令,该计算机执行指令被处理器执行时实现上述任一方面所述的权限控制方法。In a fifth aspect, the present application provides a computer program product, including computer-executable instructions, and when the computer-executable instructions are executed by a processor, the permission control method described in any one of the above-mentioned aspects is implemented.
本申请提供的权限控制方法、装置、设备及存储介质,获取实体用户终端发送的代理权限设置请求;所述代理权限设置请求中包括:个人用户标识、至少一个权限集对应标识;所述权限集中包括至少一条权限;根据代理权限设置请求为所述个人用户标识生成代理身份标识并将所述代理身份标识与个人用户标识关联存储于数据库中;根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限,以根据所述代理身份标识与所述个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。采用权限集确定代理身份的权限,实现了代理身份的权限的快速、灵活设置;通过将代理身份授予个人用户确定个人用户的权限,实现了个人用户权限的快速、灵活设置。The authority control method, device, equipment, and storage medium provided in this application obtain the proxy authority setting request sent by the entity user terminal; the proxy authority setting request includes: an individual user identifier, at least one authority set corresponding identifier; the authority concentration Include at least one authority; generate an agent identity for the personal user identity according to the agent authority setting request and store the agent identity and the individual user identity in the database in association; according to the agent authority setting request, at least one authority set corresponds to the identity The authority corresponding to the agent identity is determined as the authority corresponding to the agent identity, so that the authority corresponding to the agent identity is determined as the authority corresponding to the individual user according to the association relationship between the agent identity and the individual user identity. The permission set is used to determine the authority of the agent identity, which realizes the rapid and flexible setting of the authority of the agent identity; by granting the agent identity to the individual user to determine the authority of the individual user, the rapid and flexible setting of the authority of the individual user is realized.
附图说明Description of drawings
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description serve to explain the principles of the application.
图1为本申请的一种网络架构示意图;FIG. 1 is a schematic diagram of a network architecture of the present application;
图2为本申请实施例一提供的权限控制方法流程图;FIG. 2 is a flow chart of the authority control method provided in
图3为本申请实施例四提供的一种权限控制方法流程图;FIG. 3 is a flow chart of an authority control method provided in Embodiment 4 of the present application;
图4为本申请实施例五提供的权限控制装置的结构示意图;FIG. 4 is a schematic structural diagram of an authority control device provided in Embodiment 5 of the present application;
图5为本申请实施例六提供的电子设备的结构示意图。FIG. 5 is a schematic structural diagram of an electronic device provided in Embodiment 6 of the present application.
通过上述附图,已示出本申请明确的实施例,后文中将有更详细的描述。这些附图和文字描述并不是为了通过任何方式限制本申请构思的范围,而是通过参考特定实施例为本领域技术人员说明本申请的概念。By means of the above drawings, specific embodiments of the present application have been shown, which will be described in more detail hereinafter. These drawings and text descriptions are not intended to limit the scope of the concept of the application in any way, but to illustrate the concept of the application for those skilled in the art by referring to specific embodiments.
具体实施方式Detailed ways
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings
时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中5所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权, unless otherwise indicated, the same numerals in different drawings indicate the same or similar elements. The implementations described in 5 in the following exemplary embodiments do not represent all implementations consistent with the present application. Rather, they are only related to the attached
利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。Examples of apparatus and methods consistent with aspects of this application are recited in the claims.
术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。在以下各实施例的描述中,“多个”的含义是两个以上,除非另有明确具体的限定。The terms "first", "second", etc. are used for descriptive purposes only, and should not be understood as indicating or implying relative importance or implicitly specifying the quantity of the indicated technical features. In the descriptions of the following embodiments, "plurality" means two or more, unless otherwise specifically defined.
0首先对本发明所涉及的现有技术进行详细说明及分析。0 First, the prior art involved in the present invention is described and analyzed in detail.
由于基于角色的权限控制RBAC在授权灵活度和维护性上受限,若现有的角色权限不满足某用户的权限需求,直接更改角色权限将同步变更具有该角色的用户权限,会导致权限混乱,因此对权限的维护较为困难,无法针对各用户对权限需求的差异进行快速、灵活的权限配置。Because role-based authority control RBAC is limited in authorization flexibility and maintainability, if the existing role authority does not meet the authority requirements of a user, directly changing the role authority will simultaneously change the user authority of the role, which will lead to authority confusion , so it is difficult to maintain permissions, and it is impossible to quickly and flexibly configure permissions according to the differences in permission requirements of various users.
5发明人在研究中发现,可以采用权限集确定代理身份的权限,可以实现代理身份的权5. The inventor found in the research that the authority of the agent identity can be determined by using the authority set, and the authority of the agent identity can be realized.
限的快速、灵活设置;将代理身份授予个人用户,可以通过代理身份确定个人用户的权限,可以实现个人用户权限的快速、灵活设置所以本申请提供一种权限控制方法,在获取实体用户终端发送的代理权限设置请求后,根据代理权限设置请求为个人用户标识生成代理身Fast and flexible setting of the limit; granting the proxy identity to the individual user, the authority of the individual user can be determined through the proxy identity, and the rapid and flexible setting of the authority of the individual user can be realized. After the proxy authority setting request, generate a proxy identity for the individual user ID according to the proxy authority setting request
份标识并将代理身份标识与个人用户标识关联存储于数据库中;根据代理权限设置请求将0至少一个权限集对应标识中的权限确定为代理身份标识对应权限,以根据代理身份标识与The identity of the agent and the association between the identity of the agent and the identity of the individual user are stored in the database; according to the proxy authority setting request, the authority in at least one identity set corresponding to 0 is determined as the authority corresponding to the identity of the agent, so that according to the identity of the agent and the
个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。The association relationship of the individual user identifier determines the authority corresponding to the agent identity identifier as the authority corresponding to the individual user.
图1为本申请的一种网络架构示意图,如图1所示,包括:个人用户终端1、实体用户终端2、电子设备3;个人用户可以在个人用户终端1中进行代理身份申请操作,以使FIG. 1 is a schematic diagram of a network architecture of the present application, as shown in FIG. 1 , including: a
个人用户终端1向实体用户终端2发送代理身份申请请求;实体用户终端2在接收到代理5身份申请请求后,若确定为个人用户标识建立代理身份,则可以向电子设备3发送的代理The
权限设置请求;电子设备3在接收到代理权限设置请求后,可以执行权限控制方法,确定代理身份的权限并将代理身份授予个人用户,从而将代理身份标识对应的权限确定为个人用户对应的权限。Permission setting request; after receiving the proxy permission setting request, the
本申请的技术方案中,所涉及的金融数据或用户数据等信息的收集、存储、使用、加0工、传输、提供和公开等处理,均符合相关法律法规的规定,且不违背公序良俗。In the technical solution of this application, the collection, storage, use, processing, transmission, provision, and disclosure of financial data or user data and other information involved are all in compliance with relevant laws and regulations, and do not violate public order and good customs.
下面以具体地实施例对本申请的技术方案以及本申请的技术方案如何解决上述技术问题进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。下面将结合附图,对本申请的实施例进行描述。The technical solution of the present application and how the technical solution of the present application solves the above technical problems will be described in detail below with specific embodiments. The following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below in conjunction with the accompanying drawings.
实施例一Embodiment one
图2为本申请实施例一提供的权限控制方法流程图,本申请实施例针对的问题,提供了权限控制方法。本实施例中的方法应用于权限控制装置,权限控制装置可以位于电子设备中。其中,电子设备可以为表示各种形式的数字计算机。诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。FIG. 2 is a flow chart of the authority control method provided by
如图2所示,该方法具体步骤如下:As shown in Figure 2, the specific steps of the method are as follows:
步骤S101、获取实体用户终端发送的代理权限设置请求。Step S101. Obtain the proxy authority setting request sent by the entity user terminal.
步骤S102、根据代理权限设置请求为个人用户标识生成代理身份标识并将代理身份标识与个人用户标识关联存储于数据库中。Step S102: Generate a proxy identity for the personal user ID according to the proxy authority setting request, and store the proxy ID in association with the personal user ID in the database.
步骤S103、根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限,以根据代理身份标识与个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。Step S103, according to the agency authority setting request, determine the authority corresponding to at least one authority set as the authority corresponding to the agent identity, so as to determine the authority corresponding to the agent identity as the individual user according to the association relationship between the agent identity and the individual user identity permission.
本申请实施例中,代理身份标识对应的权限为代理身份的权限。In this embodiment of the application, the authority corresponding to the proxy identity is the authority of the proxy identity.
本申请实施例中,实体用户可以为被访问资源的管理者,个人用户为被访问资源的访问者。例如,实体用户可以为企业用户或者具有唯一标识信息的实体层级用户,个人用户即为企业的具体员工或者个人客户。In this embodiment of the application, the entity user may be the manager of the accessed resource, and the individual user may be the visitor of the accessed resource. For example, an entity user may be an enterprise user or an entity-level user with unique identification information, and an individual user may be a specific employee of an enterprise or an individual customer.
本申请实施例中,实体用户与个人用户不通过上下层级或隶属关系进行关联,实现对个人用户的权限约束,而是通过实体用户向个人用户授予代理身份后通过代理身份向用户授权。In this embodiment of the application, entity users and individual users are not associated through upper and lower levels or affiliation relationships to implement authority constraints on individual users. Instead, entity users grant proxy identities to individual users and then authorize users through proxy identities.
其中,代理权限设置请求中包括:个人用户标识、至少一个权限集对应标识;权限集中包括至少一条权限。Wherein, the proxy authority setting request includes: an individual user identifier, at least one identifier corresponding to an authority set; and the authority set includes at least one authority.
本申请实施例不限制实体用户终端发送代理权限设置请求的方式。示例性地,个人用户可以向企业用户申请代理身份及对应的权限,实体用户终端在接收到代理身份申请请求后,可以响应于企业用户对该代理身份申请请求的确定操作向电子设备发送的代理权限设置请求。可选地,代理身份申请请求中可以包括:代理身份用途描述;以使实体用户可以通过代理身份用途描述确定需要授予代理身份的权限,从而确定代理权限设置请求中至少一个权限集对应标识。The embodiment of the present application does not limit the manner in which the entity user terminal sends the proxy permission setting request. Exemplarily, an individual user can apply for a proxy identity and corresponding authority from an enterprise user, and after receiving the proxy identity application request, the entity user terminal can respond to the corporate user's confirmation of the proxy identity application request and send the proxy ID to the electronic device. Permission setting request. Optionally, the proxy identity application request may include: a proxy identity purpose description; so that the entity user can determine the permissions that need to be granted to the proxy identity through the proxy identity purpose description, so as to determine the identity corresponding to at least one permission set in the proxy permission setting request.
示例性地,实体用户终端也可以响应于实体用户的代理身份授予操作向电子设备发送Exemplarily, the entity user terminal may also send the
代理权限设置请求;实体用户可以选择至少一个权限集对应标识,以生成个人用户对应的5代理身份,并将权限集中的权限确定为代理身份的权限,在实体用户触发确定控件后,实Proxy authority setting request; the entity user can select at least one identity corresponding to the authority set to generate the 5 agent identities corresponding to the individual user, and determine the authority in the authority set as the authority of the agent identity. After the entity user triggers the confirmation control, the implementation
体用户终端可以将包括个人用户标识、至少一个权限集对应标识的代理权限设置请求发送至电子设备。The individual user terminal may send to the electronic device a proxy permission setting request including the personal user identifier and at least one corresponding identifier of the permission set.
本申请实施例中,根据代理权限设置请求为个人用户标识生成代理身份标识并将代理In the embodiment of this application, according to the proxy permission setting request, the proxy identity is generated for the personal user ID and the proxy
身份标识与个人用户标识关联存储于数据库中,以为个人用户标识生成代理身份,使个人0用户可以使用该代理身份,采用该代理身份的权限访问资源。The identity identifier is associated with the personal user identifier and stored in the database to generate a proxy identity for the personal user identifier, so that the personal 0 user can use the proxy identity and access resources with the authority of the proxy identity.
本申请实施例中,可以预先设置至少一个权限集,实体用户可以通过选择至少一个权限集以使电子设备将权限集对应标识中的权限确定为代理身份标识对应权限,从而根据代理身份标识与个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。In this embodiment of the application, at least one permission set can be set in advance, and the entity user can select at least one permission set to make the electronic device determine the permission in the corresponding identifier of the permission set as the corresponding permission of the agent identity, so that according to the agent identity and the personal The association relationship of the user identification determines the authority corresponding to the agent identity identification as the authority corresponding to the individual user.
5可选地,代理权限设置请求中还可以包括:代理身份用途描述;以使用户在需要访问5 Optionally, the proxy authority setting request may also include: a description of the purpose of the proxy identity;
资源时,可以通过代理身份用途描述确定应该选择的代理身份。When using resources, you can determine the proxy identity that should be selected through the proxy identity usage description.
本申请实施例提供的权限控制方法,获取实体用户终端发送的代理权限设置请求;代理权限设置请求中包括:个人用户标识、至少一个权限集对应标识;权限集中包括至少一The authority control method provided by the embodiment of the present application obtains the proxy authority setting request sent by the entity user terminal; the proxy authority setting request includes: an individual user identifier, at least one corresponding identifier of the authority set; the authority set includes at least one
条权限;根据代理权限设置请求为个人用户标识生成代理身份标识并将代理身份标识与个0人用户标识关联存储于数据库中;根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限,以根据代理身份标识与个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。采用权限集确定代理身份的权限,实现了代理身份的权限的快速、灵活设置;通过将代理身份授予个人用户确定个人用户的权限,实现了个人用户权限的快速、灵活设置。According to the proxy permission setting request, the proxy identity identifier is generated for the individual user identifier and stored in the database in association with the proxy identity identifier and the individual user identifier; according to the proxy permission setting request, the permission in the corresponding identifier of at least one permission set is determined as The authority corresponding to the agent identity is used to determine the authority corresponding to the agent identity as the authority corresponding to the individual user according to the association relationship between the agent identity and the individual user identity. The permission set is used to determine the authority of the agent identity, which realizes the rapid and flexible setting of the authority of the agent identity; by granting the agent identity to the individual user to determine the authority of the individual user, the rapid and flexible setting of the authority of the individual user is realized.
5可选地,可以采用访问控制列表将至少一个权限集对应标识中的权限确定为代理身份5 Optionally, the access control list can be used to determine the authority in the identity corresponding to at least one authority set as the proxy identity
标识对应权限。Identifies the corresponding permissions.
具体地,可以预先设置代理级权限访问控制模型为身份识别与访问管理(英文简称:Specifically, the proxy-level permission access control model can be preset as Identity Recognition and Access Management (English abbreviation:
IAM,英文全称:Identity and Access Management)模型,IAM模型中的权限控制采用访IAM, English full name: Identity and Access Management) model, the permission control in the IAM model adopts the access
问控制列表(英文简称:ACL,英文全称:Access Control Lists);采用json格式根据至0少一个权限集对应标识及代理身份标识配置IAM模型;采用解析转换策略根据配置后的IAM模型配置访问控制列表,以根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限。Access control list (English abbreviation: ACL, English full name: Access Control Lists); use json format to configure the IAM model according to at least one permission set corresponding identifier and proxy identity identifier; use the analysis conversion strategy to configure access control according to the configured IAM model List, so as to determine the authority corresponding to the identity of at least one authority set as the authority corresponding to the agent identity according to the agent authority setting request.
其中,IAM可以控制基于用户的资源访问,并启用单点登录进行用户身份验证。IAM可以验证用户访问请求,并且可以授予或拒绝对访问资源的权限。ACL可以通过将主体(用户或用户组)和权限(包含操作和资源)关联成列表,控制主体能访问的资源。用户包括:个人用户、实体用户。Among them, IAM can control user-based resource access and enable single sign-on for user authentication. IAM can authenticate user access requests and can grant or deny permissions to access resources. ACL can control the resources a subject can access by associating subjects (users or user groups) and permissions (including operations and resources) into a list. Users include: individual users and entity users.
应理解的是,IAM可以让恰当的人或物,有恰当的权限,访问恰当的资源。其中“人或物”称为主体,“资源”称为客体)。传统的IAM一般包含如下几部分,常被称为“4A”或“5A”:账号、认证、权限、应用、审计。本申请中权限控制采用访问控制列表ACL。IAM可以基于ACL提供的主体、资源、操作三元ACL权限策略进行逻辑表达式运算;还可以根据授权效力元素对多条ACL权限鉴权结果进行逻辑与或运算;还可以采用解析转换策略进行IAM权限策略与ACL权限策略的解析转换,IAM权限策略与ACL权限策略的不同在于IAM权限策略是ACL权限策略的超集,包含除了主体、资源、操作外的更多权限元素,如授权效力元素;还可以对IAM权限策略进行查询、增加、删除、更新。It should be understood that IAM can allow appropriate people or things with appropriate permissions to access appropriate resources. Among them, "person or thing" is called the subject, and "resource" is called the object). Traditional IAM generally includes the following parts, often referred to as "4A" or "5A": account, authentication, authority, application, and audit. In this application, access control list (ACL) is used for permission control. IAM can perform logical expression operations based on the subject, resource, and operation ternary ACL permission policies provided by ACL; it can also perform logical AND or operations on multiple ACL permission authentication results according to authorization effect elements; it can also use analysis and conversion strategies for IAM The analysis and transformation of permission policy and ACL permission policy, the difference between IAM permission policy and ACL permission policy is that IAM permission policy is a superset of ACL permission policy, including more permission elements besides subject, resource and operation, such as authorization effect element; You can also query, add, delete, and update IAM permission policies.
本申请实施例中,IAM模型中包括IAM权限策略,可以采用json格式配置IAM权限策略中的元素;IAM权限策略中的元素包括:授权效力Effect元素、资源Resource元素、操作Action元素;资源元素可以包括:客体名称、服务名称、账号标识、具体资源标识。授权效力元素,可以类比白名单和黑名单分别代表的正向授权和反向授权方式;资源元素代表的是被授权的具体对象;操作元素是指对具体资源的操作,可以由资源元素中服务名称以及具体操作行为定义。In the embodiment of this application, the IAM model includes the IAM authority policy, and the elements in the IAM authority policy can be configured in json format; the elements in the IAM authority policy include: authorization effect Effect element, resource Resource element, and operation Action element; resource elements can be Including: object name, service name, account ID, specific resource ID. The authorization effect element can be compared to the forward authorization and reverse authorization represented by the whitelist and blacklist respectively; the resource element represents the specific authorized object; the operation element refers to the operation of specific resources, which can be served by the resource element Name and specific operation behavior definition.
具体地,采用解析转换策略根据配置后的IAM模型配置访问控制列表的方式为:根据IAM模型的格式获取到授权请求主体的身份信息,并获取资源元素数组和操作元素数组;主体身份信息确定后,遍历资源元素数组,对每一个资源元素生成一条第一ACL权限策略,并根据资源元素在该ACL权限策略中填入主体信息和资源信息;遍历操作元素数组,对每一个操作元素生成一条第二ACL权限策略,并根据操作元素在该ACL权限策略中填入操作信息;将第一ACL权限策略与第二ACL权限策略进行组合,得到完整的主体、资源、操作三元ACL权限策略。可选地,在解析转换完成获得三元ACL权限策略后,确认转换后的三元ACL权限策略数量与IAM权限策略中资源元素和操作元素的组合数相等,若不相等则重新进行ACL权限策略的配置。其中,主体的身份信息为代理身份标识。Specifically, the method of configuring the access control list according to the configured IAM model by adopting the parsing and conversion strategy is as follows: obtain the identity information of the subject of the authorization request according to the format of the IAM model, and obtain the resource element array and the operation element array; after the subject identity information is determined , traverse the array of resource elements, generate a first ACL permission policy for each resource element, and fill in the subject information and resource information in the ACL permission policy according to the resource element; traverse the array of operation elements, and generate a first ACL permission policy for each
实施例二Embodiment two
在上述实施例一的基础上,权限控制方法的具体步骤还包括实体用户注册及授权,具体包括:On the basis of the first embodiment above, the specific steps of the authority control method also include entity user registration and authorization, specifically including:
步骤S201、获取实体用户终端发送的实体用户注册请求。Step S201. Obtain an entity user registration request sent by an entity user terminal.
步骤S202、根据实体用户注册请求生成实体用户账户并确定对应的实体用户标识。Step S202, generating an entity user account according to the entity user registration request and determining a corresponding entity user identifier.
步骤S203、初始化实体用户标识对应的权限,以使该实体用户获取实体用户基础权限。Step S203, initializing the authority corresponding to the entity user identifier, so that the entity user obtains the entity user basic authority.
其中,实体用户可以为企业用户,则实体用户注册请求中可以包括:社会信用编码;还可以包括:企业名称、法人信息等。Wherein, the entity user may be an enterprise user, and the entity user registration request may include: social credit code; and may also include: enterprise name, legal person information, and the like.
可选地,在获取实体用户终端发送的实体用户注册请求后,还可以校验实体用户注册请求中的信息;在确定信息校验通过后根据实体用户注册请求生成实体用户账户并确定对应的实体用户标识。Optionally, after obtaining the entity user registration request sent by the entity user terminal, the information in the entity user registration request can also be verified; after the verification of the information is confirmed to be successful, the entity user account is generated according to the entity user registration request and the corresponding entity User ID.
本申请实施例中,可以将社会信用编码确定为实体用户标识,也可以按预设规则生成实体用户的唯一标识,本申请实施例对此不做限定。In the embodiment of the present application, the social credit code may be determined as the entity user identifier, or the unique identifier of the entity user may be generated according to preset rules, which is not limited in the embodiment of the present application.
在生成实体用户账户并确定对应的实体用户标识后,需要初始化实体用户标识对应的权限,以完成实体用户基础权限配置,实体用户基础权限可以包括:系统登录权限,认证信息查看权限,产品订阅权限,系统控制台访问权限等基础权限,以保证实体用户能完成基本操作。After the entity user account is generated and the corresponding entity user ID is determined, the permissions corresponding to the entity user ID need to be initialized to complete the configuration of the entity user's basic permissions. The entity user's basic permissions can include: system login permissions, authentication information viewing permissions, and product subscription permissions , system console access and other basic permissions to ensure that entity users can complete basic operations.
本申请实施例中,实体用户在首次注册发送实体用户注册请求并认证通过后,后续登录无需重复认证,只需输入账号和密码信息后验证登录。In the embodiment of this application, after the entity user registers for the first time and sends the entity user registration request and passes the authentication, the subsequent login does not require repeated authentication, and only needs to enter the account number and password information to verify the login.
在上述实施例的基础上,在实体用户注册并获取实体用户基础权限后,实体用户可以变更本实体用户的权限,变更本实体用户的权限的方式具体包括以下步骤:On the basis of the above-mentioned embodiments, after the entity user registers and obtains the entity user's basic authority, the entity user can change the authority of the entity user, and the method of changing the authority of the entity user specifically includes the following steps:
步骤S204、获取通过实体用户终端中权限管理界面发送的实体用户权限变更请求。Step S204, acquiring the entity user authority change request sent through the authority management interface in the entity user terminal.
其中,实体用户权限变更请求包括实体用户标识及对应的权限变更信息。对应的权限变更信息包括待变更的权限及对该权限的操作,例如增加或删除操作。Wherein, the entity user permission change request includes the entity user identifier and corresponding permission change information. The corresponding permission change information includes the permission to be changed and operations on the permission, such as adding or deleting operations.
步骤S205、根据对应的权限变更信息采用访问控制列表更改实体用户标识对应权限。Step S205, changing the authority corresponding to the entity user identifier by using the access control list according to the corresponding authority change information.
本申请实施例中,实体用户标识对应权限为实体用户的权限,代理身份标识对应的权限为代理身份的权限。In this embodiment of the application, the authority corresponding to the entity user identifier is the authority of the entity user, and the authority corresponding to the agent identity identifier is the authority of the agent identity.
本申请实施例不限制实体用户终端发送的实体用户权限变更请求的方式,可以响应于实体用户的操作向电子设备发送实体用户权限变更请求。示例性地,若新增可访问的资源,则实体用户可以针对该新增资源发送的实体用户权限变更请求,以增加对该新增资源的访问权限。The embodiment of the present application does not limit the manner of the entity user authority change request sent by the entity user terminal, and the entity user authority change request may be sent to the electronic device in response to an operation of the entity user. Exemplarily, if an accessible resource is newly added, the entity user may send an entity user authority change request for the newly added resource, so as to increase the access authority of the newly added resource.
本申请实施例中,采用访问控制列表ACL控制实体用户的访问权限。可以根据实体用户权限变更请求配置控制实体用户权限的访问控制列表,以更改实体用户标识对应权限。In this embodiment of the application, an access control list (ACL) is used to control the access rights of entity users. An access control list controlling entity user permissions may be configured according to an entity user permission change request, so as to change permissions corresponding to entity user identifiers.
本申请实施例提供的权限控制方法,获取通过实体用户终端中权限管理界面发送的实体用户权限变更请求;实体用户权限变更请求包括实体用户标识及对应的权限变更信息;根据对应的权限变更信息采用访问控制列表更改实体用户标识对应权限。采用访问控制列表可以实现更为灵活的访问权限控制,便于实体用户标识对应权限的变更,使实体用户标识对应权限灵活可配。The authority control method provided in the embodiment of this application obtains the entity user authority change request sent through the authority management interface in the entity user terminal; the entity user authority change request includes the entity user ID and corresponding authority change information; according to the corresponding authority change information, adopts The access control list changes the permissions corresponding to the entity user ID. Using the access control list can realize more flexible access authority control, facilitate the change of the authority corresponding to the entity user ID, and make the authority corresponding to the entity user ID flexible and configurable.
在上述实施例的基础上,实体用户可以根据本实体用户的权限设置权限集,设置权限集的方式具体包括以下步骤:On the basis of the above-mentioned embodiments, the entity user can set a permission set according to the permission of the entity user, and the way of setting the permission set specifically includes the following steps:
步骤S206、获取通过实体用户终端中权限集设置界面发送的权限集生成请求,并确定在权限集设置界面选中的至少一条权限。Step S206 , acquiring the permission set generation request sent through the permission set setting interface in the entity user terminal, and determining at least one permission selected in the permission set setting interface.
步骤S207、生成权限集对应标识并将选中的至少一条权限确定为该权限集中包括的权限。Step S207, generating an identifier corresponding to the permission set and determining at least one selected permission as a permission included in the permission set.
其中,选中的至少一条权限在实体用户标识对应权限中。Wherein, at least one selected permission is in the permission corresponding to the entity user identifier.
本申请实施例中,在实体用户确定实体用户标识对应权限后,可以确定根据需求至少一个权限集。In this embodiment of the present application, after the entity user determines the authority corresponding to the entity user ID, at least one authority set according to requirements may be determined.
具体地,实体用户终端中的权限集设置界面中可以显示实体用户标识对应权限,实体用户可以从中选中的至少一条权限,并向电子设备发送权限集生成请求。电子设备接送到权限集生成请求后可以生成权限集及权限集对应标识,并将选中的至少一条权限确定为该权限集中包括的权限。可选地,实体用户还可以删除其设置的权限集。Specifically, the authority set setting interface in the entity user terminal may display the authority corresponding to the entity user identifier, from which the entity user may select at least one authority, and send a permission set generation request to the electronic device. After receiving the permission set generation request, the electronic device may generate a permission set and a corresponding identifier of the permission set, and determine at least one selected permission as a permission included in the permission set. Optionally, entity users can also delete their set permission sets.
本申请实施例提供的权限控制方法,获取通过实体用户终端中权限集设置界面发送的权限集生成请求,并确定在权限集设置界面选中的至少一条权限;选中的至少一条权限在实体用户标识对应权限中;生成权限集对应标识并将选中的至少一条权限确定为该权限集中包括的权限。实体用户可以根据本身具备的权限灵活设置权限集,可以提高设置权限集的灵活性,进一步的提高了根据权限集设置代理权限的灵活性及个性化程度,在确保代理权限可以个性化设置的同时保证了设置代理权限的效率。The authority control method provided by the embodiment of the present application obtains the authority set generation request sent through the authority set setting interface in the entity user terminal, and determines at least one authority selected on the authority set setting interface; the selected at least one authority corresponds to the entity user ID Among the permissions: generating a corresponding identifier of the permission set and determining at least one selected permission as a permission included in the permission set. Entity users can flexibly set permission sets according to their own permissions, which can improve the flexibility of setting permission sets, further improve the flexibility and personalization of setting proxy permissions according to permission sets, and ensure that proxy permissions can be personalized. The efficiency of setting proxy permissions is guaranteed.
在上述实施例的基础上,在实体用户注册并确定实体用户标识对应权限后,可以发起访问请求,本申请实施例提供的权限控制方法可以针对该访问请求进行鉴权,具体包括以下步骤:On the basis of the above embodiments, after the entity user registers and determines the authority corresponding to the entity user ID, an access request can be initiated, and the authority control method provided in the embodiment of the present application can perform authentication on the access request, specifically including the following steps:
步骤S208、获取实体用户终端发送的访问请求。Step S208, acquiring the access request sent by the entity user terminal.
步骤S209、采用访问控制列表根据实体用户标识对应权限对该访问请求进行鉴权。Step S209, using the access control list to authenticate the access request according to the authority corresponding to the entity user identifier.
具体地,实体用户在登陆后,可以对需要访问或者操作的资源发起访问请求,实体用户终端将该访问请求发送至电子设备,以使电子设备采用访问控制列表对该访问请求进行鉴权。其中,访问请求中可以包括:实体用户标识、被访问的资源信息、操作信息。Specifically, after logging in, the entity user can initiate an access request to the resource that needs to be accessed or operated, and the entity user terminal sends the access request to the electronic device, so that the electronic device uses the access control list to authenticate the access request. Wherein, the access request may include: entity user identifier, accessed resource information, and operation information.
电子设备在接收到访问请求后,可以确定访问请求中的鉴权主体、资源及操作信息,基于主体信息查询得到该主体已被授权的权限信息,调用的ACL逻辑表达式运算进行匹配运算,得到鉴权是否通过的结果。若确定鉴权通过,则可以确定按访问请求执行访问操作;若确定鉴权未通过,则可以发送相应错误码和提示至实体用户终端。其中,主体信息为实体用户标识,主体已被授权的权限为实体用户标识对应权限。After receiving the access request, the electronic device can determine the authentication subject, resource and operation information in the access request, and obtain the authorized permission information of the subject based on the subject information query, and call the ACL logic expression operation to perform the matching operation, and obtain The result of whether the authentication is passed. If it is determined that the authentication is passed, it may be determined to perform an access operation according to the access request; if it is determined that the authentication is not passed, a corresponding error code and a prompt may be sent to the entity user terminal. Wherein, the subject information is the entity user ID, and the authorized authority of the subject is the corresponding authority of the entity user ID.
实施例三Embodiment Three
在上述任一实施例的基础上,权限控制方法的具体步骤还包括个人用户注册及授权,具体包括:On the basis of any of the above embodiments, the specific steps of the authority control method also include individual user registration and authorization, specifically including:
步骤S301、获取个人用户终端发送的个人用户注册请求。Step S301. Obtain an individual user registration request sent by an individual user terminal.
步骤S302、根据个人用户注册请求生成个人用户账户并确定对应的个人用户标识。Step S302, generating an individual user account and determining a corresponding individual user ID according to the individual user registration request.
步骤S303、初始化个人用户标识对应的权限,以使该个人用户获取个人通用基础权限。Step S303 , initializing the authority corresponding to the individual user ID, so that the individual user can obtain personal general basic authority.
其中,个人通用基础权限可以包括:系统登录权限,订阅权限,控制台访问权限等权限。Among them, personal general basic permissions may include: system login permissions, subscription permissions, console access permissions and other permissions.
本申请实施例中,个人用户注册的方式与实体注册的方式类似,在此不再一一赘述。In the embodiment of the present application, the manner of individual user registration is similar to the manner of entity registration, and will not be repeated here.
可选地,个人用户注册请求中可以包括手机号,可以将手机号确定为个人用户标识。Optionally, the personal user registration request may include a mobile phone number, and the mobile phone number may be determined as the personal user identifier.
在上述实施例的基础上,在个人用户注册并获取个人用户基础权限后,可以采用实施例一中步骤S101到步骤S103的方法使个人用户获取代理身份及代理身份标识对应的权限。On the basis of the above-mentioned embodiments, after the individual user registers and obtains the basic authority of the individual user, the method from step S101 to step S103 in the first embodiment can be used to enable the individual user to obtain the agent identity and the authority corresponding to the agent identity identifier.
在使个人用户获取代理身份及代理身份标识对应的权限后,可以变更本个人用户的权限,变更本个人用户的权限的方式具体包括以下步骤:After the individual user obtains the agent identity and the authority corresponding to the agent identity identifier, the authority of the individual user can be changed. The method of changing the authority of the individual user specifically includes the following steps:
步骤S304、获取通过实体用户终端中权限管理界面发送的实体用户权限变更请求。Step S304, acquiring the entity user authority change request sent through the authority management interface in the entity user terminal.
其中,实体用户权限变更请求包括实体用户标识及对应的权限变更信息。Wherein, the entity user permission change request includes the entity user identifier and corresponding permission change information.
步骤S305、根据对应的权限变更信息采用访问控制列表更改实体用户标识对应权限。Step S305, changing the authority corresponding to the entity user identifier by using the access control list according to the corresponding authority change information.
本申请实施例不限制实体用户终端发送的权限变更请求的方式,与实体用户终端发送的代理权限设置请求的方式类似,实体用户终端可以在接收到个人用户终端发送的代理权限设置申请后发送代理权限变更请求,也可以响应于实体用户的代理身份授予操作向电子设备发送代理权限设置请求。The embodiment of the present application does not limit the method of the permission change request sent by the entity user terminal. It is similar to the method of the proxy permission setting request sent by the entity user terminal. The entity user terminal can send the proxy permission setting request sent by the personal user terminal. The permission change request may also send a proxy permission setting request to the electronic device in response to the entity user's proxy identity granting operation.
示例性地,个人用户使用代理身份访问资源时,若系统提示鉴权未通过,则个人用户可以通过个人用户终端向电子设备发送代理权限设置申请,以申请向该代理身份添加相关资源权限。电子设备可以查询拥有相关权限的实体用户,向对应的实体用户终端发送申请授权的授权申请通知,授权申请通知中可以包括:个人用户的基础信息和代理身份详细信息;代理身份详细信息包括:代理身份授予者,代理身份用途描述。在实体用户终端接收到授权申请通知后,实体用户可以查看个人用户资质后判断是否进行授权;若确定进行授权则可以通过实体用户终端中权限管理界面向电子设备发送代理权限变更请求。Exemplarily, when an individual user uses a proxy identity to access resources, if the system prompts that the authentication fails, the individual user may send an application for setting proxy permissions to the electronic device through the personal user terminal to apply for adding relevant resource permissions to the proxy identity. The electronic device can query the entity users with relevant authority, and send an authorization application notification to the corresponding entity user terminal to apply for authorization. The authorization application notification can include: the basic information of the individual user and the detailed information of the agent identity; the detailed information of the agent identity includes: agent Identity grantor, proxy identity purpose description. After the physical user terminal receives the authorization application notification, the physical user can check the individual user qualifications and determine whether to authorize; if it is determined to authorize, it can send a proxy permission change request to the electronic device through the permission management interface in the physical user terminal.
可选地,若实体用户终端不具备个人用户申请授权的权限,则可以采用步骤S204及步骤S205变更本实体用户的权限;实体用户可以通过配置IAM模型中的资源元素和操作元素定义新的IAM权限策略进行对代理身份的授权。Optionally, if the entity user terminal does not have the authority for individual users to apply for authorization, steps S204 and S205 can be used to change the authority of the entity user; the entity user can define a new IAM by configuring the resource elements and operation elements in the IAM model Authorization policies are used to authorize proxy identities.
本申请实施例提供的权限控制方法,获取通过实体用户终端中权限管理界面发送的代理权限变更请求;代理权限变更请求包括代理身份标识及对应的权限变更信息;根据对应的权限变更信息采用访问控制列表更改实体用户标识对应权限。可以仅更改代理身份标识对应的权限,可以在更改某代理身份权限时避免对其他代理身份对应权限或权限集造成影响,可以避免权限混乱导致的安全问题,可以提高资源的安全性。The authority control method provided in the embodiment of this application obtains the proxy authority change request sent through the authority management interface in the entity user terminal; the proxy authority change request includes the agent identity and the corresponding authority change information; access control is adopted according to the corresponding authority change information List changes the permissions corresponding to the entity user ID. Only the permissions corresponding to the proxy identity can be changed, and when changing the permissions of a certain proxy identity, it can avoid affecting the permissions or permission sets corresponding to other proxy identities, avoiding security problems caused by permission confusion, and improving resource security.
可选地,可以采用日志存储实体用户的各类操作信息,实体用户的各类操作信息包括:实体用户操作时间和操作内容。具体地,实体用户的操作可以包括:更改实体用户标识对应权限、更改代理身份标识对应权限、为个人用户标识创建代理身份等。还可以提供权限配置及操作信息导出功能,以根据对授予的权限进行定期排查。Optionally, logs may be used to store various types of operation information of the entity user, and the various types of operation information of the entity user include: operation time and operation content of the entity user. Specifically, the operation of the entity user may include: changing the authority corresponding to the entity user identifier, changing the authority corresponding to the proxy identity identifier, creating a proxy identity for the personal user identifier, and so on. It can also provide permission configuration and operation information export function, so as to conduct regular inspections based on the granted permissions.
实施例四Embodiment four
图3为本申请实施例四提供的一种权限控制方法流程图,在上述任一实施例的基础上,个人用户可以通过个人用户终端向电子设备发送访问请求以访问资源,本申请实施例涉及的是对个人用户发起的访问请求进行鉴权的权限控制方法,如图3所示,具体包括以下步骤:Figure 3 is a flow chart of an authority control method provided in Embodiment 4 of the present application. On the basis of any of the above embodiments, individual users can send access requests to electronic devices through personal user terminals to access resources. This embodiment of the present application involves It is a permission control method for authenticating access requests initiated by individual users, as shown in Figure 3, which specifically includes the following steps:
步骤S401、获取个人用户终端发送的访问请求,并确定访问请求中是否包括代理身份标识。Step S401. Obtain an access request sent by an individual user terminal, and determine whether the access request includes a proxy identity.
本申请实施例中,访问请求包括主体信息,个人用户终端发送的访问请求中主体信息为代理身份标识或个人用户标识。In the embodiment of the present application, the access request includes subject information, and the subject information in the access request sent by the individual user terminal is an agent identity or an individual user identity.
本申请实施例中,个人用户在发起访问前,可以查看被授予的代理身份的代理身份详细信息,选择采用的代理身份,也可以不选择代理身份;若选择采用的代理身份,则访问请求中包括采用的代理身份的代理身份标识,可以执行步骤S403或步骤S407对代理身份进行代理;若不选择代理身份,则访问请求中不包括代理身份标识,可以执行步骤S402对个人用户进行用户级鉴权。In the embodiment of this application, before initiating access, individual users can check the detailed information of the authorized proxy identity, choose the proxy identity to use, or not select the proxy identity; if they choose the proxy identity to use, the access request will Including the proxy identity of the adopted proxy identity, step S403 or step S407 can be performed to proxy the proxy identity; if the proxy identity is not selected, the access request does not include the proxy identity, and step S402 can be performed to perform user-level authentication on individual users. right.
步骤S402、若确定访问请求中不包括代理身份标识,则根据个人通用基础权限对访问请求进行用户级鉴权。Step S402, if it is determined that the access request does not include the proxy identity, perform user-level authentication on the access request according to the personal general basic authority.
本申请实施例中,个人通用基础权限为用户注册后初始化的人用户标识对应的权限,可以包括系统登录权限,订阅权限,控制台访问权限等权限。In this embodiment of the application, the personal general basic authority is the authority corresponding to the personal user ID initialized after user registration, and may include system login authority, subscription authority, console access authority and other authorities.
本申请实施例中,若确定访问请求中不包括代理身份标识,则访问请求中包括:个人用户标识;访问请求中还可以包括:访问的资源信息、操作信息、身份类型信息。可选地,还可以根据身份类型信息确定鉴权主体为个人用户还是代理身份。In the embodiment of the present application, if it is determined that the access request does not include the proxy identity, the access request includes: the personal user ID; the access request may also include: accessed resource information, operation information, and identity type information. Optionally, it can also be determined according to the identity type information whether the authentication subject is an individual user or an agent identity.
本申请实施例中,若确定访问请求中不包括代理身份标识,则可以确定鉴权主体为个人用户。在确定鉴权主体为个人用户后,可以根据个人通用基础权限对访问请求进行用户级鉴权。In the embodiment of the present application, if it is determined that the proxy identity is not included in the access request, it may be determined that the authentication subject is an individual user. After determining that the authentication subject is an individual user, user-level authentication can be performed on the access request according to the personal general basic authority.
本申请实施例提供的权限控制方法,获取个人用户终端发送的访问请求;若确定访问请求中不包括代理身份标识,则根据个人通用基础权限对访问请求进行用户级鉴权;若确定用户级鉴权通过,则确定按访问请求执行访问操作。可以对个人用户终端发送的访问请求进行鉴权;并可以使个人用户可以无需采用代理身份发起访问请求,提高了发起访问请求及鉴权的灵活性,使未获取代理身份的个人用户可以进行基础操作。The authority control method provided by the embodiment of the present application obtains the access request sent by the personal user terminal; if it is determined that the access request does not include the proxy identity identifier, then perform user-level authentication on the access request according to the personal general basic authority; if it is determined that the user-level authentication If the authorization is passed, it is determined to perform the access operation according to the access request. It can authenticate the access request sent by the individual user terminal; and it can enable individual users to initiate access requests without using proxy identities, which improves the flexibility of initiating access requests and authentication, and enables individual users who have not obtained proxy identities to perform basic operate.
可选地,实体用户在为个人用户创建代理身份后,可以为该代理身份配置鉴权模式;访问请求中可以包括鉴权模式信息,在确定访问请求中包括代理身份标识后,可以确定是否进行二次鉴权并执行后续步骤,具体包括:Optionally, after an entity user creates a proxy identity for an individual user, he can configure the authentication mode for the proxy identity; the access request can include authentication mode information, and after determining that the proxy identity is included in the access request, it can be determined whether to perform Secondary authentication and follow-up steps, including:
步骤S403、根据鉴权模式信息确定是否进行二次鉴权。Step S403. Determine whether to perform secondary authentication according to the authentication mode information.
本申请实施例中,若确定访问请求中包括代理身份标识,且包括鉴权模式信息,则可以根据鉴权模式信息确定是否进行二次鉴权。访问请求中还可以包括:个人用户标识、访问的资源信息、操作信息、授权效力信息、身份类型信息等。可选地,还可以根据身份类型信息确定鉴权主体为个人用户还是代理身份。In the embodiment of the present application, if it is determined that the access request includes the proxy identity and includes authentication mode information, it may be determined whether to perform secondary authentication according to the authentication mode information. The access request may also include: personal user identification, accessed resource information, operation information, authorization effectiveness information, identity type information, and the like. Optionally, it can also be determined according to the identity type information whether the authentication subject is an individual user or an agent identity.
本申请实施例中,若确定访问请求中包括代理身份标识,则可以确定鉴权主体为代理身份。在确定鉴权主体为代理身份后,可以根据鉴权模式信息确定是否进行二次鉴权。In the embodiment of the present application, if it is determined that the access request includes the proxy identity, it may be determined that the authentication subject is the proxy identity. After it is determined that the authentication subject is the proxy identity, it may be determined whether to perform secondary authentication according to the authentication mode information.
具体地,若鉴权模式信息为二次鉴权,则执行步骤S404及后续步骤针对响应请求进行二次鉴权;若鉴权模式信息为一次鉴权,则执行步骤S407及后续步骤针对响应请求进行代理级鉴权。Specifically, if the authentication mode information is secondary authentication, perform step S404 and subsequent steps to perform secondary authentication for the response request; if the authentication mode information is primary authentication, perform step S407 and subsequent steps for the response request Perform proxy-level authentication.
步骤S404、确定与代理身份标识具有关联关系的实体用户标识。Step S404. Determine the entity user ID that has an association relationship with the proxy ID.
其中,与代理身份标识具有关联关系的实体用户标识为授予该代理身份的实体用户的标识。Wherein, the entity user identifier associated with the proxy identity is the identifier of the entity user granted the proxy identity.
本申请实施例中,在根据代理权限设置请求为个人用户标识生成代理身份标识后,可以将代理权限设置请求中的实体用户标识与代理身份标识关联存储于数据库中,从而可以在二次鉴权时根据数据库确定与代理身份标识具有关联关系的实体用户标识。In the embodiment of the present application, after the proxy identity is generated for the individual user ID according to the proxy authority setting request, the entity user identifier in the proxy authority setting request and the proxy identity can be associated and stored in the database, so that during the second authentication An entity user ID that has an associated relationship with the proxy ID is determined according to the database.
步骤S405、根据访问控制列表及实体用户标识确定实体用户对应权限,并根据实体用户对应权限对访问请求进行根级鉴权。Step S405, determine the corresponding authority of the entity user according to the access control list and the entity user identifier, and perform root-level authentication on the access request according to the corresponding authority of the entity user.
其中,根级鉴权为对授予个人用户代理身份的实体用户的权限进行鉴权。在根级鉴权后通过,进行代理权限鉴权。Among them, the root-level authentication is to authenticate the authority of the entity user who is granted the agent identity of the individual user. Passed after root-level authentication to perform proxy authority authentication.
具体地,若确定根级鉴权通过,则执行步骤S406及后续步骤根据代理身份标识对应权限对访问请求进行代理级鉴权;若确定根级鉴权不通过,则可以发送反馈错误码和提示至个人用户终端,提示用户给予其代理身份授权的实体用户的权限失效。Specifically, if it is determined that the root-level authentication is passed, then step S406 and subsequent steps are performed to perform proxy-level authentication on the access request according to the authority corresponding to the proxy identity; if it is determined that the root-level authentication fails, a feedback error code and prompt can be sent To the personal user terminal, remind the user that the authority of the entity user authorized by the proxy identity is invalid.
应理解的是,在实体用户将某权限授予代理身份后,实体用户在其实体用户标识对应的权限中删除该权限,则给予其代理身份授权的实体用户的权限失效,根级鉴权不通过,代理级鉴权通过。It should be understood that after an entity user grants a certain authority to a proxy identity, and the entity user deletes the permission from the permissions corresponding to its entity user ID, the authority granted to the entity user authorized by the proxy identity becomes invalid, and root-level authentication fails. , proxy-level authentication passed.
本申请实施例提供的权限控制方法,若根据鉴权模式信息确定将对访问请求进行二次鉴权,则确定与代理身份标识具有关联关系的实体用户标识;根据访问控制列表及实体用户标识确定实体用户对应权限,并根据实体用户对应权限对访问请求进行根级鉴权;若确定根级鉴权通过,则根据代理身份标识对应权限对访问请求进行代理级鉴权。可以实现对访问请求的二次鉴权,以在对代理级权限进行鉴权之前,先对根级权限也即对应的实体用户权限进行鉴权,可以避免只校验代理级权限时,若根级权限失效代理级权限没有相应调整,导致的安全管控漏洞问题,可以提高资源的安全性。In the authority control method provided in the embodiment of the present application, if it is determined according to the authentication mode information that the access request will be subjected to secondary authentication, then the entity user identification associated with the proxy identity identification is determined; The entity user corresponds to the authority, and performs root-level authentication on the access request according to the entity user's corresponding authority; if it is determined that the root-level authentication passes, then performs agent-level authentication on the access request according to the authority corresponding to the agent identity. The secondary authentication of the access request can be realized, so that the root-level authority, that is, the corresponding entity user authority, can be authenticated first before the agent-level authority is authenticated, which can avoid that when only the agent-level authority is verified, if the root The failure of the level authority to act as the proxy level authority has not been adjusted accordingly, resulting in security control loopholes, which can improve the security of resources.
步骤S406、根据访问控制列表确定代理身份标识对应权限,并根据代理身份标识对应权限对访问请求进行代理级鉴权。Step S406: Determine the authority corresponding to the agent identity according to the access control list, and perform agent-level authentication on the access request according to the authority corresponding to the agent identity.
本申请实施例中,若确定对访问请求进行代理级鉴权,则可以从访问请求中获取代理身份标识,根据访问控制列表确定代理身份标识对应权限,并根据代理身份标识对应权限对访问请求进行代理级鉴权。In this embodiment of the application, if it is determined to perform proxy-level authentication on the access request, the proxy identity can be obtained from the access request, the authority corresponding to the proxy identity can be determined according to the access control list, and the access request can be processed according to the authority corresponding to the proxy identity. Proxy level authentication.
具体地,可以基于代理身份标识根据访问控制列表确定已被授权的代理级权限信息,调用IAM模型对访问请求和代理身份标识对应权限进行匹配运算,得到鉴权是否通过的结果。Specifically, the authorized agent-level authority information can be determined according to the access control list based on the agent identity, and the IAM model can be called to perform matching operations on the access request and the authority corresponding to the agent identity to obtain the result of whether the authentication is passed.
步骤S407、若确定代理级鉴权通过,则确定按访问请求执行访问操作。Step S407, if it is determined that the proxy level authentication is passed, then it is determined to perform an access operation according to the access request.
具体地,若确定代理级鉴权通过,则执行步骤S408确定按访问请求执行访问操作;若确定代理级鉴权不通过,则可以发送反馈错误码和提示至个人用户终端,提示用户没有被授予有关权限。Specifically, if it is determined that the proxy-level authentication is passed, execute step S408 to determine to perform the access operation according to the access request; about permissions.
本申请实施例提供的权限控制方法,若确定访问请求中包括代理身份标识,则根据访问控制列表确定代理身份标识对应权限,并根据代理身份标识对应权限对访问请求进行代理级鉴权;若确定代理级鉴权通过,则确定按访问请求执行访问操作。可以实现对代理级权限的鉴权,确保资源的安全性。In the authority control method provided in the embodiment of the present application, if it is determined that the access request includes the proxy identity, then determine the authority corresponding to the proxy identity according to the access control list, and perform proxy-level authentication on the access request according to the authority corresponding to the proxy identity; if it is determined If the agent-level authentication passes, it is determined to perform the access operation according to the access request. It can realize the authentication of agent-level permissions and ensure the security of resources.
实施例五Embodiment five
图4为本申请实施例五提供的权限控制装置的结构示意图。本申请实施例提供的权限控制装置可以执行权限控制方法实施例提供的处理流程。如图4所示,该权限控制装置50包括:接口模块501,存储模块502,权限控制模块503。FIG. 4 is a schematic structural diagram of an authority control device provided in Embodiment 5 of the present application. The authority control device provided in the embodiment of the present application can execute the processing flow provided in the authority control method embodiment. As shown in FIG. 4 , the
具体地,接口模块501,用于获取实体用户终端发送的代理权限设置请求;代理权限设置请求中包括:个人用户标识、至少一个权限集对应标识;权限集中包括至少一条权限。Specifically, the
存储模块502,用于根据代理权限设置请求为个人用户标识生成代理身份标识并将代理身份标识与个人用户标识关联存储于数据库中。The
权限控制模块503,用于根据代理权限设置请求将至少一个权限集对应标识中的权限确定为代理身份标识对应权限,以根据代理身份标识与个人用户标识的关联关系将代理身份标识对应的权限确定为个人用户对应的权限。The
本申请实施例提供的装置可以具体用于执行上述实施例一所提供的方法实施例,具体功能此处不再赘述。The device provided in the embodiment of the present application may be specifically configured to execute the method embodiment provided in the first embodiment above, and the specific functions will not be repeated here.
可选地,接口模块501,还用于获取通过实体用户终端中权限集设置界面发送的权限集生成请求;权限控制模块503,还用于确定在权限集设置界面选中的至少一条权限;选中的至少一条权限在实体用户标识对应权限中;生成权限集对应标识并将选中的至少一条权限确定为该权限集中包括的权限。Optionally, the
可选地,接口模块501,还用于获取通过实体用户终端中权限管理界面发送的代理权限变更请求;代理权限变更请求包括代理身份标识及对应的权限变更信息;权限控制模块503,还用于根据对应的权限变更信息采用访问控制列表更改代理身份标识对应权限。Optionally, the
可选地,接口模块501,还用于获取通过实体用户终端中权限管理界面发送的实体用户权限变更请求;实体用户权限变更请求包括实体用户标识及对应的权限变更信息;权限控制模块503,还用于根据对应的权限变更信息采用访问控制列表更改实体用户标识对应权限。Optionally, the
可选地,权限控制装置50还包括:鉴权模块;接口模块501,还用于获取个人用户终端发送的访问请求;鉴权模块用于:若确定访问请求中不包括代理身份标识,则根据个人通用基础权限对访问请求进行用户级鉴权;若确定用户级鉴权通过,则确定按访问请求执行访问操作。Optionally, the
可选地,鉴权模块还用于:若确定访问请求中包括代理身份标识,则根据访问控制列表确定代理身份标识对应权限,并根据代理身份标识对应权限对访问请求进行代理级鉴权;若确定代理级鉴权通过,则确定按访问请求执行访问操作。Optionally, the authentication module is also used to: if it is determined that the access request includes the proxy identity, then determine the authority corresponding to the proxy identity according to the access control list, and perform proxy-level authentication on the access request according to the authority corresponding to the proxy identity; if If it is determined that the agent-level authentication is passed, it is determined to perform an access operation according to the access request.
可选地,代理权限设置请求中还包括:实体用户标识;存储模块502,还用于将代理权限设置请求中的实体用户标识与代理身份标识关联存储于数据库中;鉴权模块还用于:若根据鉴权模式信息确定将对访问请求进行二次鉴权,则确定与代理身份标识具有关联关系的实体用户标识;根据访问控制列表及实体用户标识确定实体用户对应权限,并根据实体用户对应权限对访问请求进行根级鉴权;若确定根级鉴权通过,则根据代理身份标识对应权限对访问请求进行代理级鉴权。Optionally, the proxy authority setting request also includes: entity user identification; the
可选地,权限控制装置50还包括:日志模块;日志模块用于:存储实体用户的各类操作信息,实体用户的各类操作信息包括:实体用户操作时间和操作内容。日志模块还用于:导出权限配置及操作信息,以根据对授予的权限进行定期排查。Optionally, the
本申请实施例提供的装置可以具体用于执行上述方法实施例,具体功能此处不再赘述。The device provided in the embodiment of the present application can be specifically used to execute the above method embodiment, and the specific functions will not be repeated here.
实施例六Embodiment six
图5为本申请实施例六提供的电子设备的结构示意图,如图5所示,本申请还提供了一种电子设备60,包括:存储器601、处理器602及收发器603。FIG. 5 is a schematic structural diagram of an electronic device provided in Embodiment 6 of the present application. As shown in FIG. 5 , the present application also provides an
其中,存储器601用于存放计算机执行指令,收发器603用于收发数据,存储器601、处理器602及收发器603通信连接。具体地,程序可以包括程序代码,程序代码包括计算机执行指令。存储器601可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatilememory),例如至少一个磁盘存储器。Wherein, the
处理器602,用于执行存储器601存放的存放计算机执行指令。The
其中,计算机执行指令存储在存储器601中,并被配置为由处理器602执行以实现本申请任意一个实施例提供的方法。相关说明可以对应参见附图中的步骤所对应的相关描述和效果进行理解,此处不做过多赘述。Wherein, the computer-executed instructions are stored in the
其中,本申请实施例中,存储器601和处理器602通过总线连接。总线可以是工业标准体系结构(Industry Standard Architecture,简称为ISA)总线、外部设备互连(Peripheral Component Interconnect,简称为PCI)总线或扩展工业标准体系结构(Extended Industry Standard Architecture,简称为EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图5中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。Wherein, in the embodiment of the present application, the
本申请实施例还提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机执行指令,计算机执行指令被处理器执行时用于实现本申请任意一个实施例提供的方法。The embodiment of the present application further provides a computer-readable storage medium, in which computer-executable instructions are stored, and the computer-executable instructions are used to implement the method provided in any embodiment of the present application when executed by a processor.
本申请实施例还提供一种计算机程序产品,包括计算机执行指令,计算机执行指令被处理器执行时实现本申请任意一个实施例提供的方法。An embodiment of the present application further provides a computer program product, including computer-executable instructions, and when the computer-executable instructions are executed by a processor, the method provided in any embodiment of the present application is implemented.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个模块或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或模块的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of modules is only a logical function division. In actual implementation, there may be other division methods. For example, multiple modules or components can be combined or integrated. to another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or modules may be in electrical, mechanical or other forms.
作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。A module described as a separate component may or may not be physically separated, and a component shown as a module may or may not be a physical module, that is, it may be located in one place, or may also be distributed to multiple network modules. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。In addition, each functional module in each embodiment of the present application may be integrated into one processing module, each module may exist separately physically, or two or more modules may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware, or in the form of hardware plus software function modules.
用于实施本申请的方法的程序代码可以采用一个或多个编程语言的任何组合来编写。这些程序代码可以提供给通用计算机、专用计算机或其他可编程全路径轨迹融合装置的处理器或控制器,使得程序代码当由处理器或控制器执行时使流程图和/或框图中所规定的功能/操作被实施。程序代码可以完全在机器上执行、部分地在机器上执行,作为独立软件包部分地在机器上执行且部分地在远程机器上执行或完全在远程机器或服务器上执行。Program codes for implementing the methods of the present application may be written in any combination of one or more programming languages. These program codes can be provided to a processor or a controller of a general-purpose computer, a special-purpose computer, or other programmable full-path trajectory fusion devices, so that the program codes when executed by the processor or the controller make the flow chart and/or the specified in the block diagram The function/operation is implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
在本申请的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。In the context of the present application, a machine-readable medium may be a tangible medium that may contain or store a program for use by or in conjunction with an instruction execution system, apparatus, or device. A machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, apparatus, or devices, or any suitable combination of the foregoing. More specific examples of machine-readable storage media would include one or more wire-based electrical connections, portable computer discs, hard drives, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, compact disk read only memory (CD-ROM), optical storage, magnetic storage, or any suitable combination of the foregoing.
此外,虽然采用特定次序描绘了各操作,但是这应当理解为要求这样操作以所示出的特定次序或以顺序次序执行,或者要求所有图示的操作应被执行以取得期望的结果。在一定环境下,多任务和并行处理可能是有利的。同样地,虽然在上面论述中包含了若干具体实现细节,但是这些不应当被解释为对本申请的范围的限制。在单独的实施例的上下文中描述的某些特征还可以组合地实现在单个实现中。相反地,在单个实现的上下文中描述的各种特征也可以单独地或以任何合适的子组合的方式实现在多个实现中。In addition, while operations are depicted in a particular order, this should be understood to require that such operations be performed in the particular order shown, or in sequential order, or that all illustrated operations should be performed to achieve desirable results. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while the above discussion contains several specific implementation details, these should not be construed as limitations on the scope of the application. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求书指出。Other embodiments of the present application will be readily apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any modification, use or adaptation of the application, these modifications, uses or adaptations follow the general principles of the application and include common knowledge or conventional technical means in the technical field not disclosed in the application . The specification and examples are to be considered exemplary only, with a true scope and spirit of the application indicated by the following claims.
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求书来限制。It should be understood that the present application is not limited to the precise constructions which have been described above and shown in the accompanying drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211663588.XA CN115758303A (en) | 2022-12-23 | 2022-12-23 | Authority control method, device, equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211663588.XA CN115758303A (en) | 2022-12-23 | 2022-12-23 | Authority control method, device, equipment and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN115758303A true CN115758303A (en) | 2023-03-07 |
Family
ID=85347359
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202211663588.XA Pending CN115758303A (en) | 2022-12-23 | 2022-12-23 | Authority control method, device, equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115758303A (en) |
-
2022
- 2022-12-23 CN CN202211663588.XA patent/CN115758303A/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN113239344B (en) | Access right control method and device | |
| US11962511B2 (en) | Organization level identity management | |
| US10853511B2 (en) | Securely accessing and processing data in a multi-tenant data store | |
| RU2691211C2 (en) | Technologies for providing network security through dynamically allocated accounts | |
| US8990950B2 (en) | Enabling granular discretionary access control for data stored in a cloud computing environment | |
| US11190517B2 (en) | Access control based on combined multi-system authentication factors | |
| CN111865943B (en) | Multi-level tenant authentication method and device based on micro-service | |
| CN109889517B (en) | Data processing method, permission data set creating device and electronic equipment | |
| CN115698998A (en) | Secure resource authorization for external identities using remote subject objects | |
| KR20130046155A (en) | Access control system for cloud computing service | |
| US12250212B2 (en) | Computer user credentialing and verification system | |
| US10931716B2 (en) | Policy strength of managed devices | |
| EP4252132B1 (en) | Integrated circuit for obtaining enhanced privileges for a network-based resource and performing actions in accordance therewith | |
| CN107204978B (en) | An access control method and device based on a multi-tenant cloud environment | |
| CN108092945A (en) | Definite method and apparatus, the terminal of access rights | |
| CN112019543A (en) | Multi-tenant permission system based on BRAC model | |
| CN110348237A (en) | Data managing method and device, storage medium, electronic equipment based on block chain | |
| CN113111339A (en) | Access control method, device, equipment and medium for application service | |
| WO2019184232A1 (en) | Seat quality management method, device, and storage medium | |
| US10944747B2 (en) | Devices, systems, and methods for zero-trust single sign-on | |
| US20250337750A1 (en) | Platform access request management | |
| US11483316B1 (en) | System and method for access using a circle of trust | |
| CN106209735A (en) | A kind of information processing method, device and Electronic Health Record system | |
| WO2021136075A1 (en) | Product license management method and system | |
| CN115758303A (en) | Authority control method, device, equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |