[go: up one dir, main page]

CN118916906A - Data authority configuration method, device and storage medium - Google Patents

Data authority configuration method, device and storage medium Download PDF

Info

Publication number
CN118916906A
CN118916906A CN202411413461.1A CN202411413461A CN118916906A CN 118916906 A CN118916906 A CN 118916906A CN 202411413461 A CN202411413461 A CN 202411413461A CN 118916906 A CN118916906 A CN 118916906A
Authority
CN
China
Prior art keywords
data
role
permissions
administrator
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202411413461.1A
Other languages
Chinese (zh)
Other versions
CN118916906B (en
Inventor
隆颢
韩晓宇
刘宇
黄福巍
曾俊达
吴菲菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhicheng Software Technology Service Co ltd
Shenzhen Smart City Technology Development Group Co ltd
Original Assignee
Shenzhen Zhicheng Software Technology Service Co ltd
Shenzhen Smart City Technology Development Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhicheng Software Technology Service Co ltd, Shenzhen Smart City Technology Development Group Co ltd filed Critical Shenzhen Zhicheng Software Technology Service Co ltd
Priority to CN202411413461.1A priority Critical patent/CN118916906B/en
Publication of CN118916906A publication Critical patent/CN118916906A/en
Application granted granted Critical
Publication of CN118916906B publication Critical patent/CN118916906B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data authority configuration method, equipment and a storage medium, which relate to the technical field of information security and comprise the following steps: when a data role configuration request of an administrator is detected, acquiring a data role to be configured; configuring system data resource rights of the data roles based on the system data dimension selected by the administrator; and configuring the universal data resource authority of the data role based on the universal data dimension selected by the administrator. The flexibility of data authority configuration is improved.

Description

数据权限配置方法、设备及存储介质Data permission configuration method, device and storage medium

技术领域Technical Field

本申请涉及信息安全技术领域,尤其涉及数据权限配置方法、设备及存储介质。The present application relates to the field of information security technology, and in particular to a data permission configuration method, device and storage medium.

背景技术Background Art

RBAC(Role-Based Access Control,基于角色的访问控制)模型是一种权限管理方式,通过将权限分配给特定角色,再将用户与这些角色关联,实现对权限的间接管理。The RBAC (Role-Based Access Control) model is a permission management method that indirectly manages permissions by assigning permissions to specific roles and then associating users with these roles.

在相关技术中,管理员通常会在整个业务系统层面创建角色,并为这些角色配置统一的权限。例如,管理员可以设置一个“员工”角色,并配置其查看基本信息的权限,将用户与“员工”关联后,用户便能够访问人事管理子系统和财务管理子系统中的基本信息。In related technologies, administrators usually create roles at the level of the entire business system and configure unified permissions for these roles. For example, an administrator can set up an "employee" role and configure its permission to view basic information. After associating a user with "employee", the user can access basic information in the personnel management subsystem and the financial management subsystem.

然而,随着业务系统日益复杂,不同子系统对数据权限的管理需求变得精细化,上述配置方式难以满足这种细粒度。例如,如果出于业务需求,需要赋予“员工”财务审批权限,管理员却只能为其配置统一的审批权限,这就导致“员工”的审批权限不仅包括财务,还涉及人事等其他领域。因此,现有的数据权限配置方式灵活性不足。However, as business systems become increasingly complex, the management requirements for data permissions in different subsystems have become more refined, and the above configuration method is difficult to meet this fine-grained level. For example, if it is necessary to grant financial approval permissions to "employees" for business needs, the administrator can only configure unified approval permissions for them, which means that the approval permissions of "employees" include not only finance, but also other areas such as personnel. Therefore, the existing data permission configuration method is not flexible enough.

上述内容仅用于辅助理解本申请的技术方案,并不代表承认上述内容是现有技术。The above contents are only used to assist in understanding the technical solution of the present application and do not constitute an admission that the above contents are prior art.

发明内容Summary of the invention

本申请的主要目的在于提供一种数据权限配置方法、设备及存储介质,旨在解决数据权限配置的灵活性不足的技术问题。The main purpose of this application is to provide a data permission configuration method, device and storage medium, aiming to solve the technical problem of insufficient flexibility in data permission configuration.

为实现上述目的,本申请提出一种数据权限配置方法,所述方法包括:To achieve the above purpose, the present application proposes a data permission configuration method, which includes:

当检测到管理员的数据角色配置请求时,获取待配置的数据角色;When a data role configuration request from an administrator is detected, the data role to be configured is obtained;

基于管理员选定的系统数据维度,配置所述数据角色的系统数据资源权限;Based on the system data dimensions selected by the administrator, configure the system data resource permissions of the data role;

基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限。Based on the common data dimensions selected by the administrator, the common data resource permissions of the data role are configured.

在一实施例中,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:In one embodiment, after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the step further includes:

确定所述系统数据资源权限对应的系统数据资源,以及所述通用数据资源权限对应的通用数据资源;Determine the system data resources corresponding to the system data resource authority and the general data resources corresponding to the general data resource authority;

基于所述管理员对权限级别的选定操作,配置所述系统数据资源和所述通用数据资源的操作权限。Based on the administrator's selection of the permission level, the operation permissions of the system data resources and the common data resources are configured.

在一实施例中,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:In one embodiment, after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the step further includes:

当检测到所述管理员的数据角色指派请求时,解析所述数据角色指派请求中的用户标识和目标数据角色;When a data role assignment request of the administrator is detected, parsing the user identifier and the target data role in the data role assignment request;

建立所述用户标识和所述目标数据角色的关联关系。An association relationship between the user identifier and the target data role is established.

在一实施例中,所述建立所述用户标识和所述目标数据角色的关联关系的步骤之前,还包括:In one embodiment, before the step of establishing the association relationship between the user identifier and the target data role, the step further includes:

若所述目标数据角色属于关键数据角色,则确定所有所述关键数据角色的总数量;If the target data role is a key data role, determining the total number of all the key data roles;

若所述总数量低于数量阈值,则执行所述建立所述用户标识和所述目标数据角色的关联关系的步骤。If the total number is lower than the number threshold, the step of establishing the association relationship between the user identifier and the target data role is performed.

在一实施例中,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:In one embodiment, after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the step further includes:

当检测到所述管理员的引用请求时,确定所述引用请求关联的引用数据维度并显示,所述引用数据维度包括若干所述通用数据维度;When a reference request from the administrator is detected, determining and displaying reference data dimensions associated with the reference request, wherein the reference data dimensions include a plurality of the common data dimensions;

基于所述管理员对于所述引用数据维度的选定操作,确定对应的引用数据资源权限;Determining corresponding reference data resource permissions based on the administrator's selected operation on the reference data dimension;

对所述引用数据资源权限和所述通用数据资源权限进行去重和取并集处理,并根据处理结果配置所述数据角色的通用数据资源权限。The reference data resource permissions and the general data resource permissions are deduplicated and unioned, and the general data resource permissions of the data role are configured according to the processing results.

在一实施例中,所述确定所述引用请求关联的引用数据维度并显示的步骤包括:In one embodiment, the step of determining and displaying the reference data dimension associated with the reference request includes:

确定所述引用请求中的业务流程类型;Determining a business process type in the reference request;

根据所述业务流程类型涉及的通用数据维度,确定所述引用数据维度并显示。According to the common data dimensions involved in the business process type, the reference data dimensions are determined and displayed.

在一实施例中,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:In one embodiment, after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the step further includes:

当检测到用户的登录请求时,对所述登录请求进行身份验证;When a login request from a user is detected, authenticating the login request;

若身份验证通过,则解析所述登录请求中的目标数据角色和访问请求;If the identity authentication is successful, the target data role and access request in the login request are parsed;

确定所述目标数据角色对应的目标数据资源权限;Determine the target data resource authority corresponding to the target data role;

根据访问控制策略,确定所述目标数据资源权限和访问请求对应的访问决策,并执行所述访问决策对应的操作。According to the access control policy, the access decision corresponding to the target data resource authority and the access request is determined, and the operation corresponding to the access decision is executed.

在一实施例中,所述确定所述目标数据角色对应的目标数据资源权限的步骤包括:In one embodiment, the step of determining the target data resource authority corresponding to the target data role includes:

若所述目标数据角色的数量为多个,则确定各目标数据角色关联的候选数据资源权限;If there are multiple target data roles, determining the candidate data resource permissions associated with each target data role;

对所述候选数据资源权限进行去重和合并,得到所述目标数据资源权限。The candidate data resource permissions are deduplicated and merged to obtain the target data resource permissions.

此外,为实现上述目的,本申请还提出一种数据权限配置设备,所述设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序配置为实现如上文所述的数据权限配置方法的步骤。In addition, to achieve the above-mentioned purpose, the present application also proposes a data permission configuration device, which includes: a memory, a processor, and a computer program stored in the memory and executable on the processor, and the computer program is configured to implement the steps of the data permission configuration method described above.

此外,为实现上述目的,本申请还提出一种存储介质,所述存储介质为计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上文所述的数据权限配置方法的步骤。In addition, to achieve the above-mentioned purpose, the present application also proposes a storage medium, which is a computer-readable storage medium, and a computer program is stored on the storage medium. When the computer program is executed by the processor, the steps of the data permission configuration method described above are implemented.

本申请提出的一个或多个技术方案,至少具有以下技术效果:One or more technical solutions proposed in this application have at least the following technical effects:

本申请提供了一种数据权限配置方法,基于管理员的交互动作,允许动态配置每个数据角色的权限。这使得管理员可以在运行时对权限进行实时的动态配置,而无需进行系统的重启或重新配置,而且管理员也能够根据实际需求随时调整权限设置,而不需受限于固定的角色与权限关系,从而更有效地应对临时性的权限变更需求。此外,本实施例区分系统数据资源权限和通用数据资源权限,这一划分使得权限设置能够具体到子系统层面,而不是笼统地涵盖整个系统或广泛的功能。这种细粒度的权限划分策略,使得权限分配能够更加精准地匹配特定业务场景的需求,从而有效提升了权限控制的准确性和针对性。综上所述,细粒度的权限划分和灵活的权限配置机制,使得管理员能够独立配置每个数据角色在不同系统中的权限,而无需为应对临时性权限变更而创建多个相似角色。这不仅减少了角色的数量,还有效避免了角色间权限重叠与混乱现象的发生。The present application provides a data permission configuration method, which allows the dynamic configuration of the permissions of each data role based on the interactive actions of the administrator. This allows the administrator to dynamically configure the permissions in real time at runtime without restarting or reconfiguring the system, and the administrator can also adjust the permission settings at any time according to actual needs, without being limited to the fixed role and permission relationship, so as to more effectively deal with temporary permission change requirements. In addition, this embodiment distinguishes between system data resource permissions and general data resource permissions. This division enables permission settings to be specific to the subsystem level, rather than generally covering the entire system or a wide range of functions. This fine-grained permission division strategy enables permission allocation to more accurately match the needs of specific business scenarios, thereby effectively improving the accuracy and pertinence of permission control. In summary, fine-grained permission division and flexible permission configuration mechanism enable administrators to independently configure the permissions of each data role in different systems without creating multiple similar roles to deal with temporary permission changes. This not only reduces the number of roles, but also effectively avoids the occurrence of overlapping and confusing permissions between roles.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and, together with the description, serve to explain the principles of the present application.

为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings required for use in the embodiments or the description of the prior art will be briefly introduced below. Obviously, for ordinary technicians in this field, other drawings can be obtained based on these drawings without paying any creative labor.

图1为本申请数据权限配置方法实施例一提供的流程示意图;FIG1 is a schematic diagram of a flow chart of a method for configuring data permissions in accordance with an embodiment of the present invention;

图2为本申请数据权限配置方法实施例二提供的流程示意图;FIG2 is a schematic diagram of a flow chart of a second embodiment of a method for configuring data permissions in this application;

图3为本申请数据权限配置方法实施例三提供的流程示意图;FIG3 is a flow chart of a third embodiment of the data permission configuration method of the present application;

图4为本申请数据权限配置方法实施例四提供的流程示意图;FIG4 is a flow chart of a fourth embodiment of a method for configuring data permissions in this application;

图5为本申请数据权限配置方法实施例四提供的用户登录示意图;FIG5 is a user login diagram provided in Embodiment 4 of the data permission configuration method of the present application;

图6为本申请数据权限配置方法的数据权限业务库表关联结构图;FIG6 is a diagram showing the association structure of the data authority service library table of the data authority configuration method of the present application;

图7为本申请数据权限配置方法的数据权限应用时的数据权限接口调用流程图;FIG7 is a flowchart of a data permission interface call when applying data permission for the data permission configuration method of the present application;

图8为本申请实施例中数据权限配置方法涉及的硬件运行环境的设备结构示意图。FIG8 is a schematic diagram of the device structure of the hardware operating environment involved in the data permission configuration method in the embodiment of the present application.

本申请目的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The purpose, features and advantages of this application will be further described in conjunction with the embodiments and with reference to the accompanying drawings.

具体实施方式DETAILED DESCRIPTION

应当理解,此处所描述的具体实施例仅仅用以解释本申请的技术方案,并不用于限定本申请。It should be understood that the specific embodiments described herein are only used to explain the technical solutions of the present application and are not used to limit the present application.

为了更好的理解本申请的技术方案,下面将结合说明书附图以及具体的实施方式进行详细的说明。In order to better understand the technical solution of the present application, a detailed description will be given below in conjunction with the accompanying drawings and specific implementation methods.

本申请实施例的主要解决方案是:当检测到管理员的数据角色配置请求时,获取待配置的数据角色;基于管理员选定的系统数据维度,配置所述数据角色的系统数据资源权限;基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限。The main solution of the embodiment of the present application is: when an administrator's data role configuration request is detected, the data role to be configured is obtained; based on the system data dimension selected by the administrator, the system data resource permissions of the data role are configured; based on the common data dimension selected by the administrator, the common data resource permissions of the data role are configured.

随着业务系统日益复杂,不同子系统对数据权限的管理需求变得精细化,传统的配置方式难以满足这种细粒度。例如,如果出于业务需求,需要赋予“员工”财务审批权限,管理员却只能为其配置统一的审批权限,这就导致“员工”的审批权限不仅包括财务,还涉及人事等其他领域。As business systems become increasingly complex, the management requirements for data permissions in different subsystems have become more refined, and traditional configuration methods are difficult to meet this granularity. For example, if it is necessary to grant financial approval permissions to "employees" for business needs, the administrator can only configure unified approval permissions for them, which results in the approval permissions of "employees" not only covering finance, but also involving other areas such as personnel.

而且,在传统RBAC模型中,角色与权限的关系相对固定,这种静态定义的方式在应对业务需求变化时不够灵活。以“员工”角色为例,在人事管理系统中拥有查看员工信息的权限,在财务管理系统中则仅拥有查看报账的权限。如果出于业务需求,临时需要提升“员工”的权限,使其能够审批报账,传统的RBAC模型往往只能创建新角色以应对,这样容易引发数据权限混乱。Moreover, in the traditional RBAC model, the relationship between roles and permissions is relatively fixed. This static definition is not flexible enough to cope with changes in business needs. For example, the "employee" role has the permission to view employee information in the human resources management system, but only has the permission to view reimbursements in the financial management system. If, due to business needs, it is temporarily necessary to enhance the permissions of the "employee" so that it can approve reimbursements, the traditional RBAC model can only create new roles to cope with it, which can easily cause confusion in data permissions.

为解决上述问题,本申请提供一种方案,区分系统数据资源权限和通用数据资源权限,而且支持管理员的动态配置,这种细粒度的权限划分和灵活的权限配置机制,提升了数据权限配置的灵活性。To solve the above problems, this application provides a solution to distinguish between system data resource permissions and general data resource permissions, and supports dynamic configuration by administrators. This fine-grained permission division and flexible permission configuration mechanism improves the flexibility of data permission configuration.

需要说明的是,本方案的执行主体可以是一种具有数据处理、网络通信以及程序运行功能的计算服务设备,例如平板电脑、个人电脑、手机等,或者是一种能够实现上述功能的数据权限配置设备等。以下以数据权限配置设备为例,对下述各实施例进行说明。It should be noted that the execution subject of this solution can be a computing service device with data processing, network communication and program running functions, such as a tablet computer, a personal computer, a mobile phone, etc., or a data permission configuration device capable of realizing the above functions, etc. The following embodiments are described below taking the data permission configuration device as an example.

基于此,本申请实施例提供了一种数据权限配置方法,参照图1,图1为本申请数据权限配置方法第一实施例的流程示意图。Based on this, an embodiment of the present application provides a data permission configuration method, referring to FIG. 1 , which is a flow chart of the first embodiment of the data permission configuration method of the present application.

本实施例中,所述数据权限配置方法包括步骤S10~S30:In this embodiment, the data permission configuration method includes steps S10 to S30:

步骤S10,当检测到管理员的数据角色配置请求时,获取待配置的数据角色;Step S10, when a data role configuration request from an administrator is detected, obtaining the data role to be configured;

本实施例数据权限配置方法,可应用于权限管理平台(以下简称平台)。平台可以将权限分配给用户、角色或特定资源。管理员可以通过平台配置、审核和更改这些权限,以响应业务需求的变化。The data permission configuration method of this embodiment can be applied to a permission management platform (hereinafter referred to as the platform). The platform can assign permissions to users, roles, or specific resources. Administrators can configure, review, and change these permissions through the platform to respond to changes in business needs.

需要注意的是,数据角色是一个核心概念,它不同于用户,用户是指那些实际使用数据库的实体,而角色是对一组权限的抽象,可以被授予给用户。It is important to note that data role is a core concept, which is different from users. Users refer to entities that actually use the database, while roles are an abstraction of a set of permissions that can be granted to users.

平台设置有机制来检测管理员的请求。这些请求可能是通过图形用户界面的按钮点击、表单提交、API调用或其他形式的交互产生的。The platform has mechanisms to detect administrator requests. These requests may be generated through GUI button clicks, form submissions, API calls, or other forms of interaction.

示例性地,权限管理平台显示一个数据权限配置界面,展示当前所有数据角色及其属性,管理员可以在此界面中选择需要配置的数据角色。为实现这一功能,平台设置了事件检测器。当管理员点击按钮时,事件检测器会捕获到点击事件,并收集当前界面上的相关信息,包括被选中的数据角色及其他配置参数。随后,这些信息会通过数据角色配置请求发送到后端,以便进行后续处理。Exemplarily, the permission management platform displays a data permission configuration interface, showing all current data roles and their properties, and the administrator can select the data role to be configured in this interface. To achieve this function, the platform sets up an event detector. When the administrator clicks a button, the event detector captures the click event and collects relevant information on the current interface, including the selected data role and other configuration parameters. Subsequently, this information is sent to the backend through a data role configuration request for subsequent processing.

相应地,后端接收到请求后,首先对请求进行简单的内容检查,验证其是否存在并符合预期结构。例如,检查是否包含“roleId”字段,若包含则判定为数据角色配置请求。Accordingly, after receiving the request, the backend first performs a simple content check on the request to verify whether it exists and conforms to the expected structure. For example, it checks whether the "roleId" field is included. If so, it is determined to be a data role configuration request.

进一步地,利用中间件来自动处理和解析请求,该中间件能够将请求转换成后端可用的对象。一旦请求被解析,后端就可以根据预定义的API(ApplicationProgrammingInterface,应用程序编程接口)规范,从请求中提取需要的字段,即待配置的数据角色。Furthermore, middleware is used to automatically process and parse requests, which can convert requests into objects that can be used by the backend. Once the request is parsed, the backend can extract the required fields from the request, that is, the data roles to be configured, according to the predefined API (Application Programming Interface) specifications.

步骤S20,基于管理员选定的系统数据维度,配置所述数据角色的系统数据资源权限;Step S20, configuring the system data resource permissions of the data role based on the system data dimension selected by the administrator;

步骤S30,基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限。Step S30: configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator.

需要注意的是,本方案采用多维度权限控制方式,将维度划分为系统数据维度和通用数据维度。It should be noted that this solution adopts a multi-dimensional permission control method, dividing the dimensions into system data dimensions and general data dimensions.

系统数据维度,指根据具体业务系统的需求而自定义的权限维度。这些维度是高度个性化的,旨在解决特定业务场景下的权限控制问题。系统数据维度可以根据业务发展的需要随时添加或修改,从而提供更大的灵活性和适应性。System data dimensions refer to permission dimensions that are customized according to the needs of specific business systems. These dimensions are highly personalized and are designed to solve permission control problems in specific business scenarios. System data dimensions can be added or modified at any time according to the needs of business development, providing greater flexibility and adaptability.

例如,对于一个电商业务系统来说,商品类型、库存状态等都可以视为系统数据维度。这些维度允许根据商品特性和库存状况来定制访问权限,如限制某些用户只能查看特定类型的商品。For example, for an e-commerce business system, product type, inventory status, etc. can be considered as system data dimensions. These dimensions allow access rights to be customized based on product characteristics and inventory status, such as limiting certain users to only view specific types of products.

通用数据维度,是指预定义的一组常用权限维度,它们提供了标准的权限模板,适用于大多数业务场景。这些维度通常是跨系统的、普遍适用的,能够覆盖常见的权限控制需求。Common data dimensions refer to a set of predefined commonly used permission dimensions, which provide standard permission templates and are applicable to most business scenarios. These dimensions are usually cross-system and universally applicable, and can cover common permission control requirements.

例如,时间维度、地理位置维度都可以视为通用数据维度。其中,时间维度可能预定义了工作日和非工作日的访问权限,而地理位置维度则可能限制了特定地区的用户访问权限。For example, the time dimension and the geographic location dimension can be considered as common data dimensions. The time dimension may predefine the access rights for working days and non-working days, while the geographic location dimension may limit the access rights of users in a specific region.

无论是通用数据维度还是系统数据维度,都可以独立地定义权限。这些维度之间可以通过关联交互形成组合授权,使得权限控制更加精细和灵活。例如,将时间维度和地理位置维度相结合,可以精确地控制“用户A在时间段T内可以访问地域D的数据”。这种允许维度间的关联和组合,构建了一个立体化的权限控制体系,从而实现了细粒度、动态的权限配置与联合授权。Permissions can be defined independently for both general data dimensions and system data dimensions. These dimensions can be associated and interacted to form combined authorizations, making permission control more refined and flexible. For example, by combining the time dimension with the geographic location dimension, it is possible to precisely control "user A can access data in region D during time period T." This association and combination between allowed dimensions builds a three-dimensional permission control system, thereby achieving fine-grained, dynamic permission configuration and joint authorization.

可选地,权限管理平台显示数据权限配置界面,管理员在选定数据角色后,可以在自定义的系统数据维度列表中选定需要用于权限控制的维度。此时,事件检测器会捕获到该选定操作并将其发送给后端。Optionally, the permission management platform displays a data permission configuration interface. After selecting a data role, the administrator can select the dimension to be used for permission control in the customized system data dimension list. At this time, the event detector captures the selected operation and sends it to the backend.

相应地,后端接收到选定操作后,会从中提取出管理员选定的系统数据维度。具体原理同数据角色配置请求的处理流程,此处不再赘述。Correspondingly, after receiving the selected operation, the backend will extract the system data dimensions selected by the administrator. The specific principle is the same as the processing flow of the data role configuration request, which will not be repeated here.

接着,确定系统数据维度对应的编码,在预置权限映射表中,查找对应的系统数据资源权限,从而为当前选定的数据角色配置这些系统数据资源权限。Next, determine the code corresponding to the system data dimension, and search for the corresponding system data resource permissions in the preset permission mapping table, so as to configure these system data resource permissions for the currently selected data role.

同理,在预置权限映射表中,查找通用数据维度对应的通用数据资源权限,然后完成通用数据资源权限的配置。Similarly, in the preset permission mapping table, find the general data resource permissions corresponding to the general data dimensions, and then complete the configuration of the general data resource permissions.

可以理解的是,数据资源是数据权限的控制对象。针对数据资源,管理员也可以设定不同的操作权限,如只读、编辑、管理等。通过精细控制不同用户对数据资源的访问权限,可以防止未经授权的数据访问、修改或泄露。It is understandable that data resources are the objects of data permission control. Administrators can also set different operation permissions for data resources, such as read-only, edit, manage, etc. By finely controlling the access rights of different users to data resources, unauthorized data access, modification or leakage can be prevented.

具体地,查询数据权限和数据资源的映射关系,确定系统数据资源权限对应的系统数据资源,以及通用数据资源权限对应的通用数据资源。然后在用户界面,显示系统数据资源和通用数据资源,使管理员能够方便地其配置权限。Specifically, the mapping relationship between data permissions and data resources is queried to determine the system data resources corresponding to the system data resource permissions and the general data resources corresponding to the general data resource permissions. Then, the system data resources and general data resources are displayed on the user interface so that the administrator can easily configure their permissions.

当用户在界面上选定权限级别后,会自动触发对应的配置请求。后端解析请求,并配置系统数据资源和通用数据资源的操作权限。When the user selects the permission level on the interface, the corresponding configuration request will be automatically triggered. The backend parses the request and configures the operation permissions for system data resources and general data resources.

示例性地,针对财务权限对应的财务报表。如果配置只读权限,用户可以查看财务报表,但不能进行任何修改;如果配置编辑权限,用户可以查看和修改财务报表,但不能删除报表;如果配置管理权限,用户可以查看、编辑和删除财务报表,并可以生成新的财务报表。本方案只允许有特定权限的用户编辑数据资源,可以防止数据被随意更改,从而保持数据的一致性和准确性,这对于需要高度精确数据的业务场景尤为重要。For example, for financial statements corresponding to financial permissions. If read-only permissions are configured, users can view financial statements but cannot make any modifications; if edit permissions are configured, users can view and modify financial statements but cannot delete them; if management permissions are configured, users can view, edit, and delete financial statements, and can generate new financial statements. This solution only allows users with specific permissions to edit data resources, which can prevent data from being changed at will, thereby maintaining data consistency and accuracy, which is particularly important for business scenarios that require highly accurate data.

本实施例提供了一种数据权限配置方法,基于管理员的交互动作,允许动态配置每个数据角色的权限。这使得管理员可以在运行时对权限进行实时的动态配置,而无需进行系统的重启或重新配置,而且管理员也能够根据实际需求随时调整权限设置,而不需受限于固定的角色与权限关系,从而更有效地应对临时性的权限变更需求。此外,本实施例区分系统数据资源权限和通用数据资源权限,这一划分使得权限设置能够具体到子系统层面,而不是笼统地涵盖整个系统或广泛的功能。这种细粒度的权限划分策略,使得权限分配能够更加精准地匹配特定业务场景的需求,从而有效提升了权限控制的准确性和针对性。综上所述,细粒度的权限划分和灵活的权限配置机制,使得管理员能够独立配置每个数据角色在不同系统中的权限,而无需为应对临时性权限变更而创建多个相似角色。这不仅减少了角色的数量,还有效避免了角色间权限重叠与混乱现象的发生。This embodiment provides a data permission configuration method, which allows the dynamic configuration of the permissions of each data role based on the interactive actions of the administrator. This allows the administrator to dynamically configure the permissions in real time at runtime without restarting or reconfiguring the system, and the administrator can also adjust the permission settings at any time according to actual needs, without being limited to the fixed role and permission relationship, so as to more effectively respond to temporary permission change requirements. In addition, this embodiment distinguishes between system data resource permissions and general data resource permissions. This division enables permission settings to be specific to the subsystem level, rather than generally covering the entire system or a wide range of functions. This fine-grained permission division strategy enables permission allocation to more accurately match the needs of specific business scenarios, thereby effectively improving the accuracy and pertinence of permission control. In summary, fine-grained permission division and flexible permission configuration mechanism enable administrators to independently configure the permissions of each data role in different systems without creating multiple similar roles to respond to temporary permission changes. This not only reduces the number of roles, but also effectively avoids the occurrence of overlapping and confusion of permissions between roles.

基于本申请第一实施例,在本申请第二实施例中,与上述实施例一相同或相似的内容,可以参考上文介绍,后续不再赘述。在此基础上,请参照图2,步骤S30之后,所述数据权限配置方法还包括步骤A10~A20:Based on the first embodiment of the present application, in the second embodiment of the present application, the same or similar contents as those in the first embodiment can be referred to the above description, and will not be repeated in the following. On this basis, please refer to FIG. 2, after step S30, the data permission configuration method further includes steps A10 to A20:

步骤A10,当检测到所述管理员的数据角色指派请求时,解析所述数据角色指派请求中的用户标识和目标数据角色;Step A10, when a data role assignment request from the administrator is detected, parsing the user identifier and the target data role in the data role assignment request;

步骤A20,建立所述用户标识和所述目标数据角色的关联关系。Step A20: establishing an association relationship between the user identifier and the target data role.

管理员配置完数据角色和对应的资源权限后,就可以进行将数据角色和具体用户的绑定操作。After the administrator has configured the data role and the corresponding resource permissions, he or she can bind the data role to a specific user.

管理员通过界面或API调用来触发数据角色指派请求,后端检测到数据角色指派请求后,从中提取出用户标识和目标数据角色。其中,用户标识即用户的唯一身份识别信息,目标数据角色即希望赋予该用户的权限角色。The administrator triggers a data role assignment request through the interface or API call. After the backend detects the data role assignment request, it extracts the user ID and the target data role from it. The user ID is the user's unique identification information, and the target data role is the permission role that you want to grant to the user.

接着,后端会建立用户标识和目标数据角色之间的关联关系。这意味着该用户将被赋予目标数据角色的权限。这种关联关系通常会被存储在权限管理数据库中,以便后续的权限验证和管理。系统可以根据这个关联关系来判断用户在访问数据资源时的权限。Next, the backend will establish an association between the user ID and the target data role. This means that the user will be granted the permissions of the target data role. This association is usually stored in the permission management database for subsequent permission verification and management. The system can determine the user's permissions when accessing data resources based on this association.

可以理解的是,根据业务需求将数据角色划分为关键数据角色与非关键数据角色,其中,关键数据角色通常具有较高的权限,能够访问或操作敏感数据。可以通过限制关联关键数据角色用户数量,确保关键权限不被滥用。It is understandable that data roles are divided into key data roles and non-key data roles according to business needs. Key data roles usually have higher permissions and can access or operate sensitive data. The number of users associated with key data roles can be limited to ensure that key permissions are not abused.

具体地,当管理员请求将某个用户指派为目标数据角色时,后端会通过查询角色数据库,判断目标数据角色是否属于关键数据角色。如果目标数据角色是关键数据角色,后端将执行查询操作,统计当前所有关键数据角色的总数量。Specifically, when an administrator requests to assign a user to a target data role, the backend will query the role database to determine whether the target data role is a key data role. If the target data role is a key data role, the backend will perform a query operation to count the total number of all current key data roles.

后端预先设置有数量阈值,用于判断当前关键数据角色的数量是否在可接受的范围内。这个阈值可以根据组织的安全策略和业务需求进行设定。The backend has a preset quantity threshold to determine whether the current number of key data roles is within an acceptable range. This threshold can be set based on the organization's security policies and business needs.

后端会将统计出的关键数据角色总数量与数量阈值进行比较。如果关键数据角色的总数量低于设定的数量阈值,则允许执行将用户标识与目标数据角色的关联关系的步骤。这意味着在关键数据角色数量不足的情况下,系统会允许增加新的关键角色,以确保数据访问的灵活性和安全性。如果关键数据角色的总数量高于或等于数量阈值,系统可能会拒绝该角色指派请求,以防止权限过度集中或滥用。The backend will compare the total number of key data roles counted with the quantity threshold. If the total number of key data roles is lower than the set quantity threshold, the step of associating the user ID with the target data role is allowed. This means that in the case of insufficient number of key data roles, the system will allow the addition of new key roles to ensure the flexibility and security of data access. If the total number of key data roles is higher than or equal to the quantity threshold, the system may reject the role assignment request to prevent excessive concentration or abuse of permissions.

基于本申请第一实施例,在本申请第三实施例中,与上述实施例一相同或相似的内容,可以参考上文介绍,后续不再赘述。在此基础上,请参照图3,步骤S30之后,所述数据权限配置方法还包括步骤B10~B30:Based on the first embodiment of the present application, in the third embodiment of the present application, the same or similar contents as those in the first embodiment can be referred to the above description, and will not be repeated in the following. On this basis, please refer to FIG. 3, after step S30, the data permission configuration method further includes steps B10 to B30:

步骤B10,当检测到所述管理员的引用请求时,确定所述引用请求关联的引用数据维度并显示,所述引用数据维度包括若干所述通用数据维度;Step B10, when a reference request from the administrator is detected, determining and displaying reference data dimensions associated with the reference request, wherein the reference data dimensions include a plurality of the common data dimensions;

步骤B20,基于所述管理员对于所述引用数据维度的选定操作,确定对应的引用数据资源权限;Step B20, determining corresponding reference data resource permissions based on the administrator's selection operation on the reference data dimension;

步骤B30,对所述引用数据资源权限和所述通用数据资源权限进行去重和取并集处理,并根据处理结果配置所述数据角色的通用数据资源权限。Step B30, deduplication and union processing are performed on the reference data resource permissions and the general data resource permissions, and the general data resource permissions of the data role are configured according to the processing results.

在本实施例中,通用维度权限是可以继承与被继承的,管理员可以通过定义一些通用的权限配置来被继承,从而减少配置的重复性。In this embodiment, the general dimension permissions can be inherited and inherited, and the administrator can define some general permission configurations to be inherited, thereby reducing the duplication of configurations.

可选地,用户界面设置有引用按钮,当管理员点击引用按钮时,会自动触发引用请求。系统需要解析这个引用请求,确定其关联的所有引用数据维度,并将它们展示给管理员。Optionally, the user interface is provided with a reference button, and when the administrator clicks the reference button, a reference request is automatically triggered. The system needs to parse the reference request, determine all the reference data dimensions associated with it, and display them to the administrator.

其中,引用数据维度可以是两种形式:一种是管理员自定义的固定模板,另一种是根据具体业务流程灵活生成的。灵活生成的方式可以精准地确定所需的数据维度,避免了固定模板可能带来的不匹配或冗余问题。The reference data dimension can be in two forms: one is a fixed template customized by the administrator, and the other is flexibly generated according to the specific business process. The flexible generation method can accurately determine the required data dimensions, avoiding the mismatch or redundancy problems that may be caused by fixed templates.

具体地,对请求进行解析,提取出业务流程的相关参数,例如数据角色、业务场景描述、业务流程类型等。后端维护有一个业务流程映射表,该表记录了每个业务流程类型的历史流程记录。因此,后端会基于业务流程映射表,确定当前业务流程类型所对应的历史流程记录,从而识别出该流程记录涉及的通用数据维度。接下来,对这些通用数据维度进行筛选和排序,以生成最终的引用数据维度列表。Specifically, the request is parsed to extract the relevant parameters of the business process, such as data roles, business scenario descriptions, business process types, etc. The backend maintains a business process mapping table, which records the historical process records of each business process type. Therefore, the backend will determine the historical process records corresponding to the current business process type based on the business process mapping table, thereby identifying the common data dimensions involved in the process record. Next, these common data dimensions are filtered and sorted to generate the final reference data dimension list.

至于具体的展示方式,由于通用维度权限具有树形结构,后端可以将这些维度以层次化的方式展示给管理员,使得管理员可以清晰地看到各个维度之间的继承关系。As for the specific display method, since the general dimension permissions have a tree structure, the backend can display these dimensions to the administrator in a hierarchical manner, so that the administrator can clearly see the inheritance relationship between the dimensions.

进一步地,管理员根据实际需要,从显示的引用数据维度中选择一个或多个。基于管理员的选定操作,后端进一步确定这些选定维度所对应的引用数据资源权限。由于通用维度权限可以被继承,管理员选择的维度可能会自动包含其父级维度的权限,从而减少配置的重复性。Furthermore, the administrator selects one or more reference data dimensions from the displayed reference data dimensions according to actual needs. Based on the administrator's selection operation, the backend further determines the reference data resource permissions corresponding to these selected dimensions. Since common dimension permissions can be inherited, the dimensions selected by the administrator may automatically include the permissions of their parent dimensions, thereby reducing configuration duplication.

接着,后端会对引用数据资源权限和已经存在的通用数据资源权限进行去重处理,确保不会有重复的权限配置;然后,将两者合并,得到最终的数据角色权限配置。由于通用权限的继承特性,合并后的权限集合可能会包含多个层次的权限。Next, the backend will deduplicate the referenced data resource permissions and existing general data resource permissions to ensure that there are no duplicate permission configurations; then, the two will be merged to obtain the final data role permission configuration. Due to the inheritance characteristics of general permissions, the merged permission set may contain multiple levels of permissions.

示例性地,管理员在配置数据角色“财务人员”时,点击界面中的引用按钮,后端会确定数据角色的业务部门,并显示业务部门对应的部门通用维度,即显示财务管理系统中的通用数据维度。响应于管理员的选定操作,后端会确定对应的引用数据资源权限,如财务单查看权限。For example, when the administrator configures the data role "finance personnel", he clicks the reference button in the interface, and the backend determines the business department of the data role and displays the department common dimensions corresponding to the business department, that is, displays the common data dimensions in the financial management system. In response to the administrator's selection operation, the backend determines the corresponding reference data resource permissions, such as the permission to view financial documents.

另外,后端还可以进一步分析数据角色在业务部门的部门职位,并为其绑定部门职位对应的部门特殊权限,例如,“财务主管”角色将获得财务单审核权限。这一举措不仅赋予了“财务主管”更为广泛的职权范围,也确保了“财务人员”群体能够基于部门通用权限框架,继续享有必要的访问与操作权限,确保数据权限在满足通用配置的基础上,可以灵活地适应特定场景的需求,从而在维护权限体系一致性的同时,实现了权限分配的精细化与差异化,确保了对各种复杂权限管理场景的有效应对。In addition, the backend can further analyze the departmental positions of data roles in the business department and bind the departmental special permissions corresponding to the departmental positions. For example, the "financial director" role will obtain the financial form review permission. This measure not only gives the "financial director" a wider range of powers, but also ensures that the "financial personnel" group can continue to enjoy the necessary access and operation permissions based on the department's general permission framework, ensuring that data permissions can flexibly adapt to the needs of specific scenarios on the basis of meeting the general configuration, thereby maintaining the consistency of the permission system while achieving the refinement and differentiation of permission allocation, ensuring effective response to various complex permission management scenarios.

本实施例提供了一种数据权限配置方法,支持通用权限的继承与覆盖机制,使得管理员在对引用数据维度进行选定操作时,能够灵活地实现权限的继承和精细化的覆盖。这种机制能够确保角色具备适当的权限,同时最大限度地减少管理和维护工作量,有效提高了权限管理的效率。This embodiment provides a data permission configuration method that supports the inheritance and overwriting mechanism of general permissions, so that administrators can flexibly implement permission inheritance and refined overwriting when performing selected operations on referenced data dimensions. This mechanism can ensure that roles have appropriate permissions, while minimizing the management and maintenance workload, and effectively improving the efficiency of permission management.

基于本申请第一实施例,在本申请第四实施例中,与上述实施例一相同或相似的内容,可以参考上文介绍,后续不再赘述。在此基础上,请参照图4,步骤S30之后,所述数据权限配置方法还包括步骤C10~C40:Based on the first embodiment of the present application, in the fourth embodiment of the present application, the same or similar contents as those in the first embodiment can be referred to the above description, and will not be repeated in the following. On this basis, please refer to FIG. 4, after step S30, the data permission configuration method further includes steps C10 to C40:

步骤C10,当检测到用户的登录请求时,对所述登录请求进行身份验证;Step C10, when a user's login request is detected, identity verification is performed on the login request;

步骤C20,若身份验证通过,则解析所述登录请求中的目标数据角色和访问请求;Step C20, if the identity authentication is passed, parsing the target data role and access request in the login request;

步骤C30,确定所述目标数据角色对应的目标数据资源权限;Step C30, determining the target data resource authority corresponding to the target data role;

步骤C40,根据访问控制策略,确定所述目标数据资源权限和访问请求对应的访问决策,并执行所述访问决策对应的操作。Step C40: Determine the access decision corresponding to the target data resource authority and the access request according to the access control policy, and execute the operation corresponding to the access decision.

如图5所示,用户通过前端界面输入登录信息,如用户名、密码、手机号验证码等,前端界面会提交登录请求到后端服务器。As shown in Figure 5, the user enters login information, such as user name, password, mobile phone number verification code, etc. through the front-end interface, and the front-end interface submits a login request to the back-end server.

后端接收来自前端的登录请求后,从数据库中检索用户信息,可以使用安全算法验证密码哈希值是否匹配。若匹配,则身份验证通过;否则,反馈验证结果失败提醒。After receiving the login request from the front-end, the back-end retrieves the user information from the database and can use a security algorithm to verify whether the password hash value matches. If it matches, the identity authentication is successful; otherwise, a verification failure reminder is fed back.

进一步地,若身份验证通过,从登录请求中提取目标数据角色和访问请求信息。接着,根据目标数据角色,查询数据库中的数据角色与数据资源权限映射表,确定对应的目标数据资源权限。Furthermore, if the identity authentication is passed, the target data role and access request information are extracted from the login request. Then, according to the target data role, the data role and data resource permission mapping table in the database is queried to determine the corresponding target data resource permission.

将目标数据资源权限与访问请求进行比对,根据访问控制策略确定访问决策并执行,具体步骤如下:Compare the target data resource permissions with the access request, determine the access decision and execute it according to the access control policy. The specific steps are as follows:

解析目标数据资源权限,确定可访问的数据资源,还可以确定对这些资源可执行的操作,可以以资源点形式返回。同时,解析用户的访问请求,提取出请求中涉及的目标数据资源、请求的操作类型以及其他相关参数。Parse the target data resource permissions to determine the accessible data resources and the operations that can be performed on these resources, which can be returned in the form of resource points. At the same time, parse the user's access request to extract the target data resource involved in the request, the requested operation type, and other related parameters.

将解析出的权限与请求进行比对。比对过程需要仔细匹配请求的目标资源是否在用户权限范围内,以及请求的操作类型是否被允许。Compare the parsed permissions with the request. The comparison process needs to carefully match whether the target resource of the request is within the user's permissions and whether the requested operation type is allowed.

根据当前的用户属性、资源属性等因素,采用适用的访问控制策略。这些策略可以是预定义的,也可以是动态生成的,以适应不同的业务场景和安全需求。例如,允许访问:如果用户的权限与请求类型匹配,系统将允许访问,并执行相应的操作;拒绝访问:如果用户的权限与请求类型不匹配,系统将拒绝访问,并返回相应的错误信息;附加处理:在某些情况下,可能需要进行附加的访问控制处理,如多因素认证、审计记录、日志加密等。Adopt applicable access control policies based on current user attributes, resource attributes and other factors. These policies can be predefined or dynamically generated to adapt to different business scenarios and security requirements. For example, allow access: if the user's permissions match the request type, the system will allow access and perform the corresponding operation; deny access: if the user's permissions do not match the request type, the system will deny access and return the corresponding error message; additional processing: in some cases, additional access control processing may be required, such as multi-factor authentication, audit records, log encryption, etc.

基于比对结果和访问控制策略,生成最终的访问决策,可以是“允许访问”、“拒绝访问”,或者是“附加处理”。Based on the comparison results and access control policy, the final access decision is generated, which can be "allow access", "deny access", or "additional processing".

另外,考虑在某些情况下,用户可能被分配了多个角色,每个角色可能对应不同的权限。Additionally, consider that in some cases a user may be assigned multiple roles, each of which may correspond to different permissions.

因此,当检测到用户的目标数据角色数量为多个时,系统需要对这些角色进行处理。为每个目标数据角色执行查询,获取与之关联的候选数据资源权限,将这些候选数据资源权限收集到一个集合中,形成一个包含所有候选数据资源权限的列表。Therefore, when it is detected that the user has multiple target data roles, the system needs to process these roles. A query is performed for each target data role to obtain the candidate data resource permissions associated with it, and these candidate data resource permissions are collected into a set to form a list containing all candidate data resource permissions.

由于用户可能在多个角色中拥有相同的权限,因此,需要实现去重算法,遍历集合,识别并移除重复的权限项,确保每个权限只出现一次。在去重后,将所有唯一的候选权限合并,形成最终的目标数据资源权限集合。Since a user may have the same permissions in multiple roles, it is necessary to implement a deduplication algorithm to traverse the set, identify and remove duplicate permission items, and ensure that each permission appears only once. After deduplication, all unique candidate permissions are merged to form the final target data resource permission set.

另外,本方案还可以建立完备的审计追踪机制,全面记录用户的数据访问操作,并提供安全分析与监控。In addition, this solution can also establish a complete audit tracking mechanism to comprehensively record users' data access operations and provide security analysis and monitoring.

具体来说,系统针对每一个用户数据访问请求,都会进行详细的审计日志记录,内容包括操作主体、访问时段、访问地点、请求资源等信息。这些审计日志可用于权限安全分析,帮助管理员发现异常访问模式或趋势,防范数据泄露风险。此外,系统会对权限控制流程进行实时检测与审查,一旦发现非授权的操作请求,可以立即采取拦截或限流等方式进行防护与响应。Specifically, the system will record detailed audit logs for each user data access request, including information such as the operating subject, access period, access location, and requested resources. These audit logs can be used for permission security analysis to help administrators discover abnormal access patterns or trends and prevent data leakage risks. In addition, the system will conduct real-time detection and review of the permission control process. Once an unauthorized operation request is found, it can immediately take measures such as interception or flow control to protect and respond.

通过完善的审计与监控手段,实现对权限控制的全生命周期跟踪,能够及时发现并阻止异常访问,确保了数据的完整性与机密性不受威胁。这显著提升了系统的权限控制可靠性与安全性。Through perfect auditing and monitoring methods, the whole life cycle tracking of permission control can be realized, abnormal access can be discovered and blocked in time, and the integrity and confidentiality of data are not threatened. This significantly improves the reliability and security of the system's permission control.

本实施例提供了一种数据权限配置方法,采用强验证及授权机制,通过严格验证用户的身份,可以防止未经授权的访问,从而保护系统内的敏感数据免受未授权用户的窥探或篡改。而且,访问控制策略确保了用户只能访问其被授权的资源,这进一步增强了系统的安全性,减少了内部泄露或误操作的风险。这种验证授权机制贯穿并约束了整个数据权限控制流程,系统拒绝任何未经授权的访问请求,加强了整体系统的数据安全性与权限管理的规范性。This embodiment provides a data permission configuration method, which adopts a strong verification and authorization mechanism. By strictly verifying the identity of the user, unauthorized access can be prevented, thereby protecting sensitive data in the system from being snooped or tampered with by unauthorized users. Moreover, the access control policy ensures that users can only access the resources they are authorized to, which further enhances the security of the system and reduces the risk of internal leakage or misoperation. This verification and authorization mechanism runs through and constrains the entire data permission control process. The system rejects any unauthorized access requests, which strengthens the data security of the overall system and the standardization of permission management.

示例性地,为了有助于理解本实施例结合上述实施例一后所得到的数据权限配置方法的实现流程,参照图6,图6提供了一种本方法数据权限业务库表关联结构图,具体地:Exemplarily, in order to help understand the implementation process of the data permission configuration method obtained by combining this embodiment with the above-mentioned embodiment 1, refer to Figure 6, which provides a data permission business library table association structure diagram of this method, specifically:

(1)1个用户可属于多个组织,1个组织也可包括多个用户。(1) A user can belong to multiple organizations, and an organization can include multiple users.

(2)1个岗位可属于多个组织,1个组织也可包括多个岗位。(2) A position can belong to multiple organizations, and an organization can include multiple positions.

(3)1个用户可关联多个岗位,1个岗位可关联多个用户。(3) One user can be associated with multiple positions, and one position can be associated with multiple users.

(4)1个用户可属于多个系统,1个系统也可包括多个用户,即用户可拥有多个系统权限。(4) A user can belong to multiple systems, and a system can include multiple users, that is, a user can have multiple system permissions.

(5)可以定义一些通用的权限配置,即通用数据维度,如区域、性别、年份、季度等。(5) You can define some common permission configurations, namely common data dimensions, such as region, gender, year, quarter, etc.

(6)对应通用维度定义通用数据权限资源,通用数据权限资源可被其他权限继承。权限继承可以建立在角色之间或用户之间,也可以跨越不同的维度。(6) Define common data permission resources for common dimensions, which can be inherited by other permissions. Permission inheritance can be established between roles or users, or across different dimensions.

(7)各子系统可根据业务应用场景自定义的系统权限配置,即系统数据维度,如人员部门等。(7) Each subsystem can customize system permission configuration according to business application scenarios, that is, system data dimensions, such as personnel departments, etc.

(8)对应系统数据维度定义系统数据权限资源如某部门专班小组等。(8) Define system data authority resources corresponding to system data dimensions, such as a department’s special task force, etc.

(9)角色关联数据资源,包括通用数据资源和系统数据资源权限。赋予角色多维度权限资源。(9) Role-related data resources, including general data resources and system data resource permissions. Roles are granted multi-dimensional permission resources.

(10)1个用户可拥有多个角色,1个角色可赋予多个用户。即赋予用户相应角色数据权限,赋予用户成员获取相应角色数据权限。(10) One user can have multiple roles, and one role can be assigned to multiple users. That is, users are assigned data permissions corresponding to their roles, and user members are assigned permissions to obtain data corresponding to their roles.

(11)支持权限动态配置,权限资源配置调整变更,不需重启或重新配置系统,根据实际配置权限详情生效,同步最新权限资源策略进行数据权限访问控制。(11) Supports dynamic configuration of permissions and adjustment of permission resource configuration without restarting or reconfiguring the system. It takes effect based on the actual configuration permission details and synchronizes the latest permission resource strategy to perform data permission access control.

参照图7,图7提供了数据权限应用时的数据权限接口调用流程图,具体地:Referring to FIG. 7 , FIG. 7 provides a data permission interface call flow chart when applying data permission, specifically:

(1)在用户登录时通过令牌和系统编码获取该用户所拥有该系统的数据角色。(1) When a user logs in, the data role of the system owned by the user is obtained through the token and system code.

(2)查询用户关联的角色,若未关联任何角色,返回空权限,即无数据权限。(2) Query the roles associated with the user. If no role is associated, the result is null permissions, which means no data permissions.

(3)若用户关联部分数据角色,根据通用数据维度或系统数据维度编码分别处理每个角色在系统下该数据维度编码所对应的数据资源权限。(3) If the user is associated with some data roles, the data resource permissions corresponding to the data dimension code of each role in the system will be processed separately according to the general data dimension or system data dimension code.

(4)根据数据维度编码在该系统中查询所有关联数据角色下所选中的数据资源权限。然后,对这些数据资源权限进行去重,取并集得到该用户在系统中所拥有的数据资源权限。(4) Query the selected data resource permissions under all associated data roles in the system according to the data dimension code. Then, deduplicate these data resource permissions and take the union to obtain the data resource permissions that the user has in the system.

(5)若用户被关联多个数据角色,系统会获取用户关联的各个角色所定义的数据维度编码,并根据同一维度编码进行权限合并。即对于角色中定义的同一数据维度,系统会进行权限资源的并集操作,去除重复后聚合为该用户在该数据维度的权限。(5) If a user is associated with multiple data roles, the system will obtain the data dimension codes defined by each role associated with the user, and merge permissions based on the same dimension code. That is, for the same data dimension defined in the role, the system will perform a union operation on the permission resources, remove duplications, and aggregate them into the user's permissions for the data dimension.

(6)通用数据权限资源可被其他权限继承,权限继承可以建立在角色之间或用户之间,也可以跨越不同的维度。例如,一个部门经理角色可以继承公司管理员角色的部分或全部权限,或一个项目角色可以从业务角色继承权限。这种基于角色的权限继承可以快速构建角色间的授权逻辑。此外,一个用户可以继承多个角色的权限,以满足其在组织中担任多个职责的需求。(6) Common data permission resources can be inherited by other permissions. Permission inheritance can be established between roles or between users, and can also span different dimensions. For example, a department manager role can inherit some or all permissions from a company administrator role, or a project role can inherit permissions from a business role. This role-based permission inheritance can quickly build authorization logic between roles. In addition, a user can inherit permissions from multiple roles to meet their needs for multiple responsibilities in the organization.

需要说明的是,上述示例仅用于理解本申请,并不构成对本申请数据权限配置方法的限定,基于此技术构思进行更多形式的简单变换,均在本申请的保护范围内。It should be noted that the above examples are only used to understand the present application and do not constitute a limitation on the data permission configuration method of the present application. More simple transformations based on this technical concept are all within the scope of protection of the present application.

本申请提供一种数据权限配置设备,数据权限配置设备包括:至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的计算机程序,所述计算机程序被至少一个处理器执行,以使至少一个处理器能够执行上述实施例一中的数据权限配置方法。The present application provides a data permission configuration device, which includes: at least one processor; and a memory that is communicatively connected to the at least one processor; wherein the memory stores a computer program that can be executed by the at least one processor, and the computer program is executed by the at least one processor so that the at least one processor can execute the data permission configuration method in the above-mentioned embodiment one.

下面参考图8,其示出了适于用来实现本申请实施例的数据权限配置设备的结构示意图。本申请实施例中的数据权限配置设备可以包括但不限于诸如移动电话、笔记本电脑、数字广播接收器、PDA(Personal Digital Assistant:个人数字助理)、PAD(PortableApplication Description:平板电脑)、PMP(Portable Media Player:便携式多媒体播放器)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。图8示出的数据权限配置设备仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。Reference is made to Figure 8 below, which shows a schematic diagram of the structure of a data authority configuration device suitable for implementing an embodiment of the present application. The data authority configuration device in the embodiment of the present application may include, but is not limited to, mobile terminals such as mobile phones, laptop computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Portable Application Descriptions), PMPs (Portable Media Players), vehicle-mounted terminals (such as vehicle-mounted navigation terminals), etc., and fixed terminals such as digital TVs, desktop computers, etc. The data authority configuration device shown in Figure 8 is only an example and should not bring any limitations to the functions and scope of use of the embodiments of the present application.

如图8所示,数据权限配置设备可以包括处理装置1001(例如中央处理器、图形处理器等),其可以根据存储在只读存储器(ROM:Read Only Memory)1002中的程序或者从存储装置1003加载到随机访问存储器(RAM:Random Access Memory)1004中的程序执行各种适当的动作和处理。在RAM1004中,还存储有数据权限配置设备操作所需的各种程序和数据。处理装置1001、ROM1002以及RAM1004通过总线1005彼此相连。输入/输出(I/O)接口1006也连接至总线。通常,以下系统可以连接至I/O接口1006:包括例如触摸屏、触摸板、键盘、鼠标、图像传感器、麦克风、加速度计、陀螺仪等的输入装置1007;包括例如液晶显示器(LCD:Liquid Crystal Display)、扬声器、振动器等的输出装置1008;包括例如磁带、硬盘等的存储装置1003;以及通信装置1009。通信装置1009可以允许数据权限配置设备与其他设备进行无线或有线通信以交换数据。虽然图中示出了具有各种系统的数据权限配置设备,但是应理解的是,并不要求实施或具备所有示出的系统。可以替代地实施或具备更多或更少的系统。As shown in FIG8 , the data authority configuration device may include a processing device 1001 (e.g., a central processing unit, a graphics processor, etc.), which may perform various appropriate actions and processes according to a program stored in a read-only memory (ROM: Read Only Memory) 1002 or a program loaded from a storage device 1003 to a random access memory (RAM: Random Access Memory) 1004. In RAM1004, various programs and data required for the operation of the data authority configuration device are also stored. The processing device 1001, ROM1002, and RAM1004 are connected to each other via a bus 1005. An input/output (I/O) interface 1006 is also connected to the bus. Typically, the following systems may be connected to the I/O interface 1006: an input device 1007 including, for example, a touch screen, a touchpad, a keyboard, a mouse, an image sensor, a microphone, an accelerometer, a gyroscope, etc.; an output device 1008 including, for example, a liquid crystal display (LCD: Liquid Crystal Display), a speaker, a vibrator, etc.; a storage device 1003 including, for example, a magnetic tape, a hard disk, etc.; and a communication device 1009. The communication device 1009 can allow the data rights configuration device to communicate wirelessly or wired with other devices to exchange data. Although the data rights configuration device with various systems is shown in the figure, it should be understood that it is not required to implement or have all the systems shown. More or fewer systems can be implemented or have alternatively.

特别地,根据本申请公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本申请公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信装置从网络上被下载和安装,或者从存储装置1003被安装,或者从ROM1002被安装。在该计算机程序被处理装置1001执行时,执行本申请公开实施例的方法中限定的上述功能。In particular, according to the embodiments disclosed in the present application, the process described above with reference to the flowchart can be implemented as a computer software program. For example, the embodiments disclosed in the present application include a computer program product, which includes a computer program carried on a computer-readable medium, and the computer program includes a program code for executing the method shown in the flowchart. In such an embodiment, the computer program can be downloaded and installed from a network through a communication device, or installed from a storage device 1003, or installed from a ROM 1002. When the computer program is executed by the processing device 1001, the above-mentioned functions defined in the method of the embodiment disclosed in the present application are executed.

本申请提供的数据权限配置设备,采用上述实施例中的数据权限配置方法,能解决数据权限配置的灵活性不足的技术问题。与现有技术相比,本申请提供的数据权限配置设备的有益效果与上述实施例提供的数据权限配置方法的有益效果相同,且该数据权限配置设备中的其他技术特征与上一实施例方法公开的特征相同,在此不做赘述。The data authority configuration device provided by the present application adopts the data authority configuration method in the above embodiment, which can solve the technical problem of insufficient flexibility of data authority configuration. Compared with the prior art, the beneficial effects of the data authority configuration device provided by the present application are the same as the beneficial effects of the data authority configuration method provided by the above embodiment, and the other technical features in the data authority configuration device are the same as the features disclosed in the method of the previous embodiment, which will not be repeated here.

应当理解,本申请公开的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式的描述中,具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。It should be understood that the various parts disclosed in this application can be implemented by hardware, software, firmware or a combination thereof. In the description of the above embodiments, specific features, structures, materials or characteristics can be combined in any one or more embodiments or examples in a suitable manner.

以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of the present application, but the protection scope of the present application is not limited thereto. Any person skilled in the art who is familiar with the present technical field can easily think of changes or substitutions within the technical scope disclosed in the present application, which should be included in the protection scope of the present application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.

本申请提供一种计算机可读存储介质,具有存储在其上的计算机程序,计算机可读程序指令用于执行上述实施例中的数据权限配置方法。The present application provides a computer-readable storage medium having a computer program stored thereon, and the computer-readable program instructions are used to execute the data permission configuration method in the above-mentioned embodiment.

本申请提供的计算机可读存储介质例如可以是U盘,但不限于电、磁、光、电磁、红外线、或半导体的系统、系统或器件,或者任意以上的组合。计算机可读存储介质的更具体地例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM:Random Access Memory)、只读存储器(ROM:Read Only Memory)、可擦式可编程只读存储器(EPROM:Erasable Programmable Read Only Memory或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM:CD-Read Only Memory)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本实施例中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、系统或者器件使用或者与其结合使用。计算机可读存储介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:电线、光缆、RF(Radio Frequency:射频)等等,或者上述的任意合适的组合。The computer-readable storage medium provided in the present application may be, for example, a USB flash drive, but is not limited to electrical, magnetic, optical, electromagnetic, infrared, or semiconductor systems, systems or devices, or any combination of the above. More specific examples of computer-readable storage media may include, but are not limited to: an electrical connection with one or more wires, a portable computer disk, a hard disk, a random access memory (RAM: Random Access Memory), a read-only memory (ROM: Read Only Memory), an erasable programmable read-only memory (EPROM: Erasable Programmable Read Only Memory or flash memory), an optical fiber, a portable compact disk read-only memory (CD-ROM: CD-Read Only Memory), an optical storage device, a magnetic storage device, or any suitable combination of the above. In this embodiment, the computer-readable storage medium may be any tangible medium containing or storing a program, which may be used by or in combination with an instruction execution system, system or device. The program code contained on the computer-readable storage medium may be transmitted using any appropriate medium, including but not limited to: wires, optical cables, RF (Radio Frequency: Radio Frequency), etc., or any suitable combination of the above.

上述计算机可读存储介质可以是数据权限配置设备中所包含的;也可以是单独存在,而未装配入数据权限配置设备中。The computer-readable storage medium may be included in the data authority configuration device; or may exist independently without being assembled into the data authority configuration device.

上述计算机可读存储介质承载有一个或者多个程序,当上述一个或者多个程序被数据权限配置设备执行时,使得数据权限配置设备:当检测到管理员的数据角色配置请求时,获取待配置的数据角色;基于管理员选定的系统数据维度,配置所述数据角色的系统数据资源权限;基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限。The above-mentioned computer-readable storage medium carries one or more programs. When the above-mentioned one or more programs are executed by the data permission configuration device, the data permission configuration device: when detecting the administrator's data role configuration request, obtains the data role to be configured; based on the system data dimension selected by the administrator, configures the system data resource permissions of the data role; based on the general data dimension selected by the administrator, configures the general data resource permissions of the data role.

可以以一种或多种程序设计语言或其组合来编写用于执行本申请的操作的计算机程序代码,上述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN:Local Area Network)或广域网(WAN:Wide Area Network)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。Computer program code for performing the operations of the present application may be written in one or more programming languages or a combination thereof, including object-oriented programming languages such as Java, Smalltalk, C++, and conventional procedural programming languages such as "C" or similar programming languages. The program code may be executed entirely on the user's computer, partially on the user's computer, as a separate software package, partially on the user's computer and partially on a remote computer, or entirely on a remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (e.g., via the Internet using an Internet service provider).

附图中的流程图和框图,图示了按照本申请各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框,以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flow chart and block diagram in the accompanying drawings illustrate the possible architecture, function and operation of the system, method and computer program product according to various embodiments of the present application. In this regard, each box in the flow chart or block diagram can represent a module, a program segment or a part of a code, and the module, the program segment or a part of the code contains one or more executable instructions for realizing the specified logical function. It should also be noted that in some alternative implementations, the functions marked in the box can also occur in a sequence different from that marked in the accompanying drawings. For example, two boxes represented in succession can actually be executed substantially in parallel, and they can sometimes be executed in the opposite order, depending on the functions involved. It should also be noted that each box in the block diagram and/or flow chart, and the combination of the boxes in the block diagram and/or flow chart can be implemented with a dedicated hardware-based system that performs the specified function or operation, or can be implemented with a combination of dedicated hardware and computer instructions.

描述本申请实施例中所涉及到的模块可以通过软件的方式实现,也可以通过硬件的方式来实现。其中,模块的名称在某种情况下并不构成对该单元本身的限定。The modules involved in the embodiments of the present application may be implemented by software or hardware, wherein the name of the module does not limit the unit itself in some cases.

本申请提供的可读存储介质为计算机可读存储介质,所述计算机可读存储介质存储有用于执行上述数据权限配置方法的计算机程序,能够解决数据权限配置的灵活性不足的技术问题。与现有技术相比,本申请提供的计算机可读存储介质的有益效果与上述实施例提供的数据权限配置方法的有益效果相同,在此不作赘述。The readable storage medium provided in this application is a computer-readable storage medium, which stores a computer program for executing the above-mentioned data permission configuration method, and can solve the technical problem of insufficient flexibility of data permission configuration. Compared with the prior art, the beneficial effects of the computer-readable storage medium provided in this application are the same as the beneficial effects of the data permission configuration method provided in the above-mentioned embodiment, and will not be repeated here.

以上所述仅为本申请的部分实施例,并非因此限制本申请的专利范围,凡是在本申请的技术构思下,利用本申请说明书及附图内容所作的等效结构变换,或直接/间接运用在其他相关的技术领域均包括在本申请的专利保护范围内。The above descriptions are only some embodiments of the present application, and are not intended to limit the patent scope of the present application. All equivalent structural changes made using the contents of the present application specification and drawings under the technical concept of the present application, or direct/indirect applications in other related technical fields are included in the patent protection scope of the present application.

Claims (10)

1.一种数据权限配置方法,其特征在于,所述方法包括:1. A data permission configuration method, characterized in that the method comprises: 当检测到管理员的数据角色配置请求时,获取待配置的数据角色;When a data role configuration request from an administrator is detected, the data role to be configured is obtained; 基于管理员选定的系统数据维度,配置所述数据角色的系统数据资源权限;Based on the system data dimensions selected by the administrator, configure the system data resource permissions of the data role; 基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限。Based on the common data dimensions selected by the administrator, the common data resource permissions of the data role are configured. 2.如权利要求1所述的方法,其特征在于,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:2. The method according to claim 1, characterized in that after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the method further comprises: 确定所述系统数据资源权限对应的系统数据资源,以及所述通用数据资源权限对应的通用数据资源;Determine the system data resources corresponding to the system data resource authority and the general data resources corresponding to the general data resource authority; 基于所述管理员对权限级别的选定操作,配置所述系统数据资源和所述通用数据资源的操作权限。Based on the administrator's selection of the permission level, the operation permissions of the system data resources and the common data resources are configured. 3.如权利要求1所述的方法,其特征在于,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:3. The method according to claim 1, characterized in that after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the method further comprises: 当检测到所述管理员的数据角色指派请求时,解析所述数据角色指派请求中的用户标识和目标数据角色;When a data role assignment request of the administrator is detected, parsing the user identifier and the target data role in the data role assignment request; 建立所述用户标识和所述目标数据角色的关联关系。An association relationship between the user identifier and the target data role is established. 4.如权利要求3所述的方法,其特征在于,所述建立所述用户标识和所述目标数据角色的关联关系的步骤之前,还包括:4. The method according to claim 3, characterized in that before the step of establishing the association relationship between the user identification and the target data role, it also includes: 若所述目标数据角色属于关键数据角色,则确定所有所述关键数据角色的总数量;If the target data role is a key data role, determining the total number of all the key data roles; 若所述总数量低于数量阈值,则执行所述建立所述用户标识和所述目标数据角色的关联关系的步骤。If the total number is lower than the number threshold, the step of establishing the association relationship between the user identifier and the target data role is performed. 5.如权利要求1所述的方法,其特征在于,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:5. The method according to claim 1, characterized in that after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the method further comprises: 当检测到所述管理员的引用请求时,确定所述引用请求关联的引用数据维度并显示,所述引用数据维度包括若干所述通用数据维度;When a reference request from the administrator is detected, determining and displaying reference data dimensions associated with the reference request, wherein the reference data dimensions include a plurality of the common data dimensions; 基于所述管理员对于所述引用数据维度的选定操作,确定对应的引用数据资源权限;Determining corresponding reference data resource permissions based on the administrator's selected operation on the reference data dimension; 对所述引用数据资源权限和所述通用数据资源权限进行去重和取并集处理,并根据处理结果配置所述数据角色的通用数据资源权限。The reference data resource permissions and the general data resource permissions are deduplicated and unioned, and the general data resource permissions of the data role are configured according to the processing results. 6.如权利要求5所述的方法,其特征在于,所述确定所述引用请求关联的引用数据维度并显示的步骤包括:6. The method according to claim 5, wherein the step of determining and displaying the reference data dimension associated with the reference request comprises: 确定所述引用请求中的业务流程类型;Determining a business process type in the reference request; 根据所述业务流程类型涉及的通用数据维度,确定所述引用数据维度并显示。According to the common data dimensions involved in the business process type, the reference data dimensions are determined and displayed. 7.如权利要求1所述的方法,其特征在于,所述基于所述管理员选定的通用数据维度,配置所述数据角色的通用数据资源权限的步骤之后,还包括:7. The method according to claim 1, characterized in that after the step of configuring the general data resource permissions of the data role based on the general data dimension selected by the administrator, the method further comprises: 当检测到用户的登录请求时,对所述登录请求进行身份验证;When a login request from a user is detected, authenticating the login request; 若身份验证通过,则解析所述登录请求中的目标数据角色和访问请求;If the identity authentication is successful, the target data role and access request in the login request are parsed; 确定所述目标数据角色对应的目标数据资源权限;Determine the target data resource authority corresponding to the target data role; 根据访问控制策略,确定所述目标数据资源权限和访问请求对应的访问决策,并执行所述访问决策对应的操作。According to the access control policy, the access decision corresponding to the target data resource authority and the access request is determined, and the operation corresponding to the access decision is executed. 8.如权利要求7所述的方法,其特征在于,所述确定所述目标数据角色对应的目标数据资源权限的步骤包括:8. The method according to claim 7, wherein the step of determining the target data resource authority corresponding to the target data role comprises: 若所述目标数据角色的数量为多个,则确定各目标数据角色关联的候选数据资源权限;If there are multiple target data roles, determining the candidate data resource permissions associated with each target data role; 对所述候选数据资源权限进行去重和合并,得到所述目标数据资源权限。The candidate data resource permissions are deduplicated and merged to obtain the target data resource permissions. 9.一种数据权限配置设备,其特征在于,所述设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序配置为实现如权利要求1至8中任一项所述的数据权限配置方法的步骤。9. A data permission configuration device, characterized in that the device comprises: a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the computer program is configured to implement the steps of the data permission configuration method as described in any one of claims 1 to 8. 10.一种存储介质,其特征在于,所述存储介质为计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至8中任一项所述的数据权限配置方法的步骤。10. A storage medium, characterized in that the storage medium is a computer-readable storage medium, and a computer program is stored on the storage medium, and when the computer program is executed by a processor, the steps of the data permission configuration method according to any one of claims 1 to 8 are implemented.
CN202411413461.1A 2024-10-11 2024-10-11 Data permission configuration method, device and storage medium Active CN118916906B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411413461.1A CN118916906B (en) 2024-10-11 2024-10-11 Data permission configuration method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411413461.1A CN118916906B (en) 2024-10-11 2024-10-11 Data permission configuration method, device and storage medium

Publications (2)

Publication Number Publication Date
CN118916906A true CN118916906A (en) 2024-11-08
CN118916906B CN118916906B (en) 2025-03-07

Family

ID=93310710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411413461.1A Active CN118916906B (en) 2024-10-11 2024-10-11 Data permission configuration method, device and storage medium

Country Status (1)

Country Link
CN (1) CN118916906B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007262A1 (en) * 2007-06-29 2009-01-01 Bea Systems, Inc. Computer readable medium for resolving permission for role activation operators
CN107506658A (en) * 2017-07-10 2017-12-22 上海最会保网络科技有限公司 A kind of user authority management system and method
CN113987549A (en) * 2021-11-11 2022-01-28 北京天融信网络安全技术有限公司 Service system authority management method and device, electronic equipment and storage medium
CN117932628A (en) * 2023-12-21 2024-04-26 宝钢工程技术集团有限公司 RBAC-based financial information system authorization management method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007262A1 (en) * 2007-06-29 2009-01-01 Bea Systems, Inc. Computer readable medium for resolving permission for role activation operators
CN107506658A (en) * 2017-07-10 2017-12-22 上海最会保网络科技有限公司 A kind of user authority management system and method
CN113987549A (en) * 2021-11-11 2022-01-28 北京天融信网络安全技术有限公司 Service system authority management method and device, electronic equipment and storage medium
CN117932628A (en) * 2023-12-21 2024-04-26 宝钢工程技术集团有限公司 RBAC-based financial information system authorization management method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
熊天虹 等: "工作流系统中的PRBAC访问控制模型研究", 应用科学学报, vol. 38, no. 5, 30 September 2020 (2020-09-30), pages 672 - 681 *
鹿晨 等: "一种基于信任度的动态访问控制模型T-DARBAC", 电子技术, no. 9, 30 September 2015 (2015-09-30), pages 37 - 40 *

Also Published As

Publication number Publication date
CN118916906B (en) 2025-03-07

Similar Documents

Publication Publication Date Title
US9652788B2 (en) Method and apparatus for logging privilege use in a distributed computing environment
US10462148B2 (en) Dynamic data masking for mainframe application
US20160292445A1 (en) Context-based data classification
US20110239293A1 (en) Auditing access to data based on resource properties
US9165156B2 (en) Role-based access control modeling and auditing system
US9799003B2 (en) Context-dependent transactional management for separation of duties
US11361106B2 (en) Chaining, triggering, and enforcing entitlements
US20080301807A1 (en) System and Method for Controlling On-Demand Security
EP4338075B1 (en) Abnormally permissive role definition detection systems
CN110489994B (en) File authority management method and device for nuclear power station and terminal equipment
CN114422197A (en) Permission access control method and system based on policy management
US20260023759A1 (en) Systems and methods for automated data governance
WO2023044279A1 (en) Application programming interface (api) automation framework
US20120216240A1 (en) Providing data security through declarative modeling of queries
US20230153457A1 (en) Privacy data management in distributed computing systems
US8601551B2 (en) System and method for a business data provisioning for a pre-emptive security audit
CN118916906B (en) Data permission configuration method, device and storage medium
CN115827589A (en) A permission verification method, device, electronic equipment and storage medium
US12045365B2 (en) Governed database connectivity (GDBC) through and around data catalog to registered data sources
US20250363426A1 (en) Secure data destruction and transfer system with enhanced agent enclave for safeguarding stored decisions and inferences and method thereof
CN119903498A (en) Method, device and equipment for fine-grained account authority management and control based on access channel
CN118586029A (en) A privacy data access method, system, terminal device and storage medium
CN118797747A (en) A fine-grained permission control method, device, equipment and storage medium
CN121435203A (en) Big data access control method, device, equipment and medium
CN118627052A (en) A method, system, device and medium for managing personal privacy rights of application programs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant