Permissions System - IP restrict user access to safe place

     Most of us are on WEB B / S system, a wide variety of users is very large, but there are always some malicious sabotage; in particular, the financial system, user information is black after heavy losses; our Web site management background has a set of tighter security restrictions, anti are those saboteurs.

    1: Although you can set the IP access restrictions in IIS, but there are holidays, under special circumstances, some users will always encounter some troublesome questions from external access to the company, after all, there will always be a good year, holiday or special times time, so we need to fit the system must be flexible IP access policies.

    2: Although the company also has an internal network, but the company is not very large scale generally do not buy special firewall, network behavior management equipment, after all, we ourselves are really understand computers, not very necessary network equipment will not buy those, in fact, those networks many devices can manage access policies.

    3: often limit the part of the user, without limiting another part of the user, the general management of the accounts are relatively open, this will not be too many restrictions behavior.

    4: When the holidays often allow some account can log on remotely background of the company's business systems, will be set back after the holidays.

    5: Most users are not allowed the same time an account with multiple logins much as possible, to prevent the accounts have been hacked, the hacker logged while the company's business systems background, in most cases more than one person is not allowed to simultaneously log in a single account.

    Because of these practical needs, whether to limit our system has multi-user login, whether to limit the project to set IP access.

     The system will log in the user's login time, login, the login IP address and so on.

     Since most of the company in the case is a public network ip address go out, so you can restrict user access to IP, you can also be added to the trusted IP list, so users do not need one IP access restrictions, in line with B / S common requirements of the system.

    Of course, the system also supports IP access settings for individual users, so you can be flexible IP access policies.

   Of course, we also support the functions of the system log limit by time period, non-working hours are not allowed to log into the system.

      These are universal rights management system we .NET components for rapid development platform feature set user access policy ip introductory part, welcomed the guidance of experts. Well, once developed software, you can use 10 years 8 years, although developed very hard, but with it will be very interesting, especially when there are hundreds of users using very rewarding.

      Software is actually a mode of thinking reflects light to mimic the appearance of inimitable inner light to mimic the appearance of inimitable thoughts; just as there are a lot of imitation of Apple, but Apple has been unable to go beyond, and we hope this can be a real back-end management system there are a growing number of information management system developers can accept, can be integrated in a variety of business management systems in their own development.

      Value of the software is reused, the value of life is that the fruits of labor can also be reused, to develop a robust, full-featured, stable performance good, easy to use; do not need to be able to fly overhead, and do not need to get into the ground; as long as run fast enough and good enough on the road to stability and security ok, positioning software function is critical, the limited functionality do not have to be perfect is our goal.

 

 

 

 

Reproduced in: https: //my.oschina.net/iwenr/blog/227840

Guess you like

Origin blog.csdn.net/weixin_34223655/article/details/91675031