And schematic rights management

 1. What is the rights management
       rights management: is to achieve a resource or restrict access to system functions for the user, according to safety rules or rights policy defined by the administrator to restrict user access to only the resources that they have been authorized.
       Rights Management: including user authentication and authorization (ie login and authentication), that is, rights management need for the user to log in, then the function of user access permissions verification.
 2. User authentication (login):
    + namely authentication (login) and check if a legitimate user's business processes, user name and password systems are generally judged to user input matches the records in the database. (Except login, user authentication can also authentication fingerprint authentication, face brush and other hardware required to participate)
    + login authentication process:
          the main target of the process appear
          ++ Subject: subject (ie user), may also be a rest Services or api interfaces; that is, objects to access the resource.
          ++ Principal: identity information (usually only), that is, have an account on the popular.
          ++ Credential: voucher Token, can be a password, certificate, fingerprints.
      ## conclusion is that the user (Subject) required to provide identifying information (Principal) and credential information (Credential) at the time of login authentication.
      ## detailed flowchart

3. User authorization
    + authorization is permission verification of whether the user has been authenticated have that authority; that is what determines what the user can do fine-grained verify that the user has certain rights to the resources
    + authorization process :
          ++ Subject: subject (in this case the principal has been authenticated)
          ++ Resource: resource or function of the body to be accessed; for example, a user whether the data can be CRUD (CURD)
          ++ Permission: voucher Token, you can is the password, certificates, fingerprints.
    ### summary is this: is authorized, provided the administrator to authenticate the user has a resource operation or viewing features.
    DETAILED flowchart ###
 




Guess you like

Origin www.cnblogs.com/rain-g/p/12241969.html