当前位置:网站首页>Security permission management details
Security permission management details
2022-07-26 05:06:00 【Program three two lines】
One 、 Authorization process

After the user logs in successfully, the user information will be saved in Authencation In the object ,Authencation There is one in the interface getAuthorities() Method returns the user's permission
Collection<? extends GrantedAuthority> getAuthorities();
The existing system can do permission management based on roles and can also use resources ( Permission string ) Do authority management , there GrantedAuthority Is it a role or a resource ?
- If Business is permission management based on role , The user -> role -> resources , Then the user's role is returned
- If the business is resource-based ( jurisdiction ) Do permission management , The user -> jurisdiction -> resources , What is returned is the user's permission
- If based on role + Permission management , The user -> role -> jurisdiction -> resources , What is returned is the user's permission
security The processing methods of roles and permissions are basically the same , The only difference is that many times it will automatically add a character ROLE_ Prefix , Permissions will not be added
Two 、 Rights management strategy
1、 be based on URL Do authority management ( Filter technology implementation )
@Configuration
public class SecurityConfig extends WebSecurityConfig边栏推荐
- Distance between bus stops: simple simulation problem
- What is the difference between asynchronous and synchronous transmission signals (electronic hardware)
- Two ways to create MySQL database
- Sliding window -- leetcode solution
- Switch and router technology: dynamic routing protocol, rip routing protocol and OSPF routing protocol
- The integrated real-time HTAP database stonedb, how to replace MySQL and achieve nearly 100 times the improvement of analysis performance
- Vector explanation and iterator failure
- How to reproduce the official course of yolov5 gracefully (II) -- Mark and train your own data set
- List converted to tree real use of the project
- 图像非局部均值滤波的原理
猜你喜欢

Shell的read 读取控制台输入、read的使用

minipcie接口CAN卡解决工控机扩展CAN通道的难题 minipcie CAN

公交站间的距离 : 简单模拟题

columns in GROUP BY clause; this is incompatible with sql_ mode=only_ full_ group_ By mysql8.0 solution

Briefly describe the application fields of WMS warehouse management system

MODFLOW Flex、GMS、FEFLOW、HYDRUS实践应用

【云原生 | 17】容器的四种网络模式

5个chrome简单实用的日常开发功能详解,赶快解锁让你提升更多效率!

pillow的原因ImportError: cannot import name ‘PILLOW_VERSION‘ from ‘PIL‘,如何安装pillow<7.0.0

擅长C(暑假每日一题 6)
随机推荐
Character function and string function (I)
注解@Autowired如何自动装配
New knowledge in big homework
MySQL eight knowledge points: from getting started to deleting the database
There was an unexpected error (type=Method Not Allowed, status=405).记录报错
Test of countlaunch demo
【云原生 | 17】容器的四种网络模式
Five simple and practical daily development functions of chrome are explained in detail. Unlock quickly to improve your efficiency!
columns in GROUP BY clause; this is incompatible with sql_ mode=only_ full_ group_ By mysql8.0 solution
The landing of tdengine in the GPS and AIS scheduling of Zhongtian steel
Unnamed Article 33
Switch and router technology: dynamic routing protocol, rip routing protocol and OSPF routing protocol
There was an unexpected error (type=method not allowed, status=405)
Google Emoji guessing game helps parents guide their children to surf the Internet safely
普林斯顿微积分读本02第一章--函数的复合、奇偶函数、函数图像
Alibaba cloud industrial vision intelligent engineer ACP certification - Preparation
提高shuffle操作中的reduce并行度
“双碳”目标下资源环境中的可计算一般均衡(CGE)模型实践技术
Please elaborate on the implementation principle of synchronized and related locks
Full analysis of domain name resolution process means better text understanding