电脑桌面
添加蚂蚁七词文库到电脑桌面
安装后可以在桌面快捷访问

NC Cloud 1909 User Manual-Dynamic Modeling Platform-Permission Management-clean.pdf

NC Cloud 1909 User Manual-Dynamic Modeling Platform-Permission Management-clean.pdf_第1页
1/65
NC Cloud 1909 User Manual-Dynamic Modeling Platform-Permission Management-clean.pdf_第2页
2/65
NC Cloud 1909 User Manual-Dynamic Modeling Platform-Permission Management-clean.pdf_第3页
3/65
User Manual-1909Authority Management用友网络科技股份有限公司 2 Copyright © yonyou Network Technology Co., Ltd. All rights reserved. Without the written permission of yonyou Group, any part or the whole content of this manual may not be reproduced, printed, translated or reduced for any purpose. Please note that the content of this manual may be changed without prior notice, and its content does not represent the commitment made by yonyou Group. 用友网络科技股份有限公司 3Table of Contents CHANGE RECORD .............................................................................................................................................. 6 CHAPTER I OVERVIEW ............................................................................................................................... 7 1.1 INTRODUCTION TO RBAC ......................................................................................................................................... 7 1.2 PERMISSION MODEL .................................................................................................................................................. 7 1.3 VALUE ADVANTAGES ................................................................................................................................................. 8 1.3.1 User and User Group ........................................................................................................................................ 9 1.3.2 Role and Role Group ......................................................................................................................................... 9 1.3.3 Role Classification .......................................................................................................................................... 10 1.3.4 Application Permission ................................................................................................................................... 11 1.3.5 Data Permission .............................................................................................................................................. 11 1.3.6 Duties .............................................................................................................................................................. 12 CHAPTER II CREATE GROUP ADMINISTRATOR .................................................................................... 13 2.1 CREATE SYSTEM ADMINISTRATOR (NOT LIGHTWEIGHT) ......................................................................................... 13 2.2 CREATE GROUP ADMINISTRATOR ............................................................................................................................ 14 CHAPTER III APPLICATION PROCESS .......................................................................................................... 16 3.1 APPLICATION FLOWCHART ...................................................................................................................................... 17 3.2 OPERATING STEPS ................................................................................................................................................... 17 3.2.1 Add User Group............................................................................................................................................... 18 3.2.2 Add Users ........................................................................................................................................................ 18 3.2.3 Add Duties ....................................................................................................................................................... 21 3.2.4 Allocate Application ........................................................................................................................................ 22 3.2.5 Add Role Group ............................................................................................................................................... 24 3.2.6 Add Role .......................................................................................................................................................... 25 3.2.7 Role Batch Creation ........................................................................................................................................ 32 3.2.8 Allocate Duties ................................................................................................................................................ 34 3.2.9 Allocate Organization ...................................................................................................................................... 35 3.2.10 Assign Data Permissions ............................................................................................................................... 37 3.2.11 Allocate Parameter Maintenance Permissions (Not Lightweight) ................................................................. 40 3.2.12 Associate Users ............................................................................................................................................. 40 3.2.13 Allocate Role ................................................................................................................................................. 41 3.2.14 Users to Be Processed ................................................................................................................................... 43 CHAPTER III TYPICAL APPLICATIONS.................................................................................................. 45 4.1 HOW TO CREATE A REGULAR ADMINISTRATOR ......................................................................................................... 45 4.1.1 Scenario 1 – Decentralized Management Based on Group Organization Structure ....................................... 45 4.1.2 Scenario 2 – Decentralized Management Based on Business Field ................................................................ 47 4.2 HOW TO CREATE A BUYER ........................................................................................................................................ 48 CHAPTER IV OTHER FUNCTIONS .............................................................................................................. 50 5.1 USER MANAGEMENT ............................................................................................................................................... 50 5.1.1 User Maintenance ........................................................................................................................................... 50 用友网络科技股份有限公司 4 5.1.2 Share within Group.......................................................................................................................................... 50 5.1.3 Share between Groups ..................................................................................................................................... 52 5.1.4 User Transfer ................................................................................................................................................... 54 5.2 AUTHORIZATION MANAGEMENT.............................................................................................................................. 56 5.2.1 User Permission Assignment ........................................................................................................................... 56 5.2.2 Special Data Permissions ................................................................................................................................ 57 5.3 BUSINESS FUNCTION AUTHENTICATION .................................................................................................................. 59 5.3.1 Application Scenarios ...................................................................................................................................... 59 5.3.2 Key Function Settings ...................................................................................................................................... 59 5.3.3 Key Data Settings ............................................................................................................................................ 59 5.4 PERMISSION QUERY ................................................................................................................................................. 59 5.4.1 Query Application by User .............................................................................................................................. 59 5.4.2 Query Data Permission by User ...................................................................................................................... 60 5.5 PERMISSION CHANGE APPLICATION ......................................................................................................................... 60 5.5.1 Application Scenarios ...................................................................................................................................... 60 5.5.2 User Permission Change Applications ............................................................................................................ 60 5.5.3 Role Permission Change Application .............................................................................................................. 62 ADDENDIX: SEE THIS LIST OF OTHER MANUALS FOR THIS ARTICLE .................................................. 64 用友网络科技股份有限公司 5Introduction This manual is a guide to plan execution, solution preparation and implementation for implementation consultants and key corporate users. The manual is developed around the main business scenarios that the applications can solve. Based on this, the manual shows the key functions of the application, and provides the idea of matching business needs with product functions. This manual consists of five parts. The first part is an overview of the product and its value. The second part is an introduction to the creation of a group administrator. The third part is the application process of the permission management. The fourth part illustrates how to use the permission management through typical examples. The fifth part adopts intra-group and inter-group users sharing to introduce group user changes, authorization management, and permission inquiry, etc. Additionally, in order to deepen users' understanding of the content, this manual not only explains key terms but also provides supplementary explanations in the appendix for key terms that may need cross reference. As a result, users can perform queries easily. To highlight the key points, this manual focuses on solutions and describes only the important control points in product operations. If you want to know more about the product application of specific modules, please refer to this manual for more information: 1. User Manual - Organization Management further elaborates on the key concepts of the product (such as groups, organizations, business delegation, etc.) and the ideas of modeling. It is an important reference for plan implementation and blueprint design. 2. User Manual - Process Management provides the guidance for transaction types and process design tools. 3. User's Manual - Basic Data provides further understandings of basic data and its application. 用友网络科技股份有限公司 6 Change Record Editor Ding Xifang, Ma Donghui Version Reviser Reviewer Starting and Ending Time Revised/Approved Chapters Revised/Approved Contents 1909 Ma Donghui Li Conghui November 2019 No No change 用友网络科技股份有限公司 7Chapter I Overview The UAP permission model is a permission product system centering around roles based on RBAC (Role-Based Access Control). 1.1 Introduction to RBAC The basic concept involved in the RBAC authorization model is to grant and cancel user permissions by assigning and canceling roles. Roles are divided based on function positions, and resource access permissions are encapsulated in roles. Users can access system resources and perform operations on system resources indirectly by assigning roles. Authorized personnel can define various roles and set corresponding access permissions as required. Different roles can then be allocated to users based on their job natures and duties in order to finish author...

1、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
3、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。

碎片内容

NC Cloud 1909 User Manual-Dynamic Modeling Platform-Permission Management-clean.pdf

您可能关注的文档

管理软件+ 关注
实名认证
内容提供者

管理软件资料分享

确认删除?
回到顶部
客服QQ
  • 客服QQ点击这里给我发消息
QQ群
  • 答案:my7c点击这里加入QQ群
支持邮箱
微信
  • 微信