• Spring boot integrates Shiro and JWT


    reference resources: https://blog.csdn.net/qq_43948583/article/details/104437752 https://blog.csdn.net/weixin_42375707/article/details/111145907 It is planned to realize the permission control of adding, deleting, modifying and querying levels 1. Table structure Menu table CREATE TABLE `menu` ( `id` bigint(20) NOT NULL AUTO_INCREMENT, `name` varchar(128) COLLATE utf8mb4_ unicode_ Ci not null comment ‘menu name’, `parent_ ID ` bigint (20) not null comment ‘parent node ID’, […]

  • Mongodb enable authority authentication


    MongoDB version: v3.4.4 Mongodb does not enable permission authentication by default, and I have always done so. Since the last mongodb outbreakRansom gate incident, we must pay attention to the authority authentication of mongodb. It is also very simple to enable authentication. Just add a line auth = true in the configuration file (the default […]

  • Fastapi (68) practical development interface development of online course learning system — user personal information interface development


    In previous articles:Fastapi (67) practical development interface development of online course learning system — user login interface development, today’s actual combat: user personal information interface development.   When developing the personal information interface, we should pay attention to that because we have different users with different personal information and need to rely on login, we […]

  • Using routing control permissions in laravel (not limited to laravel, just an idea)


    Start Permission design is a very important function of background management, so it should be well designed.PHP already has a lot of in this areapackagesNo, we don’t have to build the wheel again. Of course, you can start from scratch if you like~ PS There are several ways to do authority authentication in the past. […]

  • 23. Kubernetes (k8s) note authentication, authorization and access control (III) RBAC access control


    RBAC access control users accounts preface: Serviceaccount and users account authentication have been introduced and created earlier, but the final test found that users account does not have access rights. This section introduces RBAC authorization to authorize serviceaccount and users account authentication What is RBAC?RBAC is role-based access control. In RBAC, permissions are associated with […]

  • Helm2 installation configuration


    #Download helm2 client curl -L -o helm-v2.16.3-linux-amd64.tar.gz https://file.choerodon.com.cn/kubernetes-helm/v2.16.3/helm-v2.16.3-linux-amd64.tar.gz #Decompress tar -zxvf helm-v2.16.3-linux-amd64.tar.gz #Put into the system environment mv linux-amd64/helm /usr/bin/helm #Create user 8tiller KS kubectl create serviceaccount –namespace kube-system tiller #Create a k8s user role and place the tiller user under that role kubectl create clusterrolebinding tiller-cluster-rule –clusterrole=cluster-admin –serviceaccount=kube-system:tiller #Helm tiller initializes and changes the […]

  • Demonstration of using Solon auth authentication framework (simpler authentication framework)


    Recently, I have seen several authentication frameworks, such as Apache Shiro, SA token, spring security… In particular, spring security, as the framework of spring boot & cloud, Solon should have its own biological security authentication framework. Therefore, after adapting SA token (satoken solo plugin) and sureness (sureness solo plugin), Solon auth (Solon. Auth), Solon’s own […]

  • Vue + element UI realizes the function of role information


    Last week, the user information list and login function were updated. Today, I took the time to finish the role information list and role assignment. Share your work achievements with your partners and continue to update the information of commodity management in the future~ First show the renderings This is a role list information. The […]

  • Design pattern – strategy pattern


    What is the strategy model? The policy pattern belongs to the behavior pattern of the object. Its purpose is to encapsulate each algorithm into an independent class with a common interface for a group of algorithms, so that they can be replaced with each other. The policy mode allows the algorithm to change without affecting […]

  • SSM spring proxy mode (static and dynamic)


    SSM spring proxy mode (static and dynamic) 1、 Agent mode Definition of agent mode: Provide a proxy for other objects to control access to this object. In some cases, one object is not suitable or cannot directly reference another object, and the proxy object can act as an intermediary between the client and the target […]

  • Cloudera manager terminology and architecture


    Introduction: This article introduces the common terms and architecture of cloudera manager Cloudera manager terminology To use cloudera manager effectively, you should first understand its terminology. The relationship between terms is as follows, and their definitions are as follows: Sometimes, the terms service and role are used to refer to both types and instances, which […]

  • Php-rbac single role design – the simplest design scheme


    Three tables constitute permission Association, which should be the simplest permission design scheme in PHP:PS: if some students also want to contact and avoid building wheels repeatedly, I can provide the following SQL files!1. Menu management 2. Role management 3. User management MySQL table design: s_ Menu table +————+——————+——+—–+———+—————-+| Field | Type | Null | […]