How to implement springboot permission management function
Function list
Menu management: It can manage the left menu of the background management system, support changing icons, changing names, and controlling menu display and sorting;
Resource management: realizes background dynamic permission control based on access paths, and the controlled permissions can be accurate to the interface level;
Role management: roles can be customized, And assign menus and resources to roles;
Backend user management: You can manage backend users and assign roles, and support the assignment of multiple roles.
Function introduction
Next we will introduce the permission management function and demonstrate a complete permission management process.
Menu management
The menu mainly refers to the menu on the left side of the management background. The management function can be used to control its hidden display and change the name and sorting of pictures. Currently, only the secondary menu is supported.
View the menu list, you can control the hiding, display and deletion;
Add and edit the menu, you can change the basic properties of the menu, but you can only add front-end items The menu defined in the routing, and the front-end name must be consistent with the routing name defined in the front-end project;
Menu sorting, after setting the sorting of the menu, the menu will be sorted according to the setting Display in descending order.
Resource Management
The so-called resource is the backend interface, which can be a single interface or a collection of a series of interfaces. Here we use Ant-based path matching. When a background user accesses an interface, the resource can be accessed if the background user has allocated it, otherwise it cannot be accessed. By default, if you do not configure a resource for an interface, the resource directly allows access.
View the resource list, the current resources are configured at the controller level, that is, all interfaces in a controller are defined as one resource, and can also be configured to the interface level;
Add and edit resources, here we have added a concept of resource classification to facilitate future resource allocation;
Role Management
Used to manage background user roles. We can assign specified menus and resources to roles, so that background users assigned roles can access these menus and resources.
View the role list, here we need to pay attention to the three roles of product administrator, order administrator and super administrator;
Add and edit roles Used to manage the basic attributes of roles;
Assignment menu, you can assign menus that allow access to roles;
To allocate resources, you can assign background resources that are allowed to be accessed to roles;
Background user management
is used to manage background users and directly modify information (including Change password) and assign roles.
View the user list, you can control the activation status of the account and delete the account;
Add and edit users, you can manage the user's basic information and modify the password;
# Assign roles. Users can be assigned roles. Users with designated roles can access designated menus and resources.
Dynamic menu control
Here we will demonstrate the control of the dynamic menu. We have two background users, the system administrator and the product administrator. The system The administrator assigns all menus, and the product administrator assigns only product-related menus.
Use the system administrator account to log in, and all menus are displayed on the left:
Use the product administrator account to log in, and only product-related menus are displayed on the left:
Dynamic resource control
Here we will demonstrate the control of dynamic resources. We only assign product-related resources to the product administrator, and he cannot access other resources.
The order-related menu is opened to the product administrator, but order-related resources are not assigned to him;
Because the product administrator is not assigned an order Module-related background resources, so when the product administrator accesses the order module, it will prompt that he does not have relevant permissions.
The above is the detailed content of How to implement springboot permission management function. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Introduction to Jasypt Jasypt is a java library that allows a developer to add basic encryption functionality to his/her project with minimal effort and does not require a deep understanding of how encryption works. High security for one-way and two-way encryption. , standards-based encryption technology. Encrypt passwords, text, numbers, binaries... Suitable for integration into Spring-based applications, open API, for use with any JCE provider... Add the following dependency: com.github.ulisesbocchiojasypt-spring-boot-starter2. 1.1Jasypt benefits protect our system security. Even if the code is leaked, the data source can be guaranteed.

Usage scenario 1. The order was placed successfully but the payment was not made within 30 minutes. The payment timed out and the order was automatically canceled. 2. The order was signed and no evaluation was conducted for 7 days after signing. If the order times out and is not evaluated, the system defaults to a positive rating. 3. The order is placed successfully. If the merchant does not receive the order for 5 minutes, the order is cancelled. 4. The delivery times out, and push SMS reminder... For scenarios with long delays and low real-time performance, we can Use task scheduling to perform regular polling processing. For example: xxl-job Today we will pick

1. Redis implements distributed lock principle and why distributed locks are needed. Before talking about distributed locks, it is necessary to explain why distributed locks are needed. The opposite of distributed locks is stand-alone locks. When we write multi-threaded programs, we avoid data problems caused by operating a shared variable at the same time. We usually use a lock to mutually exclude the shared variables to ensure the correctness of the shared variables. Its scope of use is in the same process. If there are multiple processes that need to operate a shared resource at the same time, how can they be mutually exclusive? Today's business applications are usually microservice architecture, which also means that one application will deploy multiple processes. If multiple processes need to modify the same row of records in MySQL, in order to avoid dirty data caused by out-of-order operations, distribution needs to be introduced at this time. The style is locked. Want to achieve points

Springboot reads the file, but cannot access the latest development after packaging it into a jar package. There is a situation where springboot cannot read the file after packaging it into a jar package. The reason is that after packaging, the virtual path of the file is invalid and can only be accessed through the stream. Read. The file is under resources publicvoidtest(){Listnames=newArrayList();InputStreamReaderread=null;try{ClassPathResourceresource=newClassPathResource("name.txt");Input

When Springboot+Mybatis-plus does not use SQL statements to perform multi-table adding operations, the problems I encountered are decomposed by simulating thinking in the test environment: Create a BrandDTO object with parameters to simulate passing parameters to the background. We all know that it is extremely difficult to perform multi-table operations in Mybatis-plus. If you do not use tools such as Mybatis-plus-join, you can only configure the corresponding Mapper.xml file and configure The smelly and long ResultMap, and then write the corresponding sql statement. Although this method seems cumbersome, it is highly flexible and allows us to

SpringBoot and SpringMVC are both commonly used frameworks in Java development, but there are some obvious differences between them. This article will explore the features and uses of these two frameworks and compare their differences. First, let's learn about SpringBoot. SpringBoot was developed by the Pivotal team to simplify the creation and deployment of applications based on the Spring framework. It provides a fast, lightweight way to build stand-alone, executable

1. Customize RedisTemplate1.1, RedisAPI default serialization mechanism. The API-based Redis cache implementation uses the RedisTemplate template for data caching operations. Here, open the RedisTemplate class and view the source code information of the class. publicclassRedisTemplateextendsRedisAccessorimplementsRedisOperations, BeanClassLoaderAware{//Declare key, Various serialization methods of value, the initial value is empty @NullableprivateRedisSe

In projects, some configuration information is often needed. This information may have different configurations in the test environment and the production environment, and may need to be modified later based on actual business conditions. We cannot hard-code these configurations in the code. It is best to write them in the configuration file. For example, you can write this information in the application.yml file. So, how to get or use this address in the code? There are 2 methods. Method 1: We can get the value corresponding to the key in the configuration file (application.yml) through the ${key} annotated with @Value. This method is suitable for situations where there are relatively few microservices. Method 2: In actual projects, When business is complicated, logic
