编程知识 cdmana.com

Practical dry goods! Java development enterprise privilege management system video tutorial

I'll take you through the whole process Java Technology stack , Build a set based on the most popular RBAC Application of extended model , A distributed , There's an interface , High flexibility , High expansibility enterprise level authority management system . After learning this course, you will be able to easily deal with the requirements related to permission management and background system in the development of most enterprises .
【 Course introduction 】
The first 1 Chapter An overview of the course as a whole
This chapter first introduces why large companies have access management systems , And then we'll talk about the popular RBAC Focus on the model and development , And give what the ideal privilege management system should look like . After that, I will introduce the overall content of this course and arrange the course , Finally, we will introduce the technology involved in this course , Let's have a clear understanding of what we can gain from this course
1-1 Course guide
1-2 Why enterprise level projects need rights management
1-3 What is the core of authority management ?
1-4 What is the ideal privilege management ?
1-5 What are the mainstream open source rights management frameworks ?
1-6 Course arrangement and knowledge introduction
The first 2 Chapter Spring Security Theory of authority framework and actual combat drill
First of all, let's learn Spring Security The framework of the authority framework , Then you can learn Spring Security The core concept of the authority framework , Interceptors include 、 database management 、 cache 、 Custom decisions and so on , After that, I will take you hand in hand Spring Boot+Spring Security Set up a training environment , And with you all Spring Security In common application scenarios of permission framework, the common API Function encoding ...
2-1 Spring Security Introduction to rights management framework
2-2 Spring Security Common authority interceptor explanation
2-3 Spring Security Database management
2-4 Spring Security Right cache
2-5 Spring Security Custom decision explanation
2-6 be based on SpringBoot Of SpringSecurity Build and verify the environment quickly
2-7 SpringBoot Often annotated
2-8 be based on SpringSecurity Rights management Case Practice
2-9 SpringSecurity Rights management framework summary
The first 3 Chapter Apache Shiro Theory of authority framework and actual combat drill
This chapter is about the course arrangement and Spring Security The arrangement of the framework is the same , Also according to the architecture 、 The core concept 、 Set up the environment 、 Code drill 、 Advantages and disadvantages of the analysis process to explain . The difference is Shiro The core concept of identity authentication 、 to grant authorization 、 Permission blocking 、 session management 、 Access cache and so on . By studying the two frameworks , You can see their different design concepts , It's better to compare learning here . The built environment is still in use ...
3-1 Apache Shiro Introduction to rights management framework
3-2 Apache Shiro Identity authentication
3-3 Apache Shiro Authorized to explain
3-4 Apache Shiro Authority interception explanation
3-5 Apache Shiro Conversation management
3-6 Apache Shiro Right cache
3-7 be based on SpringBoot Of Apache Shiro Environment quickly build and configure practical operation
3-8 be based on SpringBoot Connection database and configuration MyBatis Practice
3-9 be based on Apache Shiro Rights management Case Practice -1
3-10 be based on Apache Shiro Rights management Case Practice -2
3-11 be based on Apache Shiro Rights management Case Practice -3-
3-12 Apache Shiro Rights management framework summary
The first 4 Chapter Authority management system core table design
For knowledge index, please visit data-filtered="filtered">4-1 Why do you want to develop a rights management system ?
4-2 What kind of privilege management system should we develop ?
4-3 Department table design
4-4 User table design
4-5 Authority module table design
4-6 Authority table design
4-7 Role table design
4-8 role - user , role - Permission relation table design
4-9 Authority related Log Table design
4-10 Data table design specification and summary
The first 5 Chapter Spring MVC Build and configure the development environment
In this chapter, I will show you how to use it SpringMVC Build a complete development environment ( Not limited to permission system projects , All background system development is common ), And take you to complete all kinds of important configuration , Include pom.spring-servlet.mybatis-config.5-1 Spring MVC Development environment construction -pom.5-2 Spring MVC Development environment construction -web.5-3 Spring MVC Development environment construction -spring-servlet.5-4 Spring MVC Development environment construction -applicationContext.5-5 Spring MVC Development environment construction -druid To configure
5-6 SpringMVC Development environment construction -mybatis-config.5-7 SpringMVC Development environment construction -logback.5-8 SpringMVC Development environment validation
The first 6 Chapter Project preparation and core auxiliary Tools Class development
This chapter begins with , I'll introduce you to practical Mybatis Generator Tools , It can dynamically generate relevant data according to the database table design Java Code . Then define the project's interface specification , On this basis, we do global exception encapsulation for interface exceptions , Then, in order to facilitate the project to verify the parameters , I will lead you to complete a verification tool BeanValidator Development of . Because the project will involve json Handle , I'm going to package it JsonMapper To complete the class ...
6-1 Core class generation -Mybatis Generator
6-2 Project interface definition -json,page
6-3 Interface requests global exception handling - Design and verification
6-4 Calibration tool -BeanValidator Development
6-5 Json Transformation tools -JsonMapper Development
6-6 obtain Spring Context tools -ApplicationContextHelper Development
6-7 Http Listen before and after request tool -HttpInterceptor Development
The first 7 Chapter Department module development
This chapter takes you to develop the Department module , It mainly involves new departments 、 Update department 、 The back-end interface and front-end of department tree structure generation Rendering . Because it involves front-end development , I'll encapsulate the content that the page uses , Facilitate the reuse of the following pages , Improve code reusability . And the tools we developed in the last chapter will also be used extensively from this chapter . This involves the development of the Department tree structure 、 Update sub department recursively when department is updated 、 Tree form ...
7-1 New Department interface development
7-2 Department level tree interface development
7-3 Update department interface development
7-4 New Department 、 Department hierarchy tree 、 Update department interface self test
7-5 Department list interface basic architecture development
7-6 Department list tree structure interface development
7-7 Department list interactive function development ( New Department , Delete Department , Update department )-1
7-8 Department list interactive function development ( New Department , Delete Department , Update department )-2
7-9 Department list interactive function development ( New Department , Delete Department , Update department )-3
The first 8 Chapter User module development
What this chapter takes you to develop is RBAC The user module in the model , In addition to the management of users , At the same time, it also deals with the function of user login and logout , And store the user login information in ThreadLocal Object to facilitate the system to access the information of the current login user . For the first time, this module involves the display of paged lists , So we encapsulate a paging plug-in unit , Facilitate the code reuse of related modules later , It's very important for you in the future

版权声明
本文为[Irving the procedural ape]所创,转载请带上原文链接,感谢
https://cdmana.com/2020/12/20201225151630617y.html

Scroll to Top