In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/03 Report--
User, rights management
1. After giving a person the corresponding permission, see whether the person has this permission on the interface, and log in as this person to verify whether the permission setting is correct (whether it can exceed the permission given).
two。 Delete or modify the permissions of people who have logged in to the system and are operating, and whether the program can handle it correctly.
3. Re-register the system to change the login identity and then log in to see if the program can be executed correctly and whether the permissions are correct.
4. In the case of workgroup or role management, whether the program can correctly handle the deletion of the workgroup or role that contains the user
5. Whether the scope of permissions is correct for users with different permissions to log in to the same system
6. Override all permission settings of the system
7. Can you add users whose information is empty (including empty user name and empty password, empty user name non-empty password, non-empty user name and empty password)
8. Can you add a long user name and long password, and if so, can the new user log in correctly?
9. Whether the system is allowed to delete the special user of the system administrator or modify the password of the system administrator, delete or modify the actual situation of the system
10. Can logged-in users modify their own permissions
11. Add users (with identity or number): the identity is the same, but the user name is different; the identity is the same, the user name is the same; the identity is different, the user name is the same; the identity is different, the user name is different
twelve。 Can the logged-in user modify his (or someone else's) information and delete himself (or someone else)
13. Modify the user's information (including permissions, passwords, basic information, etc.), the impact on other modules
14. Modify user information: the modified user information is the same as the existing user information; the modified user information is different from the existing user information
15. Do not authorize the user, whether to allow login
16. When you change some settings, will it affect the settings of people with superior permissions and the same permissions?
17. The system administrator modified some data to see if the data changed when logging in as someone else.
18. Can users belong to multiple groups at the same time, and can the permissions of each group cross?
19. Whether the user who is deleted and re-added has the previous permissions; change the user's attributes (including permissions) to see if it has an impact on the permissions.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.