How to implement user rights management with PHP and UniApp
How PHP and UniApp implement user rights management
In Web development, user rights management is a very important function. It can control users' access rights to different functions and resources in the system and ensure the security and integrity of the system. This article will introduce how to use PHP and UniApp to implement user rights management, with corresponding code examples.
1. Database design
Before we begin, we first need to design a database to store user and permission-related information. The following is a simple database design:
- User table (user): used to store basic information of users, including user ID, user name, password, etc.
- Role table (role): used to store role information, including role ID, role name, etc.
- Permission table (permission): used to store permission information of functions and resources in the system, including permission ID, permission name, etc.
- User role association table (user_role): used to establish the association between users and roles.
- Role permission association table (role_permission): used to establish the association between roles and permissions.
2. PHP backend implementation
- User login verification
When a user logs in, we need to verify whether the user’s username and password are correct. The following is a simple login verification code example:
<?php // 获取用户提交的用户名和密码 $username = $_POST['username']; $password = $_POST['password']; // 查询数据库验证用户信息 $query = "SELECT * FROM user WHERE username='$username' AND password='$password'"; $result = mysqli_query($connection, $query); // 如果查询结果有一条记录,则登录成功;否则登录失败 if (mysqli_num_rows($result) == 1) { // 登录成功,生成并返回一个token给客户端 $token = generateToken($username); echo json_encode(['status' => 'success', 'token' => $token]); } else { // 登录失败 echo json_encode(['status' => 'failed', 'message' => 'Invalid username or password']); } ?>
- User permission verification
When verifying user permissions, we need to find the corresponding permissions based on the user's role. The following is a simple permission verification code example:
<?php // 获取用户提交的token和权限id $token = $_POST['token']; $permissionId = $_POST['permissionId']; // 验证token是否有效 if (validateToken($token)) { // 查询用户对应的角色 $query = "SELECT role_id FROM user_role WHERE user_id='$userId'"; $result = mysqli_query($connection, $query); $roleIds = mysqli_fetch_all($result, MYSQLI_ASSOC); // 查询角色对应的权限 $query = "SELECT * FROM role_permission WHERE role_id IN (" . implode(',', $roleIds) . ")"; $result = mysqli_query($connection, $query); $permissions = mysqli_fetch_all($result, MYSQLI_ASSOC); // 验证用户是否具有该权限 $hasPermission = false; foreach ($permissions as $permission) { if ($permission['permission_id'] == $permissionId) { $hasPermission = true; break; } } // 返回验证结果给客户端 echo json_encode(['hasPermission' => $hasPermission]); } else { // token无效 echo json_encode(['hasPermission' => false]); } ?>
3. UniApp front-end implementation
- User login page
In the user login page, we need Send the username and password entered by the user to the backend for verification, and obtain the returned token. The following is a simple login page code example:
<template> <view> <input v-model="username" type="text" placeholder="Username" /> <input v-model="password" type="password" placeholder="Password" /> <button @click="login">Login</button> </view> </template> <script> export default { data() { return { username: '', password: '' } }, methods: { login() { // 发送登录请求给后端 uni.request({ url: '/api/login.php', method: 'POST', data: { username: this.username, password: this.password }, success: (res) => { if (res.data.status === 'success') { // 登录成功,保存token到本地 uni.setStorageSync('token', res.data.token); uni.navigateTo({ url: '/pages/home/home' }); } else { // 登录失败,提示错误信息 uni.showToast({ title: res.data.message, icon: 'none' }); } } }); } } } </script>
- Permission verification
On the page that needs to verify user permissions, we need to send the user's token and permission ID to end for verification. The following is a simple permission verification code example:
export default { data() { return { hasPermission: false } }, mounted() { // 发送权限验证请求给后端 uni.request({ url: '/api/validatePermission.php', method: 'POST', data: { token: uni.getStorageSync('token'), permissionId: 1 // 需要验证的权限ID }, success: (res) => { this.hasPermission = res.data.hasPermission; } }); } }
Through the above method, we can implement user permission management functions based on PHP and UniApp. When a user logs in, we verify the user's username and password and generate a token to return to the client. The client saves the token locally and sends it to the backend for verification where verification permissions are required. The backend searches for the role and permissions corresponding to the user based on the token, and returns the permission verification results to the client.
I hope this article can help you understand how PHP and UniApp implement user rights management. Of course, there may be more complex requirements in actual projects, but the core idea is the same. As long as we follow good database design and reasonable code logic, we can implement a safe and reliable user rights management system.
The above is the detailed content of How to implement user rights management with PHP and UniApp. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
