Skip to Content
DocsResource ControlAsset Management

Asset Management

Tip

The Asset Management page is used for unified management of all assets. It supports adding, editing, deleting assets, directory maintenance, and access authorization, helping administrators efficiently organize and control resources.

Asset Tree

Tip
  • Asset Tree classifies and manages assets through a directory structure, making them easy to organize and find. Users are free to design and adjust the asset catalog structure according to actual needs.
  • You can create new catalogs, edit, delete, and authorize the current catalog by clicking the operation menu on the right side of the catalog node.
Note

If a subcatalog or asset exists in the catalog, the delete operation is not allowed!

assert_list

Add Asset

Administrators can add new assets by clicking the [Create] button in the upper right corner after selecting a catalog.

add_asset_1

Add Asset Parameters

CategoryParameterDescriptionRequired
Basic InfoNameAsset alias, for easy management and lookup
IPServer IP address
FolderAsset directory location
CommentAsset Remarks
ProtocolProtocolAsset Login Protocol
Web Protocol ConfigurationWeb Protocol Configuration Parameters
GatewayPreconfigured in Resource Control - Gateway Management
Account AuthorizationAccountPreconfigured in Resource Control - Account Management
Grant RoleSelect the authorization role for the current account
Operation PermissionsConnect, Share, Upload, Download, Copy, Paste
Access RestrictionsTimeVisually and flexibly configure access time periods within a week
Time ZoneTime zone for the current time period
Command FilterPreconfigured in Resource Control - Command Filter

Web Protocol Configuration Parameters

When editing an asset with HTTP or HTTPS protocol type, the following detailed configuration options are available:

CategoryParameterDescriptionRequired
Access PolicyAccess ModeFull Access: All HTTP methods are allowed; users can operate freely
Read Only: Only configured HTTP methods are allowed, restricting the scope of operations
Max ConcurrencyLimits the number of sessions that can open the website at the same time
Note: After closing the browser window, the session is not immediately destroyed; it takes about 45 seconds for the concurrency count to be released
Blocked PathsMultiple forbidden access paths can be configured to enhance security
Enable WatermarkWhen enabled, a watermark is automatically displayed on the access page

The temporary connection feature allows administrators to assign temporary access permissions to users, ensuring access is granted only when necessary and reducing security risks.

In the asset list, administrators can use the action bar to create a temporary connection for a specified asset.

create_temporary_connection

As shown above, first select the account, then choose the validity period (the effective time of the temporary connection; permissions will be automatically revoked after expiration) and the number of allowed accesses. Click “Confirm” to successfully create a temporary connection, and you will be redirected to the “Temporary Connection List.” Click the copy button on the right to copy the temporary access link:

temporary_connection_list

Authorization

Node Authorization

Tip
  • Administrators have full permissions for the asset tree. Regular users need to be authorized to view, update, delete, or authorize asset tree nodes.
  • Node permissions support downward inheritance. After a node is authorized, users will automatically obtain permissions for the node, its subnodes, and assets.

Hover over the right side of an asset tree node and click the cascade menu “Authorize Folder” to open the authorization dialog.

node_auth

As shown above, users can configure access permissions and Folder operation permissions.

  • Access Permission: Select the authorization role and check the operation permissions. After clicking confirm, the selected role will obtain the corresponding operation permissions.
    • After access permission authorization is successful, a corresponding authorization configuration will be generated on the Resource Control - Access Authorization page.
    • Authorization configuration naming rule: node-FolderID-UUID
  • Folder Operation Permissions: After authorization, users can view, update, delete, and authorize the node, its subnodes, and assets on this page.

Asset Authorization

Select the checkboxes on the left side of the asset table, then click the “Authorize” button in the upper right corner to open the asset authorization dialog.

asset_auth

As shown above, users can configure access permissions and asset operation permissions.

  • Access Permissions: Select the authorization role and check the operation permissions. After clicking confirm, the selected role will obtain the corresponding operation permissions.
    • After access permission authorization is successful, a corresponding authorization configuration will be generated on the Resource Control - Access Authorization page.
    • Authorization configuration naming rule: asset-Asset1ID,Asset2ID,Asset3ID...-UUID
  • Asset Operation Permissions: After authorization, users can view, modify, delete, and authorize the asset on this page.
    • Note: Asset operation permissions can only be configured when a single asset is selected.