Current location - Quotes Website - Signature design - How to log in to Debon OA system?
How to log in to Debon OA system?
Oa system is Debon's internal office system, and outsiders can't log in, so they can only log in at the company through this page:

Application of enterprise office automation system;

After the launch of Enterprise Edition, major manufacturers connected their OA systems with WeChat Enterprise Edition, and enterprise users also chose this OA system. The advantages of WeChat Enterprise are:

It is easy to communicate within the enterprise.

At present, the OA system has realized the voice recognition operation of process approval, which can not only check the authenticity efficiently, but also make E38.wang clearly explain the detailed comments through voice. Make the process audit more accurate.

Mobile integration, the past OA, mobile is limited to the OA system itself, and it can also be highly integrated with other ERP and CRM to realize the sharing of enterprise information on WeChat, which will change the situation that OA system exists alone.

Office automation design:

"Feasibility and adaptability"

The so-called feasibility is to meet the core requirements and main functions when refining the requirements, rather than putting the satellite outside the current technical level!

The so-called adaptability refers to the realization conditions and application conditions of products. It is doomed not to conform to the current environment of the enterprise, and not to go beyond the environment to make a great leap forward of producing 10 thousand kilograms of grain per mu.

The consistency of core requirements is the guarantee of OA value realization, and meeting users' core requirements in workflow and document management is the foundation of project success.

2. "Forward-looking and practical"

The development and design of OA system should consider increasing the value of the system to the maximum, meeting the needs of all users to the maximum, and fully considering the multi-level expansion of the system in the future. In the process of implementation, we should always implement the policy of application-oriented, application-oriented, application-oriented, and pragmatic. At the same time, factors such as cost control and project cycle control should be considered, so pragmatism should also be followed in the deployment of functions.

3. "Advanced Maturity"

Advanced management concepts, technologies and methods can enhance the competitiveness of enterprises and extend the life cycle of the system. However, at the same time, any innovation means the experiment of white rabbits, which is risky. Therefore, we should pay attention to the maturity of software systems, hardware equipment, development tools and software products, and find a balance between advancement and maturity, which becomes the key to maximize value.

4. "Openness and standardization"

Data islands, information islands and application islands have become the sequela of years of information construction, and the key factor to solve these islands lies in openness, and the efficiency to solve these islands depends on standardization.

Just like the relationship between our sockets and plugs, just like the relationship between our peripherals and usb ports, whether OA system is open and standardized enough has become the primary consideration in architecture design.

At present and in the future, OA system needs to be smoothly connected with various operating systems, middleware, databases, business systems and tool software. At present, mainstream manufacturers have fully considered this aspect.

5. "Reliability and stability"

There are a lot of management data flowing in OA system, so it must be reliable, and general human and external abnormal events should not lead to system collapse; When the system has problems, it can be recovered in a short time, and the data of the system is complete, which will not cause data inconsistency.

We organized a stress test of office automation system. In the case of load balancing, when 3000 people are online at the same time, the system login (including the whole main interface loading) does not exceed 8 seconds. Data browsing does not exceed 8 seconds; Data query does not exceed 8 seconds; Statistical data does not exceed 15 seconds.

We have also tested the stability of OA products running on IBM servers, and basically can do the following: the average trouble-free running time is greater than 10000 hours; Availability: the overall average availability of the system is above 99.99%; Stability: The host system can keep 7*24 stable and uninterrupted operation.

6. "Security and confidentiality"

The development and design of OA system should not only consider the full enjoyment of information resources, but also pay attention to the protection and isolation of information. Therefore, the system should take different measures for different applications, different network communication environments and different storage devices, including system security mechanism and data access control, to ensure the security of the system.

Among them, the measures taken include but are not limited to the following

Platform security: The architecture design considers the security requirements, and the platform software meets the security design standards.

Application security: measures such as authority control, supporting identity authentication interface, anti-tampering, anti-violent cracking, etc. Is perfect and can be imitated. Combined with USBkey, CA, IP address restrictions and other security measures.

Data security: Support document security software integration technology, so as to realize data transmission encryption, remote security access, data storage encryption, and bind VPN and other security methods, and support the application of intrusion detection and defense systems and firewalls.

Disaster recovery backup: support the use of various disaster recovery software and hardware devices.

Management security: provide a perfect log function, which can record the key operations of system users and ensure the security of system applications.

Password strategy: changing the initial password, enabling graphic verification code, supporting USBkey interface, password expiration control, password error frequency control, password strength setting, etc. , thus preventing violent cracking and malicious attacks.

Binding of MAC and IP of system network card; Support? CA authentication and digital signature encryption technology; Support electronic key (? Ukey) technology and fingerprint Ukey technology; Support secure socket (SSL) technology; Strict and flexible access security control of software system, combining function authorization with data scope authorization;

The system has an integrated user/permission management system, which can manage users/permissions in a unified way and realize field-level query, modification and management permission control; The system provides user authentication, data transmission, data storage, digital signature and other security means interfaces, and can provide all-round support for third-party security authentication systems.