Implements a hierarchical permission management strategy to
control data access through different levels of permissions.
Implements RLS (Row-Level Security) settings at the data level.
Users can apply for permissions. After approval, permissions
will be automatically granted, and the permission granting
process is traceable.
Provides a complete set of auditing and monitoring functions to
help enterprises monitor user activities and system events in
real-time.