Implements a hierarchical permission management strategy to
control data access through different levels of permissions.
Implements RLS (Row-Level Security) settings at the data level.
Users can apply for permissions, and after approval, permissions
will be automatically granted. The permission granting process
is traceable.
Provides a complete set of audit and monitoring functions to
help enterprises monitor user activities and system events in
real-time.