(Based on the different needs of enterprises, from the perspective of security request level, we proposed and studied the corresponding management solutions at the user layer and the core layer respectively, and better managed the file access control request in intranet security.)