Since the problem of injection of the old system, in order to improve security, the new system database sets two users, the system front and the background uses different users to log in.