Font Size: a A A

Design And Implementation Of Unified Identity Of User Mangement

Posted on:2006-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:A H XiaoFull Text:PDF
GTID:2168360155472139Subject:Software engineering
Abstract/Summary:PDF Full Text Request
An enterprise-level application system should have a reasonable, high efficient and more flexiable unified identity of user management security mechanism, which is defined by different operational permission based on the users' particular role. Manager can add permission for users danamically on the ground of real circumstance. By way of multi-level validation mechanism of permission, ensuring that user can have access to read and modify relative information with his/her rights, guaranteeing security of the sensitive and more important data enough.This paper firstly does research on unified identity of authentication technology and LDAP (Lightweight Directory Access Protocol). After that, we build a new UIUMM(Unified Identity of User Managerment Mechanisim) for enterprise-oriented application on basis of RBAC (Role-Based Access Control) . Last and great significantly, we put this kind of mechanisim, which is an enterprise-oriented security managerment mechanisim, into a real and crucial project namely Digital Campus of NUDT (National University of Defence Technology). Through implementing such a mechanisim to make sure all applications of digital campus of NUDT have a robust, flexible and high efficient unified identity of user managerment system.Design pattern is research hotspots in software engineering in recent years and also makes great sense to be theory of implementation of unified identity of user managerment system which is the paper mainly illustates. Java design patterns and Sun core J2EE(Java 2 Enterprise Edition) design patterns make an important role from tip to toe in process of implementation of UIUMM. Applying design pattern to large extend will make software development fast and make application intelligible, maintainable, expansible. Appropriate applying design pattern will improve the performance of application greatly.At the end of the paper, shortcomings of UIUMM are put forward and strong suggestions to which are shared for the next step.
Keywords/Search Tags:Security, Unified Identity of Authentication, LDAP, RBAC, Design Pattern
PDF Full Text Request
Related items