Font Size: a A A

Single Sign-on Method Research And Model Implementation

Posted on:2012-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:C LongFull Text:PDF
GTID:2178330332498046Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
At present, with the rapid development of information technology, companies and universities have deployed a large number of internal Web-applications, these applications are often business interrelated but their authentication mechanisms are independent of each other. With the expansion of the number of systems, duplication of logon process and a large number of authentication information to memory, both make users feeling inconvenient, variationing the users'experience and increasing security risks;besides, redundant authentication information increases the cost of management, unsynchronized information updating is more likely to cause data inconsistency; apart from this, the authentication modules of new systems need to be development alone which also increased the difficulty of development.Based on the needs of practical usage, in order to solve the problems mentioned above, we should use single sign-on concept. Single sign-on is one of the system integration methods on the authentication level, providing users with an unified authentication entry. Users only need to login only once, they can access the different applications whitout logining again.This allows users to enjoy the convenience that "single sign-on, full network access". Therefore, the establishment of a secure enterprise single sign-on system is very necessary.The current related papers that introduce single sign-on focus mostly around its principle and implementation of certification mechanism. But single sign-on system has two major tasks which are unified authentication and centralized information management. The paper will take both into account.Therefore, the work of this paper mainly include the following aspects:First of all, this paper will analyze the basic principles of common single sign-on methods and their implementation mechanism, and the critical technology and knowledge to build the system. Then select Yale CAS solution for depth research, elaborate advantages and disadvantages of CAS and suggestion to improve its lack. At the same time, use JavaEE framework to build back-office systems to the certification information management. Finally, the simulation tests on improved CAS model program show that the program has improved the feasibility and the information management platform is full-featured and easy to use.
Keywords/Search Tags:SSO, CAS, JavaEE, Authentication, Mmanagement
PDF Full Text Request
Related items