Font Size: a A A

Portal Authentication And Authorized System Applied Research Based On JAAS

Posted on:2007-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:D D LiuFull Text:PDF
GTID:2178360182977961Subject:Computer technology and applications
Abstract/Summary:PDF Full Text Request
Along with the portal rapid development, the application system which the user needs to use more and more, but each application system often has an own set of users authentication and the authorized method, in order to carries on the unification to the user the authentication to manage and to be authorized, therefore has the necessity to concentrate the different system each authentication method to a frame in, also is needs to have to be independent, the high security and the reliable status authentication and the jurisdiction management system, completes to the entire portal user's status authentication and the jurisdiction management. Therefore establishes a unified status authentication and the user management system management system, to each application system user realization unified authentication, the unification management and the unification authorization also becomes in the portal information security system construction the important link. JAAS is can realize this kind of frame Java edition. The Java2 security frame provided is based on the code source access control way, JAAS has also provided in this foundation based on the code movement access control ability. This article has thoroughly analyzed the JAAS technology, proposed based on the JAAS status authentication and the authorized frame, uses the frame which this article proposed to be possible the good solution to the status authentication and the access control unification management question.Author's main work in paper as follows: First briefly introduced the status authentication related technology, including each kind of status authentication mechanism, access control strategy. Next has analyzed the JAAS system structure, thoroughly analyzed the JAAS subject, the JAAS authentication mechanism and the JAAS authorization mechanism and to preserves the user information LDAP to carry on the thorough introduction. Then proposed and deferred to this mentality based on the JAAS status authentication and the authorized overhead construction to produce its key partial realization. Finally, the author returned to give back to the JAASauthentication authorization in the Web one kind of concrete application design and the simple realization.
Keywords/Search Tags:JAAS, Identity authentication, Access control, LDAP
PDF Full Text Request
Related items