Font Size: a A A

Research Of The Unified Identity Authentication System Based On Web Services

Posted on:2008-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhengFull Text:PDF
GTID:2178360215474257Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of global informatization Internet technologies, the unified management platform and application service have become the trend of E-business and the construction of enterprise technology, information systems. Based on the Enterprise Information Portal the unified management platform can integrate various information systems within an enterprise and provide not only a standard access interface for the end users, but also standard service connection points for managers and service provider.Various application systems integrated into a unified management platform always have their own independent authentication and authorization mechanisms. It makes software platform and users deal with the diversity and heterogeneity, and brings many problems such as inconsistency of users' identities, impossible user information unification, repeated logins, complicated authorization management and sharing of security information. Therefore, SSO (Single Sign On) mechanism among various application systems within one portal or between several portals is indispensable to a unified management platform.Authentication is to check the truth of users' identities. Within the real system, one has his or her related digital identity, and uses it to access the system's resources without identity cheat. Common security technologies used in authentication include cryptogram technology, message digest, digital signature, and digital certification and so on. The secure and reliable authentication protocol is the core of authentication systems. Kerberos referred by MIT, which is strong authentication mechanism based the reliable third side, provides a way to authenticate within open network, and makes users in network identify each other.This paper takes security technologies and authentication protocol as key research, and discusses around authentication systems' characters and faced threat in network. It analyzes and arranges materials about security technologies used in authentication, and collects abroad and domestic commonly used unified authentication systems' models, and comprehensively analyzes and appraise them from four aspects including possibilities of implementation, security, management and reliability, then suggests a better model. This paper mainly researches the working principle and implementing process of the Kerberos protocol, analyzes the protocol's limitations in detail, then suggests the promoted authentication protocol and states its mechanism. The paper also discusses the Web Services technologies, and refers a unified authentication system based on Web Services fully unleashing its superior of good encapsulation and integration, lists the architecture of the system from the basis system requirement and designing solution, implements the function of the key modules in the system using the java programming language.
Keywords/Search Tags:Authentication, Ticket, Kerberos, Network Security, Web services
PDF Full Text Request
Related items