Font Size: a A A

The Design And The Implementation Of Network Management Subsystem Of Centralized Identity Authentication Management System Based On Web

Posted on:2008-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:B YangFull Text:PDF
GTID:2178360215482402Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In telecommunication network, with some factors related with people the system is visited illegally, thus posing the huge threat for the telecommunication network security. The establishment of centralized identy authentication,authorization and accounting (AAA) system related to user' s access can solve this problem. However,At present telecommunication IP network consists of multitudinous type of equipment which quantity is big. Many kinds of AAA authentication agreement exists together and various vendor's equipment support AAA differently, simultaneously the system users's accounts are managed dispersedly. Thus it is a urgent matter to establish a centralized identity authentication management system, bring the equipments into the unific management system which authentication types are different, simultaneously carry on the centralized management for all user' accounts and carry on the common control to the users's behavior visiting the system.Through analysis about the development of centralized identity authentication system, TACACS + and RADIUS authentication technology and Web-based network management system, we develop a centralized authentication management system against various types of equipment authentication method and user account management of the problem of dispersiveness; particularly against the equipments which don't support AAA authentication protocol, we develop the proxy authentication approach. By integrating various authentication in a centralized management system, we implement the unified management of different authentication network equipment, simplify the maintaining of user authentication information. In addition, the system also develop the network management system through which user can achieve centralized authentication configuration management, monitoring and inquiries, thus provide user with convenient way to manage.The paper describes following parts :1. Research current centralized identity authentication system, furthermore analysise the main technical and strategy detailedly.2. Research major identity authentication technology, and emphatically analysis TACACS + and RADIUS protocol. 3. Research Web-based network management system and three-tier Web software - structure based on jsp/servlet and analysis the key software technology deeply.4. Through demand analysis, design the overall project and functionally design corresponding subsystems.5. Design network management subsystem modules Using the unified modeling language and object-oriented system designing method.6. Develop and implement network management subsystem mainly using the java / web technology and make the function display.With telecommunication network security becoming increasingly important and centralized identity authentication technology continuously developing, the centralized identity authentication management system will be widely used.
Keywords/Search Tags:Network Security, Network Management, Authentication, Authorization, Accounting
PDF Full Text Request
Related items