Font Size: a A A

Unified Security Authentication Platform Design And Implementation

Posted on:2008-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:X L WangFull Text:PDF
GTID:2178360215983604Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of computer network, many corporations and units have accessed the developed Internet. But because the computer network is not safe, it brings lots of trouble to the safe transmission of information. On the other hand, because the computer hardware equipments unceasingly increase, we need to manage more and more equipments, which bring a lot of problems and cause the confusion of the network management. In the case of growing demand for network security, we urgently need to propose a feasible plan, which solve these chaotic situations and enhance the security. In view of current common company network architecture, in order to solve these problems, I have designed the unified security authentication platform.The unified security authentication platform can manage different OS, such as Windows, Linux, and Solaris and so on. The system can control user's login and manage the users and resources of every computers. Before each user possibly has the different account on different computers, and the password of each account also may not be same. On the hand, it causes trouble to remember the password for user; on the other hand, it brings a lot of potential safety problem. With the platform, if the user knows the platform password, he can smoothly login different computers, which omits the trouble of memorizing many passwords and avoids a lot of potential safety problem. In addition, in order to ensure the safety of information transmission, the platform uses some strong encryption algorithms and security mechanism. It used symmetrical and asymmetrical encryption to the communications, or CA and PKI which have stronger safety. It adopts PMI mechanism for user privilege management. In addition, the system can record user's each kind of behavior, and centralized audit all behavior of accessing the resource, so that establish perfect mechanism of tracing and judging responsibility.
Keywords/Search Tags:Access Control, Authentication, Single Sign-On, PKI, PMI
PDF Full Text Request
Related items