Font Size: a A A

The Application Research Of Authentication And Access Control Technology In SSL VPN

Posted on:2007-09-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y C C OuFull Text:PDF
GTID:2178360242961911Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology and theirs applications increasingly widespread, the demands for computer network security are becoming increasingly high. SSL VPN system takes full advantage of the convenience and low cost of the Internet to provide data transmission services which are full of security and confidentiality. The technology meets the requirements of secure data transmission of government, enterprises etc. Identity authentication and access control technology play important roles in the SSL VPN system. The research and applications of this technology is one of the hotspots in computer networks fields.There are a variety of authentication techniques, including entities-based and cryptography-based authentication agreement. The study covers PKI technology and its providing services framework of generation and management functions for digital certificates and key. PKI mechanisms provide identity authentication, confidentiality, integrity and undeniable services for network applications.Based on the study of the access control technology, the applications and realization of access control technology in SSL VPN system is deeply explored. Traditional technology of Discretionary Access Control and Mandatory Access Control can't meet the requirements of flexibility and convenience. Role Based Access Control technology, which introduces the concept of the role, the smallest privileges and separation of duties principles, meets these requirements.A SSL VPN system model is designed, and uses PKI for authentication of server, and uses user name/password for authentication of client. Security state checking modules are designed in SSL VPN system for the client to assess and check its own security status, the results will be submitted to the access control server to be used as the basis of further access control. Role Based Access Control technology is used to authorization and control of the users access for obtaining network resources.Research and test data show the security performance of SSL VPN system with identity authentication and access control module is higher than the system without them; and theirs impacts on increasing time of establishing the SSL channel are very little.
Keywords/Search Tags:SSL(Security Socket Layer) VPN(Virtual Private Network), authentication technology, Public Key Infrastructure, digital certificate, key, access control technology, role
PDF Full Text Request
Related items