Font Size: a A A

Research And Design Of The Unitification Authentication Systerm Based On LDAP & Kerberose

Posted on:2010-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:M D HuangFull Text:PDF
GTID:2178360275970350Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of internet technology, the office automation and computer application systems are becoming more and more essential in people's life and work. However, there still remain some problems --- how can we organize the present complex website resources and internet users, how can we ensure the legal users'access to the safe resources and how can we promote the safety of the resources and its efficiency etc.By analyzing the present internet status, the need of its users and website service technology, this paper aims at solving the problem of internet resources disperation, the separateness of different systen authentication and the excessive overlapping of the users'information and thus designing a website resources management and authentication system based on LDAP and Kerberos. Thus with the help of the unification of directory service authentication systems, this paper further develops the function module of Kerberos'authentification to realize the unification of identification of diifferent application systems users by adopting the standand deal and taking the directory servic server as the database of restoring multiple application servers and the users'accountant information. And it also deals with the central management of system resoureces and users'information, promoting the efficiency of resources use so as to provide an easier option for its uses and increasing the safety of websites resouces. It also suggests that different application systems be unified to one set of directory accessing criterion to enable the interactivity, the restoration of configaration and authentification in the same directory.In addition, by analyzing LDAP and Kerberos, this paper also tries to make the modification of it and redistribute the LDAP and Kerberos servers on the basis of the illustrated examples. With the analysis of the directory, the authentification structure, the design of configaration system and the distribution of the servers, this paper finally comes to the realization of the whole simulation of the autherntification systems.
Keywords/Search Tags:LDAP, Kerberos, authentication, directory service, access control, ticket
PDF Full Text Request
Related items