Font Size: a A A

The Research Of Enterprise's Network Authentication Platform

Posted on:2010-09-13Degree:MasterType:Thesis
Country:ChinaCandidate:J C LiFull Text:PDF
GTID:2178360278973518Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The computer network will realize the resource sharing effectively, but followed with a lot of information security problems. How to guarantee the legal user's legal access to resources and protect hackers' attacks has been the mostly content of network security. Many independent authentication applications and many kinds of authentication methods are being applied to enterprise's network, cause not one times authentication of the identical user, currently. Therefore, it has brought efficiency problems and some security incipient faults. As an important aspect of network security, the theory of identity authentication and single sign on(SSO)has been also mature. The urgent need people design a unified security authentication environment to support the cross platform, the unification many kinds of authentication methods and application's SSO.The primary research contents are summarized as follows:Firstly the dissertation narrates the development and present state of user administration and correlative techniques(identity management, identy Authentication, Authorization Management, Access control). Public key cryptography and Kerberos protocal are researched, The thesis studies the authentication thought of Kerberos protocal, and take the Kerberos V5 as the example, analyzes the authentication processes in a realm and between realms. It provides a model of mplementing SSO by Kerberos mechanism.Secondly It provides a model of implementing SSO by concentrative user management and Kerberos mechanism in Enterprise Management Portal after it researches identy Authentication and Single sing-on.The dissertation provides the course to implement Single sing-on and Access control in Enterprise Management Portal.With the unified identity authentication system being prefect, it will play an important role among the information safe system of enterprise's network.
Keywords/Search Tags:User Administration, Identity Authentication, Single Sign-on(SSO), Access Control, Access Control Authorization, Role
PDF Full Text Request
Related items