Font Size: a A A

Study On Construction And Application Of 4A In Telecom Business Operation Support System

Posted on:2011-05-31Degree:MasterType:Thesis
Country:ChinaCandidate:H Z LiFull Text:PDF
GTID:2178360305451421Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Over the past decade, with the rapid development of computer application technology and the Internet, the information technology and information systems has been applied popularly in government agencies, financials, schools, large and medium enterprises. Accordance traditional construction mode, a enterprise basic each system have independent account, portal permissions management features independent or part shared host equipment, database, middleware, network equipment and distribution belong different departments. The difficult and labor costs in systems maintenance and management increase rapidly. The security risks exist in the access to a large number of partners or by the integrator or a third party. Therefore, all these years in banking, telecommunications, government, power, middle and high schools and other large enterprises have begun to build the basic system of unified authentication across management systems. In China's telecom operators, with the development of enterprise information, user increases, and rapid network expansion, and information security issues are becoming increasingly prominent and the original account password management can no longer meet the current and future business development. The one hand, system maintenance and management increase the burden of staff, working efficiency can not be improved; the other hand, the various business systems can not achieve a unified security policy, thus it substantially reduce the operation system security. There is an urgent need to study the centralized security management technology and platform to solve the issues of dispersion, not high efficiency, security risks and others resulting in decentralized information management system, then the administrators could make centralized management, centralized distribution, centralized auditing for the system users and a variety of resources with the implementation of the security on the support of the technology.In this paper, it analysis the business support network management, security and other current situation of A Shandong Mobile, focus on'4 A'security management platform of Account management, Authentication management, and Authorization management and Audit. It discusses solutions to the building of a unified identity management and access control, authorization system; consolidate enterprise applications, network devices, the host system to ensure that legal users secure easy to use specific resources. It introduces some new ideas of 4A construction planning, implementation strategies and application from the perspective of the construction and implementation of the proposed system.
Keywords/Search Tags:Identity Management, Authentication, Audit
PDF Full Text Request
Related items