Font Size: a A A

Design And Implementation Of A Centralized Access Platform

Posted on:2011-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:M YangFull Text:PDF
GTID:2178360308962568Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the rapid development of network size and support systems of China Mobile Communication Co., Ltd. and the growing of the scale of the number of users of the support systems, the information security issues is increasingly serious. As the development of the business systems and support systems and the increasing of internal users, on the one hand, the burden of systems maintenance and management work is increasing and the efficiency can not be improved. On the other hand,for being unable to achieve uniform security strategy of the operational support systems, the security of the operational support systems is reduced.First of all, the paper analyzed the demands and designed a centralized access platform according to the situation of the Jiangxi Mobile Network Management Centre. Using the platform, the system and security administrator could centralizedly manage and the resource and the users of the operational support systems and distribute the permission of the operational support systems. By using the platform, the security strategy was successfully implemented from a technical point of view. Based on 4A framework, the platform included central management module,account management module, authori zed management module, the identity module, centralized access module, five functional modules.In the second, the paper also researched the technology of the data model of user,account and permission.A RABC data model was implemented in the platform.The platform also used LADP technology to persistent save the user, account and permission data. At last,the paper designed and implemented the centralized access module. Based on RDP protocol and message mechanism technology of Windows system,the module used Citrix software and presented the follow function to users.1. The common user can visit and operation the business systems of which the permission was distributed already, by using entrance interface of the module.2. Users do not need to install any application client software and can use the application.3. After signing in through the main interface of the platform, the user do not need to log in business systems the again to visit and operation the systems.
Keywords/Search Tags:Accounting Authorization Authentication Audit, Light Directory Application Protocol, Remote Desktop Protocol, Role Access Based Control Model, Centralized Access
PDF Full Text Request
Related items