| As enterprises become more perfect information construction, the enterprise' s rapid development of business systems, information systems and the increasing number of users, resulting in a rapidly expanding scale of the network, the value of online resources at the same time are also getting higher and higher. And network attacks are getting more and more, the issues of information security are becoming more prominent. At present, many enterprises in the information security in the building, has yet to be established overall security architecture, the lack of awareness of information security management, application of light weight safety. Especially in the information security and the bottom of the pyramid construction of the building of a lack of security based on the Resource Access Control management, enterprise information security infrastructure of the major hidden dangers. On the one hand, the resulting system maintenance and management burden of work increases, and the working efficiency can not be improved on the other hand unable to operational systems and unified security strategy, thereby substantially reducing operational in the security of the system.Therefore, in accordance with the status quo on centralized security management technologies and platforms, makes systems and security management can be the users of information systems and management resources to concentrate, focus on the distribution of competences, centralized auditing, and technically guarantee that the information system security Strategy implementation.In this paper, theoretical research and practical work experience from the enterprise information security management point of view, a careful analysis of the current management of enterprise IT resources in the application of the status quo and problems in the proposed enterprise resource will be the need for centralized management, then in accordance with the software Project ideas, the concentration of resources on the access control platform the necessary requirements analysis, the corresponding program design, its overall framework and functional design, non-functional design, interface design, a detailed presentation and highlighted with the enterprise information security is closely related to the accounts and audit subsystem subsystems. Through practical case after a concrete realization of the platform and configuration were introduced. Finally, the concentration of resources management platform design summarized. The platform adopted by the use of systems, databases, servers, network equipment, and other resources account, authentication, authorization, auditing, centralized management, preliminary settlement of the concentration of resources in the enterprise access control with regard to the security issues, while effectively reducing the safety management cost for the safety and security of enterprise information and provide important reference. |