Font Size: a A A

Design And Implementation Of Unified User Managerment System

Posted on:2012-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:S X DanFull Text:PDF
GTID:2248330374499175Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With rapid development of information technology these years, large scale enterprise relies on variable information systems to provide operation and business support more and more than ever before. In MSS, BSS and OSS fields, the number of users of supporting systems rises, the scale of network expands and many information security problems emerges. So, it is calling for system integration. The foundation of system integration is to unify user accounts, authentication, authorization and audit. Managing user accounts separately is an obstacle of the development of information system and information security.User Management System is a range of building enterprise information system account (Account) management, authentication (Authentication) management, authorization (Authorization) management and security audit (Audit), the concentration of these management module integrated into a unified system of security services.Users through a unified management platform to provide a unified technology architecture based security services, so that new applications can be easily integrated into security management platform. Through the platform of the enterprise information system of IT resources (including the application and system) for centralized management, centralized system for each business customer service, enhance security and business systems management capabilities.In short, as the system development and increase of internal users, unified user management system while reducing maintenance and management of staff workload and improve work efficiency; the other hand, the business systems to achieve a unified security policy, which in essence, the business system to improve security. Unified security management technologies and platforms, making the system and security administrators can support system users and resources for centralized management, centralized distribution of competences, from the technical support system to ensure the implementation of security policy.This article discusses how to design a unified user management system and the implementation method. The author is one member of the team who has specified China’s Mobile User Management Technical Solutions, presided over the Tianjin Mobile User Management System design and implementation, system operation and maintenance, and other routine work.
Keywords/Search Tags:account, authentication, authorization, audit
PDF Full Text Request
Related items