Font Size: a A A

J2EE-Based Unified User Management System (UUM) Design

Posted on:2014-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:N LuoFull Text:PDF
GTID:2248330395492076Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the deepening of enterprise information construction, various support applicationsand the number of the users increase quickly, but because each system has its own usermanagement and authentication mechanisms,resulting in a large number of isolated, dispersedinformation of users and authentication, so in order to solve this kind of informationsilos,building a unified user management system and gradually make it become the importantbasic component is necessary.According to the large number of isolated, dispersed users and authenticationinformation, in this paper, we use a unified user management concepts, studied unified userauthentication, single sign-on technology, access control technology, the standardspecification of information defining,stoning,syncing of user and organization and thestandard specification of storage and verification of permissions.In the aspect of userauthentication, the paper selects an agent-based authentication technology and uses acentralized authentication server and the database users, this method reduces managementcosts and provides a common platform for the authentication;in the aspect of access control,this paper selects the model of improved RBAC3which is a role-based model,this modelprovides a relationship of role inheritance and responsibilities of the inheritance relationshipbetween separation constraints, and adds a user group,individual user privileges set, group,class, privilege level and other new concepts;finally,at the aspect of synchronization ofinformation in the system, this paper established a system of database synchronization whichbased on LDAP directory and business systems and simultaneously that is the base ofSSO,which is a part of this system.Thus, this paper established a new type of unified user authentication system which facethe enterprise applications and have defined and implemented the functions of userauthentication, authorization and resource access control.The results proved that the systemcan effectively carry out the user information of enterprise integration and is feasible.
Keywords/Search Tags:LDAP, RBAC, single sign-on, multi-source authentication
PDF Full Text Request
Related items