Font Size: a A A

The Research And Implementation Of A SSO And RBAC-based Authentication Application System

Posted on:2013-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:D HuaFull Text:PDF
GTID:2248330395972562Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of computer technology, business applications becomemore complex, the requirements for information security and user experience is alsorising. In order to reduce system maintenance costs, enhance system security, andprovide a good user experience, the single sign-on, RBAC access control systems areincreasingly being applied to commercial applications. From theory to practicalapplication has a very broad basis.This paper based on Single sign-on technology and RBAC theory, analyze theirvalue of application. Based on this research, and summarizes the more popular webtechnology, in light of the Java servlet specification of an identity authenticationmodule The middleweight solution. The program provides authentication andpermissions certification services, designed to improve the user experience and reducesystem maintenance costs, and enhance system security. Unauthorized access to theuser’s interception, taking into account based on this research, and summarizes themore popular web technology, in light of the Java servlet specification of an identityauthentication module The middleweight solution. The program providesauthentication and permissions certification services, designed to improve the userexperience and reduce system maintenance costs, and enhance system security.Unauthorized access to the user’s interception, taking into account the flexibility.Fully taken into account in the design of the system’s scalability and compatibility.Deployed in the old system, you cannot modify the original code. Caching and faulttolerance optimization for the web application environment and load requirements, sothat it can be adapted to the demanding requirements of commercial applications. Andpaving the way for the next perfect do. the flexibility. Fully taken into account in thedesign of the system’s scalability and compatibility. Deployed in the old system, youcannot modify the original code. Caching and fault tolerance optimization for the webapplication environment and load requirements, so that it can be adapted to thedemanding requirements of commercial applications. And paving the way for the nextperfect do.
Keywords/Search Tags:SSO, RBAC, servlet, PKI
PDF Full Text Request
Related items