Font Size: a A A

Design And Implementation Of Kerberos-Based Unified Authentication And Authorization System

Posted on:2014-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhuoFull Text:PDF
GTID:2248330398970912Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of the information technology and the Internet, the government, enterprises, schools and other institutions are using more and more application systems in order to improve the efficiency and management level. However, there are some security issues while using these application systems, Such as illegal access, interception and destruction of information and the imperfect network security management system. Thus, it becomes especially important to authenticate users, allocate and manage the resource permissions.The paper researches the unified user management and unified business management. The authorized design is to set roles for application systems or resources, and the authorization is mainly based on the user (user group) and business roles. Starting from the research of related technologies, the paper uses the thoughts of software engineering which includes requirement analyzing, system design, detail module design, system implementation, system testing and so on. The system designs the four roles of system administrator, business administrator, authorized administrator, audit administrator, use symmetric and asymmetric key management, and has key generating, storing, updating, backuping and recovery. The system realizes the centralized and unified management of all users, unified business system roles configuration, and authorization management, and authentication and authorization of users to access business systems in a large LAN.In practical applications, the system designed in this paper can efficiently enhance the unified user management and the the security of authentication in the large LAN. At the same time,it is of high security, efficiency, and ease of use while allocating, managing the resource permissions authenticating users.
Keywords/Search Tags:Unified User Management, Authentication, KerberosAuthentication Protocol, Authorization Management
PDF Full Text Request
Related items