Font Size: a A A

The Design And Realization Of Unified Identity Authentication System Based On PKI

Posted on:2014-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:B K LiuFull Text:PDF
GTID:2268330401977617Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Now social development can be said to be built on the basis of multi-application system and big data.As a high-strength authentication services infrastructure for network applications,PKI has a rapid development in China.But there are many unsatisfactory areas in integration between PKI and application as a result of the application of a wide variety and highly personalized.On the basis of research in cryptography, PKI technology,single sign-on technology, SAML protocol, SSL protocol,as well as a variety of network identity authentication method and other related technologies,the article designed a unified authentification system. The system built a bridge between the PKI and the application,it combined applications and PKI technology well. The system consists of three parts of the authentication server, the authentication client, application server authentication middleware. Certification part used C/S structure because it had better scalability, management part used the B/S structure because it is easy to use. The three parts meet together to provide multiple applications unified identity authentication, access control, audit log, while according to the different needs of the application system on efficiency and security, we can deployed the application systems and unified authentication system by the bus and gateway mode flexiblely.In short,the system realized unified identity authentication combined with application、 certificate、account and provided greater security for applications based on PKI technology.It allowed users to access applications more efficient.It simplified the process of the user’s authentication and integrated the applications to the same platform to facilitate the user.It had a broad application prospects.
Keywords/Search Tags:PKI, identity authentication, SAML, SSL, Single Sign On
PDF Full Text Request
Related items