Font Size: a A A

Integrated Application System Single Sign-on Authentication Design And Application

Posted on:2015-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:W Y ChenFull Text:PDF
GTID:2298330422477133Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The so-called single sign-on, users need only to realize that once logged in, you canaccess all of the systems. With prisons continuous development of information technology, atwork often have to use a workflow to a different business systems. If the user can not beachieved between the various systems and permissions information sharing and unifiedauthentication, then the operation of the workflow which would be extremely cumbersome.Therefore, in order to achieve a single sign-on authentication as a starting point to achieve aunified and standard user authentication and management information, it becomes optimizeand enhance the effectiveness of information systems prisons a breakthrough.In this paper, single sign-on authentication technology Research, conducted in-depthdiscussion. In the Web development technologies, XML language, SOAP protocol and othertechnical and regulatory basis for in-depth study, focusing on the single sign-onauthentication, and single sign-on solutions and models to achieve a systematic analysis andcomparison of proposed information systems meet the needs of the prison unifiedauthentication single sign-on model, combined with the system program needs analysis, workout a detailed single sign-on authentication design. The program not only takes into accountthe system for single sign-on authentication functional requirements, while also taking into account the prison information system for single sign-on authentication security needs, to acertain extent, solve the unified certification programs that exist in the authentication serverload issues, and making a single sign-on authentication schemes in compatibility andscalability on demand is guaranteed.Finally, the single sign-on authentication scheme implementation, including programdesign, function modules, system security, were also discussed in detail, and passed the testsfor single sign-on authentication scheme conducted a feasibility validation..
Keywords/Search Tags:Information Technology, Single Sign-On, Authentication
PDF Full Text Request
Related items