Font Size: a A A

Design And Implementation Of Unified Authority Management System

Posted on:2018-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhaoFull Text:PDF
GTID:2348330518488102Subject:Engineering
Abstract/Summary:PDF Full Text Request
As the network has gradually increased coverage of global management information system has been prevalent in all walks of society,not only wide but also deep,but it is accompanied with a very important issue is the safety of students.Management Information System also includes both computer users,which is the person,so it has a certain degree of complexity,regardless of which of a link encountered security threat will affect the overall situation.In particular,access control,the entire security system status is very important,can be said that the primary task of ensuring security.Research object of this paper is grid company's management information systems for repeatability,user authentication and access,etc.present therein organizational issues,and constantly optimized and improved,in order to build a user permission control system with a high degree of integration,building the foundation is the role access.This paper firstly analyzes management business at all levels of the system's rights of the grid company,and divides system business functions into identity,permissions,auditing,configuration,work orders and other six management modules.And then analyzes the core business processes that exist in the system,and builds a UML use case diagram based on each management module,which dentifies the main functional modules that the system needs to implement.What's more,this paper has specifically studied the management mode of user rights for the integrated application part and the system.In addition,this manage mode is mainly based on role access control,and simutaneouly achieved the new mode and system development,as well as a unified centralized management of all user rights,which effectively improve the manage results of system Uniform Permissions.In the process of the R & D system architecture,the design of J2 EE architecture is the most important.This paper has not only designed a highly unified authentication architecture,but also adopted a distributed system on the cashe scheme,and also set up a very detailed process design and database concept design and database E-R design in the aspect of identity authentication,which greatly enhance the overall safety performance of the system.At the same time,this paper has utilizes ARBAC Access Control Model for Tree Structure with emphasis,which makes a detailed design and implementation for the system identity authentication.In the system implementation process,the single sign-on technology is used to achieve a unified identity authentication,and to ensure the security of the system login.This system uses eclipse as the development tool,and implements B / S(Browser / Server) three-tier architecture,and uses Oracle 11 g as the database,and adopts Java language in business logic layer,and prepares Interface layer with JPS.After the completion of system development,there is a function and performance testing for the system,and the test result indicates that the unified management of this system has met the design requirements,and has also achieved the logical separation of users and permissions,and was able to assign permissions to users dynamically,which shares the characteristics of intuitive authoritative assignment,good scalability,post supporting,changing permissions.In 2016,this system,after a year of testing and application,can effectively prevent the illegal user from logining,the security of the data improved,the employee's account garanteed uniformity,the employees able to set the personality password according to their need,dynamic verification code by email,which unanimously received the praise of the staff.
Keywords/Search Tags:access control system, RBAC model, unified rights management
PDF Full Text Request
Related items