Unified Identity Authentication between Heterogeneous Systems Based on LDAP and RBAC
نویسندگان
چکیده
To solve the problems of unified identity authentication between heterogeneous application systems that emerged in the procedure of informatization construction. The paper presents a 3-tier architecture solution that contains user tier, unified authentication tier and application system tier to realize unified identity authentication between legacy system and new application system. For legacy systems, the paper presents a method of double authentication that users firstly log on unified identity authentication system for unified identity validation, then securely transmit authenticated unified identity information and simulate the authentication progress via the authentication mechanism of legacy systems for permission distributing. For new application systems, the paper presents a method of centralized authentication through a relatively independent Role Based Access Control (RBAC) identity authentication model that consists of organization, user, role and permission entries to realize the logical separation of users and access permission, then designs a Directory Information Tree (DIT) structure based on the RBAC model for permissions distributing and access controlling.
منابع مشابه
Secure Information Sharing Using Attribute Certificates and Role Based Access Control
In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...
متن کاملUsing Ontologies to Mitigate LDAP Deficiencies
Semantic technology powered access control schemes have been recently proposed to enhance the flexibility of role-based access control (RBAC) and its variants. These access control mechanisms depend heavily on rich, contextual data sourced from an identity attribute store. Unfortunately, most identity stores in use today use the Lightweight Directory Access Protocol (LDAP) representational sche...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملRole-based Access Control on the Web Using LDAP
This paper gives a framework for how to leverage Lightweight Directory Access Protocol (LDAP) to implement Role-based Access Control (RBAC) on the Web in the server-pull architecture. LDAP-based directory services have recently received much attention because they can support object-oriented hierarchies of entries in which we can easily search and modify attributes over TCP/IP. To implement RBA...
متن کاملPractical Unified Authentication for 3 G - WLAN Interworking ⋆
3G-WLAN interworking is an emerging technology for the convergence of heterogeneous wireless networks. Solutions to unified authentication using Universal Subscriber Identity Module (USIM) card are urgent demands for wireless network operators, wireless service providers, and mobile users. However, it is a challenging issue to achieve unified authentication based on current network infrastructu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JNW
دوره 9 شماره
صفحات -
تاریخ انتشار 2014