Design and Implementation of Authentication in Enterprise Information System
doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052
- Received Date: 2015-12-15
-
Key words:
- access security /
- role control /
- unified authentication
Abstract: This paper is aimed at the contradiction between the security and convenience of data access security and convenience in the enterprise information system. The 4A subsystem of the enhanced function with multiple authentication is designed and implemented in this paper for the role of user authority control. By the the construction of corporate identity, authority, certification, audit 4 system, the user in a log process only need one step and system automaticly carry on authentication operation. It uses smart strategy to autoconfigure the system, guarantee the authentication strengeh of resources, effectively ensure the data access security and simplify the loging procedure.
Citation: | GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052 |