Research of Unified Authentication System Based on LDAP

Article Preview

Abstract:

With the development of Internet technology, the increasing of the application service makes the enterprise network management and security more and more complex. Based on it, the enterprise portal needs a system with high performance for identity authentication management. In this, implements the research of unified identify authentication system through LDAP, designs a rational structure of the directory tree. Thus, All the application servers use the user information in the same directory. By the manner, the problem of disagreement and larger maintenance burden can be solved and the system security can be improved.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

2163-2167

Citation:

Online since:

September 2013

Authors:

Export:

Price:

[1] Hong Yan, JAVA and model, Beijing: Electronic Industry University Press, (2002).

Google Scholar

[2] BruceSchneier, Applied Cryptography, Beijing: Machinery Industry Press, 2005: 361-367.

Google Scholar

[3] Xiang Li; Ai-nong Chao, Research and application of LDAP in uniform identity authentication, Journal of Computer Application, 2008-S1, pp.28-32.

Google Scholar

[4] Cheng-long Zhang, Dong Wang, Exploration and Practice of Directory Service Based on LDAP, Financial Computerizing, No144, Apr. 2012, pp.81-83.

Google Scholar

[5] W. Yeong, T. Howes, S. Kille. Lightweiht Directory Access Protocol. RFC1777, Mar. (1995).

DOI: 10.17487/rfc1777

Google Scholar

[6] Jie Lan, Research on Single sign-on System, Technological Development of Enterprise, Vol. 31 No. 5, Feb. 2012, pp.73-74.

Google Scholar

[7] Mohammad Salim; M Sana Akhtar; Mohammed A Qadeer, Data Retrieval and Security using Lightweight Directory Access Protocol, Proceedings of 2009 Second International Workshop on Knowledge Discovery and Data Mining, Jan. (2009).

DOI: 10.1109/wkdd.2009.175

Google Scholar

[8] Wikipedia, Replay Attack, http: /en. wikipedia. org/ wiki/Replay_attack, Feb. (2012).

Google Scholar