Skip to main content

Design and Implementation of the Uniform Identity Authentication System Based on LDAP

  • Conference paper
Emerging Research in Web Information Systems and Mining (WISM 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 238))

Included in the following conference series:

  • 909 Accesses

Abstract

This paper describes the current characteristics of the campus network authentication technology at first. And then combined with the actual situation of our university, a campus network unified authentication system based on LDAP protocol is designed. Based on comparison of the Information Model, Named Model, Function Model and Security model and other models, a model of unified authentication framework based on Agent Model is constructed. It is implemented that all applications share one user’s authentication information in the campus network. The unified authentication system solution solves the different application systems cannot be recognized the authentication problems with each other.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carrington, C., Speed, T., Ellis., J., et al.: More on LDAP. In: Enterprise Directory and Security Implementation Guide, pp. 35–40 (2002)

    Google Scholar 

  2. Dong, L.-w., Wang, W.-y.: Study on Unified Resource Management Architecture Supporting SSO. J. Journal of Computer Applications 26, 1146–1147 (2005)

    Google Scholar 

  3. Yeh, Y.-S., Lai, W.-S., Cheng, C.-J.: Applying lightweight directory access protocol service on session certification authority. Computer Networks 38, 675–692 (2002)

    Article  Google Scholar 

  4. Zeilenga, K.: Named Subordinate References in Lightweight Directory Access Protocol (LDAP) Directories. RFC 3296 (July 2002)

    Google Scholar 

  5. Liu, C., Xu, H., Yang, Z.: The Research and Realization of an Uniform Identity Authentication System on Campus Based on LDAP and SOAP. J. Computer Applications and Software 23(12), 59–60, 80 (2006)

    Google Scholar 

  6. Ashraf, E., Tarek, S.S., Zaki, M.: Design of an enhancement for SSL/TLS protocols. J. Computers & Security 25(4), 297–306 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, J., Yan, H., Wu, B. (2011). Design and Implementation of the Uniform Identity Authentication System Based on LDAP. In: Zhiguo, G., Luo, X., Chen, J., Wang, F.L., Lei, J. (eds) Emerging Research in Web Information Systems and Mining. WISM 2011. Communications in Computer and Information Science, vol 238. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24273-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24273-1_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24272-4

  • Online ISBN: 978-3-642-24273-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics