GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. DOI: 10.16516/j.gedi.issn2095-8676.2015.S1.052
Citation:
GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. DOI: 10.16516/j.gedi.issn2095-8676.2015.S1.052
GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. DOI: 10.16516/j.gedi.issn2095-8676.2015.S1.052
Citation:
GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. DOI: 10.16516/j.gedi.issn2095-8676.2015.S1.052
Design and Implementation of Authentication in Enterprise Information System
This paper is aimed at the contradiction between the security and convenience of data access security and convenience in the enterprise information system. The 4A subsystem of the enhanced function with multiple authentication is designed and implemented in this paper for the role of user authority control. By the the construction of corporate identity, authority, certification, audit 4 system, the user in a log process only need one step and system automaticly carry on authentication operation. It uses smart strategy to autoconfigure the system, guarantee the authentication strengeh of resources, effectively ensure the data access security and simplify the loging procedure.
Disclaimer: The English version of this article is automatically generated by iFLYTEK Translation and only for reference. We therefore are not responsible for its reasonableness, correctness and completeness, and will not bear any commercial and legal responsibilities for the relevant consequences arising from the English translation.