Research and practice about the identity authentication technology
Yun Xia Fu
Yun Xia Fu
Available Online April 2016.
- https://doi.org/10.2991/icmit-16.2016.65How to use a DOI?
- identity authentication; Single sign-on model; Kerberos authentication
- During the rapid development of the network, this is very important that the system is security.we should will be thinking about the problem ,it is the system's first line of security . How do we protect and build it? In this paper, we introduce about Kerberos authentication and certification process; At the same time we introduce the Cookie technology and LDAP directory service methods. At last ,We have been established a unified identity authentication ,it is single sign-on model. we will rely on the model. During the running of the system,I t will be ensured the safety and reliability.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Yun Xia Fu PY - 2016/04 DA - 2016/04 TI - Research and practice about the identity authentication technology BT - 2016 3rd International Conference on Mechatronics and Information Technology PB - Atlantis Press SP - 367 EP - 370 SN - 2352-538X UR - https://doi.org/10.2991/icmit-16.2016.65 DO - https://doi.org/10.2991/icmit-16.2016.65 ID - Fu2016/04 ER -