Proceedings of the 2016 3rd International Conference on Mechatronics and Information Technology

Research and practice about the identity authentication technology

Authors
Yun Xia Fu
Corresponding Author
Yun Xia Fu
Available Online April 2016.
DOI
https://doi.org/10.2991/icmit-16.2016.65How to use a DOI?
Keywords
identity authentication; Single sign-on model; Kerberos authentication
Abstract
During the rapid development of the network, this is very important that the system is security.we should will be thinking about the problem ,it is the system's first line of security . How do we protect and build it? In this paper, we introduce about Kerberos authentication and certification process; At the same time we introduce the Cookie technology and LDAP directory service methods. At last ,We have been established a unified identity authentication ,it is single sign-on model. we will rely on the model. During the running of the system,I t will be ensured the safety and reliability.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
2016 3rd International Conference on Mechatronics and Information Technology
Part of series
Advances in Computer Science Research
Publication Date
April 2016
ISBN
978-94-6252-184-1
ISSN
2352-538X
DOI
https://doi.org/10.2991/icmit-16.2016.65How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Yun Xia Fu
PY  - 2016/04
DA  - 2016/04
TI  - Research and practice about the identity authentication technology
BT  - 2016 3rd International Conference on Mechatronics and Information Technology
PB  - Atlantis Press
SP  - 367
EP  - 370
SN  - 2352-538X
UR  - https://doi.org/10.2991/icmit-16.2016.65
DO  - https://doi.org/10.2991/icmit-16.2016.65
ID  - Fu2016/04
ER  -