【正文】
. 8 main function ........................................................................................ 9 sum up of this chapter................................................................................. 11 chapter 3 design and implementation of IP strategy ................................................. 12 design.......................................................................................................... 12 IP strategy of system ........................................................................... 12 IP strategy of user................................................................................ 14 IP strategy format and judgement rule ....................................................... 15 realization ................................................................................................... 16 IP strategy of system ........................................................................... 16 IP strategy of user................................................................................ 17 sum up of this chapter................................................................................. 19 chapter 4 design and implementation of authentication ......................................... 20 design.......................................................................................................... 20 CA authentication ....................................................................................... 22 design of system’s entry ...................................................................... 22 design of system’s authentication ....................................................... 23 design of digital certificates and user’s mapping ................................ 26 explain of implement .......................................................................... 27 AD authentication....................................................................................... 27 design of AD data synchro .................................................................. 28 design of user’s entry in AD ............................................................... 28 user and password....................................................................................... 31 static model ......................................................................................... 32 dynamic model .................................................................................... 32 realization............................................................................................ 34 Single Sing On............................................................................................ 34 configuration ....................................................................................... 35 unify user’s data .................................................................................. 35 authentication principle....................................................................... 36 authentication process ......................................................................... 36 山 東 大 學(xué) 碩 士 學(xué) 位 論 文 meeting with system ........................................................................... 37 server of central authentication ........................................................... 38 client agent of central authentication .................................................. 38 realization of multiple authentication ......................................................... 39 config of ............................................................................... 39 config of ............................................................ 40 sum up of this chapter................................................................................. 45 chapter 5 design and implementation of rights management.................................... 46 design.......................................................................................................... 46 logical view ................................................................................................ 47 function authorization................................................................................. 48 data authorization ....................................................................................... 49 realization ................................................................................................... 52 sum up of this chapter................................................................................. 54 chapter 6 design and implementation of system audit .............................................. 55 design.......................................................................................................... 55 main data structure and class design .......................................................... 58 realization ................................................................................................... 60 sum up of this chapter................................................................................. 61 chapter 7 tag ............................................................................................................... 62 conclusion ................................................................................................... 62 work of future ............................................................................................. 62 referrence ..................................................................................................................... 64 acknowledgement......................................................................................................... 66 山 東 大 學(xué) 碩 士 學(xué) 位 論 文 I 摘 要 隨著社會(huì)信息化的發(fā)展,很多單位采用應(yīng)用系統(tǒng)作為管理手