Contact at mumbai.academics@gmail.com or 8097636691
Responsive Ads Here

Wednesday, 14 February 2018

Central Authentication Registry


Central Authentication Registry


Abstract
The Central Authentication Registry (CAR) is a single sign-on protocol for the web. Its purpose is to permit a user to log into multiple applications simultaneously and automatically. It also allows web applications to authenticate users without gaining access to a user’s security credentials, such as a password. The name CAR also refers to a software package that implements this protocol.
INTRODUCTION TO PROJECT
The Central Authentication Registry (CAR) is a single sign-on protocol for the web. Its purpose is to permit a user to log into multiple applications simultaneously and automatically. It also allows web applications to authenticate users without gaining access to a user’s security credentials, such as a password. The name CAR also refers to a software package that implements this protocol.
PURPOSE OF THE PROJECT
This project should be implemented using Web Services or WCF technology only. The objective is in the biggest organizations the User credentials will be centralized in a registry for the access of different applications the Authentication details will be retrieved from the registry (usually Lotus Notes Domino or Windows Active Directory) and based on Credentials the applications access role will be provided.
For example, in an Organization the Employee will be registered with an application to fulfill the joining formalities.  At the time of joining he will get the User ID and Password, the same credentials he/she should able to use the Intranet/Internet applications of the Organization like Mails, Attendance, Leave Plans, Employee Reference for new jobs, using Email of the organization to purchase items with company logo, etc.
Similar to this, would like to develop a centralized authentication mechanism using which we should able to access the collections of applications with different Roles, different Parameters of the Roles, etc
PROBLEM IN EXISTING SYSTEM
Today’s companies have multiple applications, multiple departments and these are access by the several employees. To provide access of the application to employee is needed. But for every application each employee needs different sign-in parameters. That will be problem to the users of the site to access different applications using different sign-in parameters.  Administration facing a difficult to give access of the application for each employee is a difficult task.
  • The existing system is a multi sign-in system. 
  • Here the user’s needs to maintain different login credentials for each application.
  • There is no sharing is possible if the data is in the form of paper or Disk drives.
  • It’s a limited system and fewer users friendly.
  • Searching of particular user accessible applications is very critical it takes lot of time.
  • It is very critical to maintain records manually for physical devices of a computer. Because organizations contains computers on different configurations.
  • There is no way to access the system from the side of any client.
SOLUTION OF THESE PROBLES
  • This project should be implemented using Web Services or WCF technology only. The biggest organizations the User credentials will be centralized in a registry for the access of different applications the Authentication details will be retrieved from the registry (usually Lotus Notes Domino or Windows Active Directory) and based on Credentials the applications access role will be provided.
  • User Friendliness is provided in the application with various controls provided by system Rich User Interface.
  • The system makes the overall employee login access management much easier and flexible.
  • It can be accessed over the Intranet.
  • The user information can be stored in centralized registry which can be maintained by the system.
  • This can give the good security for user information because data presents in server machine.
  • Authentication is provided for this application only registered Users can access.
  • There is no risk of data management at any level while the project development is under process.
  • Categorization of computers in the database make easy to identify the various employee details and application permissions. 
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with the following modules:
Module Description
i. Administrator
ii. Employee
iii. Authentication through Web Service
iv. Profile Management Application
v. Communication Application
vi. Reports
Admin:
Admin can manage different applications.
He can add new application. He can update the existing application information.
Admin can decide the different roles for the applications.
Admin enter number of roles for each application.
Admin can manage the employee details like Add/Update
Admin receive a request from Employee to add him for the access of an application with specific Role, Parameters, etc. details.
Admin give the permission to the employee to access the application.
Employee:
Employee can login in to the system using authentication credentials to access the site.
Employee makes a request for an application with Role, Parameters, and etc. details to Admin.
Employee can login to the Site successfully after assigning the Role, Parameter details by the Admin.
Employee can manage their own profile like account information and profile information.
Employee can access the various types of application.
Authentication:
This module provides security to the applications. 
Every user should enter correct user name and password to proceed.
This request will goes to database through a web service and check the user availability and authentication permissions.
If you entered wrong user name and password then it prompts you “Incorrect Username or Password…”
Profile Management
By default every employee can access this application.
By using this application employee can send the request for next application permissions.
After login in employee can manage profile (like account or profile) .
Employee request can be processed by the administrator to give the permissions.
Reports
This module is used to print various online reports.
This module will be enabled only to the admin type of users.
Reports contains various information about the Employees.
Report takes the Application Name as i/p and   returns the employees in the access information for the application.
Hardware Requirements:
  • PIV 2.8 GHz Processor and Above
  • RAM 512MB and Above
  • HDD 40 GB Hard Disk Space and Above
Software Requirements:
  • WINDOWS OS (XP / 2000 / 200 Server / 2003 Server)
  • Visual Studio .Net 2008 Enterprise Edition
  • Internet Information Server 5.0 (IIS)
  • Visual Studio .Net Framework (Minimal for Deployment)   version 3.5                        
  • SQL Server 2005 Enterprise Edition

No comments:

Post a Comment