Project Title: Policy-based Authorization Management Product
The Challenge
In the nowadays business activities security aspects play the most important role. One of the security features greatly demanded on the market is the authorization management. One of our clients requested the solution that provides Privilege Management Infrastructure (PMI), allowing the administration and enforcement of user privileges and transaction entitlements to e-commerce and enterprise resources together with the role based authorization to Web-based resources which allows enterprises to provide enabling security and rich user experiences for their customers, suppliers and partners.The Solution
We have developed the product that allows enterprises to securely enable online business processes to gain competitive advantage, easily manage users and access policies in order to deliver protected e-relationships.The product consists of 4 main sections:
- Validator
This system part is responsible for checking user's identification data and sending back information about the resources available for the user. It was developed using Java. Returned data is presented in the XML format. Validator connects to the LDAP-server for getting user's information via the SSL (Secure Sockets Layer) secured connection. - Audit Server
This server logs information about all access attempts performed within the system. Logs are created in accordance with the information obtained from the Validator. Different storage methods are implemented. This section is developed using Java. Information is obtained from using TCP/IP protocol. - Policy Editor
This program allows the system administrator to maintain the resources tree stored on the LDAP-server. This section is developed using Java. Interaction with the LDAP-server is performed via the LDAP protocol using the SSL secured connection. - Enforcer
This section is responsible transferring available resources to the user. This can be both thethe web-server and the application server. The system has the set of plug-ins implementing the API (Application Programming Interface) for each variant of supported Enforcers. The main task for plug-ins is the connection of the appropriate applications with the system. Plug-ins are developed using the C/C++ language. Connection with Validator is established via TCP/IP protocol using the SSL secured connection.
Tools and Technologies
- Rational Rose 2000 Modeling Tool
- Rational Requisite Pro Requirements Management Tool
- Rational Clear Quest Change Management Tool
- Visual Studio 6.0
Post Your Story, Tell All About Your Success!
If you want the story of your company to appear on the portal please fill out this form and send it to [email protected]. We would also like you to leave contact information (name, e-mail, phone) of a person who is responsible for filling the form to clarify any questions, which could appear.
Available Success Stories From Companies:
Disclaimer
All information contained in this Section is owned by RUSSOFT.org and its Participants and is protected by Russian and international copyright laws. Any reproduction or republication of all or part of this Section has to remain intact and include a notice on the copyright of RUSSOFT.org or the Participants, as applicable.
While the information of this Section has been presented with all due care, RUSSOFT.org does not warrant the accuracy, completeness, usefulness and truth of Section’s information, links and logos derived from third parties. RUSSOFT.org is not liable for any loss or damage occurring from the use of this Section’s materials.






