Policy-based Authorization Management Product. Best Practices of Russian offshore IT outsourcing companies. RUSSOFT
Attention: the new version of RUSSOFT website is available at russoft.org/en.
RUS | ENG

Supported by:

Project Title: Policy-based Authorization Management Product

Company:Intelligent Systems View Company Profile
Client (Country):St. Joseph Regional Medical Center (USA)
Duration, months:2
Total Effort, person/months:4
Total Views:7248

The Challenge

In the nowadays business activities security aspects play the most important role. One of the security features greatly demanded on the market is the authorization management. One of our clients requested the solution that provides Privilege Management Infrastructure (PMI), allowing the administration and enforcement of user privileges and transaction entitlements to e-commerce and enterprise resources together with the role based authorization to Web-based resources which allows enterprises to provide enabling security and rich user experiences for their customers, suppliers and partners.

The Solution

We have developed the product that allows enterprises to securely enable online business processes to gain competitive advantage, easily manage users and access policies in order to deliver protected e-relationships.

The product consists of 4 main sections:
  • Validator
    This system part is responsible for checking user's identification data and sending back information about the resources available for the user. It was developed using Java. Returned data is presented in the XML format. Validator connects to the LDAP-server for getting user's information via the SSL (Secure Sockets Layer) secured connection.

  • Audit Server
    This server logs information about all access attempts performed within the system. Logs are created in accordance with the information obtained from the Validator. Different storage methods are implemented. This section is developed using Java. Information is obtained from using TCP/IP protocol.

  • Policy Editor
    This program allows the system administrator to maintain the resources tree stored on the LDAP-server. This section is developed using Java. Interaction with the LDAP-server is performed via the LDAP protocol using the SSL secured connection.

  • Enforcer
    This section is responsible transferring available resources to the user. This can be both thethe web-server and the application server. The system has the set of plug-ins implementing the API (Application Programming Interface) for each variant of supported Enforcers. The main task for plug-ins is the connection of the appropriate applications with the system. Plug-ins are developed using the C/C++ language. Connection with Validator is established via TCP/IP protocol using the SSL secured connection.
Based on its intuitive user interface, automated management capabilities and XML-based architecture, Policy-based authorization management system is the easiest-to-use and quickest to deploy authorization management product for companies seeking to maximize their e-business return on investment.

Tools and Technologies

  • Rational Rose 2000 Modeling Tool
  • Rational Requisite Pro Requirements Management Tool
  • Rational Clear Quest Change Management Tool
  • Visual Studio 6.0

Post Your Story, Tell All About Your Success!

If you want the story of your company to appear on the portal please fill out this form and send it to [email protected]. We would also like you to leave contact information (name, e-mail, phone) of a person who is responsible for filling the form to clarify any questions, which could appear.

Available Success Stories From Companies:

Disclaimer

All information contained in this Section is owned by RUSSOFT.org and its Participants and is protected by Russian and international copyright laws. Any reproduction or republication of all or part of this Section has to remain intact and include a notice on the copyright of RUSSOFT.org or the Participants, as applicable.

While the information of this Section has been presented with all due care, RUSSOFT.org does not warrant the accuracy, completeness, usefulness and truth of Section’s information, links and logos derived from third parties. RUSSOFT.org is not liable for any loss or damage occurring from the use of this Section’s materials.