信息安全研究 ›› 2017, Vol. 3 ›› Issue (9): 832-840.

• 技术应用 • 上一篇    下一篇

基于可信身份认证的企业信任服务体系研究

李明   

  1. 中国电子科技集团公司经济运行部信息化建设处
  • 收稿日期:2017-09-07 出版日期:2017-09-15 发布日期:2017-09-06
  • 通讯作者: 李明
  • 作者简介:工程师,主要研究领域为大型企业信息化管理、企业应用平台建设和管理.

Research on the Technology Architecture of Enterprise Trust Service Based On Trusted Identity Authentication

  • Received:2017-09-07 Online:2017-09-15 Published:2017-09-06

摘要: 伴随着企业的发展壮大,企业信息化系统建设发展迅猛,企业信息化安全的重要性也日益凸显。为了应对复杂的网络环境下多样化的外部用户接入,企业为各自独立的业务系统分别建立了安全强度不一、复杂程度各异的用户管理系统和应用登录系统,这些安全强度参差不齐的应用系统在各自解决企业用户身份管理问题的同时,又给企业带来了组织机构混乱、用户信息分散的管理问题。面对发展困局,以企业可信身份管理和认证框架为核心的信任服务技术体系,基于企业用户可信身份,进行身份认证、单点登录、访问控制、授权管理、鉴权服务等系列相关服务,完成人员、应用系统的可信身份管理和认证,通过单点登录对接企业各个应用系统,实现企业内部用户对业务应用访问的“一次认证、全网访问”。该体系作为企业信息安全保障基础,可加快企业信息化进程,助力企业业务发展。

关键词: 用户管理, 可信身份管理, 可信身份认证, 访问控制, 授权, 单点登录

Abstract: With the development of enterprises, the enterprise information system construction develops rapidly, The importance of enterprise information security has become more and more important. In order to deal with the complex network environment, and accessing a variety of service system with external users, independent enterprise security is established respectively, with different complexity of user management system and application login system. These systems vary in safety strength. To solve the problem of corporate identity management, by the way, it takes some problems about the organization of the enterprise confusion, and user information dispersal. Faced with the dilemma of the development of enterprise information, this paper proposes a trusted service management system based on the trusted identity management and authentication framework. Based on the trusted identity of enterprise users, a series of related services such as identity authentication, single sign on, access control, authorization management, authentication service, and so on, are completed. Through a single point of logon enterprise application system, the realization of the enterprise internal users access to business applications, "a certification, the whole network access". And on this basis, the construction of public trust services is completed. As the basis of enterprise information security, the system architecture speeds up the process of enterprise information, helps business development.

Key words: user management, trusted identity management, trusted identity authentication, access control, authentication, single sign on