信息安全研究 ›› 2021, Vol. 7 ›› Issue (E1): 131-.

• 优秀论文 • 上一篇    下一篇

ID.LINK全栈式身份与访问管理解决方案

李德辉;钟昕   

  1. (北京众图识人科技有限公司北京100000)
  • 出版日期:2022-04-20 发布日期:2022-04-22
  • 通讯作者: 李德辉 高级工程师.主要研究方向为身份认证与访问控制、敏感数据访问控制等. lidehui@id.link
  • 作者简介:李德辉 高级工程师.主要研究方向为身份认证与访问控制、敏感数据访问控制等. lidehui@id.link 钟昕 工程师.主要研究方向为身份认证与访问控制相关技术. zhongxin@id.link

ID.LINK Full-Stack Identity and Access Management Solution

  • Online:2022-04-20 Published:2022-04-22

摘要: 随着现代信息技术逐步融入企业日常各个方面,信息系统对企业日常工作的支撑作用愈发凸显,企业内部各信息系统的集成应用、信息共享、安全保障已成为企业信息化建设工作的重点和难点.为了更好地体现企业信息化建设工作的成效,企业需要重新构建和升级身份与访问管理体系.ID.LINK全栈式身份与访问管理解决方案以现代化可扩展架构为基础,以统一身份图谱、ABAC模型和低代码身份开发平台为核心技术,致力于为政企客户提供面向新技术应用场景的基础设施级访问控制平台.ID.LINK全栈式身份与访问管理产品主要功能应用场景包括统一身份认证、用户生命周期管理、终端身份认证和敏感数据访问控制.关键词全栈式;统一身份图谱;ABAC;身份与访问管理;统一身份认证;用户生命周期

关键词: 全栈式, 统一身份图谱, ABAC, 身份与访问管理, 统一身份认证, 用户生命周期

Abstract: As the modern information technology has been gradually integrated into all aspects of the enterprise, the supporting role of the information system in the daily work of the enterprise is becoming more and more prominent. The integrated application, information sharing and security of the information system within the enterprise have become the focuses and difficulties of the enterprise informatization construction work. In order to better reflect the effect of enterprise informatization construction work, enterprises need to rebuild and upgrade the identity and access management system. Based on modern scalable architecture, with unified identity map, ABAC model and lowcode identity development platform as the core technologies, ID.LINK fullstack identity and access management solution is dedicated to providing government and enterprise customers with an infrastructurelevel access control platform for new technology application scenarios. The main functional application scenarios of ID.LINK fullstack identity and access management product include unified identity authentication, user lifecycle management, terminal identity authentication and sensitive data access control.Key words fullstack; unified identity map; ABAC; identity and access management; unified identity authentication; user lifecycle


Key words: full-stack, unified identity map, ABAC, identity and access management, unified identity authentication, user lifecycle