Campus Network Information Security Solution
Background Introduction
Education is the future of a nation and successful education is the greatest success of a nation. Information Technology ineducation industry is not only an important part in national economy and society informatization, but also is a key link in the overall development of education.
Current situation
With the in-depth development of campus networkconstruction, a large number of network system have been built providingservices to teachers and students, for instance: teachers can log in to thesystem with their all-purpose card, which stores the salary information andproject fund declared, etc. In addition, teachers can use the system to markthe test papers while students can user the system to select courses. Each system corresponds to a specific user group and the universities are all challenged by integration of their application systems. The network managementdepartments are trapped in troubles of the complexity and network applications. In order to realize centralized management and to eliminate “Information Island”, and to improve the maneuverability of such systems, a unified identity authentication system is indispensable.
Description of Longmai Solution
Unified identityauthentication system is an important foundation for Information Technology application in schools. It is far more than solutions of user password. As abasic facility in Information Technology applications in schools, it has been attached increasing importance. The construction and development of role classification based uniform user authentication and management system helps tochange the loose and isolated management of IT service systems at present, so as to establish a unified and reusable user authentication and management system, which will become an important foundation for IT system application in schools.
Longmai User Authentication system adopts powerful two-factor authentication technologiesand supports a large variety of authentication terminals (such as hardware USB TOKENs). In addition, it provides the corresponding APIs and SDK, securing its integration in the application systems in the campus network. After the system is completed, the internal systems can both provide security services of userauthentication and the individual users holding a USB token will be able to accessall applications on the network platform simply by using a unified user authentication product.