论文部分内容阅读
清华得实的 WebST 是一个企业级的安全解决方案,提供包括身份认证、访问控制、数据保密性完整性、审计记录等一整套安全解决方案。基于角色的访问控制WebST 中的角色包括用户、用户组及其访问权限。定义安全策略时,角色定义可以根据职称、职务、部门等多种方式定义,可以灵活地反映安全管理的需求。访问控制机制可以预先定义和集中保存访问控制策略,然后根据应用对象选用不同的访问控制策略,也可以将某一部分的访问控制的管理进行授权委托,这一机制减轻了管理负担,加强了资源访问控制的一致性。对第三方授权服务的支持通过 K-BIT 标准,WebST 支持第三方授权服务。在WebST 的 ACL 权限中,有一项是“K”位,通过设置该位,WebST 各安全服务器将授权服务请求传递给指定的第三方授权服务器。
Tsinghua University’s proven WebST is an enterprise-level security solution that provides a complete suite of security solutions including authentication, access control, data privacy integrity, audit records, and more. Role-Based Access Control The roles in WebST include users, user groups, and their access. When defining the security policy, the definition of the role can be defined according to the title, position, department and other ways, which can flexibly reflect the requirements of security management. The access control mechanism can pre-define and centralize the access control policy, and then select different access control policies according to the application object. It can also entrust some parts of the access control management. This mechanism reduces the management burden and strengthens the resource access Control of consistency. Support for Third Party Authorized Services Through the K-BIT standard, WebST supports third party authorized services. One of the WebST ACL permissions is the “K” bit, by which each WebST Security Server passes the authorization service request to the designated third-party authorization server.