| With the progress and development of web technology, our way of life has undergone a tremendous change. Work, we use a variety of office automation system, to achieve the full use of information through the use of office automation system, improve work efficiency and quality of work, productivityâ€enhancing purpose. Life through social networking type site plus nearly exchanges between us and others; various types of transactions through eâ€commerce website. Web application system, user security authentication and rights management as an important part of the system is an integral part of a secure information system. It will not only be able to prevent unauthorized users access to the system but also to prevent unauthorized access to system resources.Currently, many webâ€based application system there are a lot of security vulnerabilities, such as the lack of a URL protection; authorized unreasonable or missing permissions should not have the permission of the owner was able to see; database unsafe certification information; personal information and sensitive data is easy to get or not encrypted; transport layer without SSL encryption. The above vulnerabilities give hackers can take advantage of the machine. A lot of software can be easily penetrated through the URL, SQL injection mode, ultra vires easily access to unauthorized data. Even system data to be modified, deleted, causing huge losses. Rights management module is a repeat of one of the relatively high rate of development modules in many companies in different applications, each application are required to meet their own permission management needs. Whether it is in the data storage, access permissions, there are many special authority control. Is hardâ€coded in the system, then encode this will shine into tightlyâ€coupled logic and business code. This will not only according to the developer into repetitive labor, maintenance personnel also need to maintain multiple sets of permissions management system; repeated maintenance and user management, organization management data, resulting in data consistency, and completeness can not be guaranteed; system integration more difficult, more difficult to achieve single sign difficult to build an enterprise portal.Of this thesis is to solve the above problem, build a universal, perfect, safe, easy to administer, portable, extensible permissions system, real rights management system become the center of authority control, really important aspects of play in the system security role. The system design process, this article focuses on the rights management module and other business module separation, to provide the support and expansion of some public methods to prevent the development so we repeat our system is able to easily integrate other business modules; rights management module manipulation menu permissions and data permissions separation. Such great flexibility in system configuration. In this paper, we through a web based j2ee framework to achieve a safe, universal rights management system platform. To implement user security authentication and rights management to consider the following aspects to realize the safety performance of the system. User security certification through the following:1) in the user registration process to ensure that the user’s password security check by user password length and complexity;2) password md5the encryption+salt value way to ensure safety;3) to ensure the security of user identity information during transmission through the security certificate authentication. User authorization, it manages which users can access which resources are even more read and write permissions to certain objects, in achieving user authorization, we can consider the following two points:1) menu permissions, the permissions menu we use roleâ€based access control (Roleâ€Based Access Control, RBAC) and extend the resource management part2) data permissions, which is similar to the windows or linux system privileges, such as the system can read and write their own data and information operations, and other loggedâ€on user can only read operation, neither write nor read permissions as the loggedâ€on user. System we choose J2EE standardsâ€based enterprise development platform, J2EE standard enterprise development platform is currently the most widely used enterpriseâ€class development platform, it has good portability, able to run on any operating system and hardware configuration; provide a lot of open source frameworks and middleware to simplify our development, allowing us to focus on the business logic of the above; powerful scalability and stability of our application system enables the use of load balancing, security and stability guaranteed. The system we use to a lot of openâ€source technology, using SSH (ie Spring+Struts2+Hibernate) classic framework combination. Through the combination of SSH framework can be a significant aspect of the liberation of our development work, we can put more time on the business implementation. There is a lot of repetitive work in the design and development process of the security authentication and rights management, human resource utilization is very low, many inherent advantages rights management module can not be fully tapped. We also need to continue inâ€depth discussion and exchanges based web application security authentication and rights management functions, for lack of an existing system, the introduction of Web services technology, web application system security certification and permission to authorize subdivided into reusable functional modules and encapsulated into Web services to build Webâ€based services, and easy integration of other business modules, web application security is of great significance and practical value. |