logo

Strong Authentication and Authorization

4 Pages803 Words52 Views
   

Added on  2020-03-28

Strong Authentication and Authorization

   Added on 2020-03-28

ShareRelated Documents
Running head: Strong authentication and authorization1Strong authentication and authorizationNameAffiliated Institution
Strong Authentication and Authorization_1
Running head: Strong authentication and authorization2Strong authentication and authorizationWhen a system is proposed that requires strong authentication and authorization then multi-tierclient server architecture is most preferred and effective. In this model handling of application isdone at the client and functions data management is done at the server. Management of data isperformed right-on and thus, interaction handling between application processing and the clientsis not necessary. In multi-tier architecture application modules are separated and subdivided intoseveral tiers depending on their functionalities. Every tier basically executes on differentsystems. This offers distribution and, therefore, doing away with the disadvantage of single pointfailure. As compared to single or two-tier, security of applications and data is higher in multi-tierarchitecture (Helmer, Poulovassilis, & Xhafa, 2011).Single point of failures is eliminated in the application. Utilization of load balancer in thedistribution of traffic across several web servers’ aids in removal of single point failure. Provideshigh level security: deployment of many tiers assists in enhancing data and application security.Attackers are limited by the absence of point of failures, therefore, their ability to take controlover data and applications have been narrowed. The possibility of clients interacting withunauthorized data has been greatly reduced as clients don’t to access the database directly. Diverse networks have distinctive security needs which limits how an end user interacts with theserver. For instance, if an end user is connected to the internet, their communication with theservers is regulated by a firewall. The existence of a firewall that is not under the manipulation ofa client restricts the selection of the protocols to use. several firewalls are set up to enable HTTP(hypertext transfer protocol) to go through them and not IIOP (internet inter-orb protocol).(Singh, 2011).Authentication is also influenced by security requirements. Authentication of users if a client andserver are within similar security domain like an intranet of company as compared where theyare on different domains like over the internet which requires more sophisticated scheme forlogging in (Vogel, Arnold, Chughtai, & Kehrer, 2011).According to Qian (2010),functionality of the multi-tier Architecture is considered unique as itis subdivided into 3 logical modules including; application, business and data services. Theselogical modules can be mapped into three or several physical nodules.
Strong Authentication and Authorization_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Restaurant Web Application Development
|8
|1593
|56

Client-Server Architecture and TCP Byte Transition Protocol
|17
|3120
|66

System Design and Analysis
|14
|2290
|45

System Analysis and Design
|17
|3255
|302

Restaurant Details n-tier web application
|9
|1632
|39

System Architecture and Security Requirements
|7
|751
|78