RIVIER CS 608 - Hierarchical Authentication System- Design Specification

Unformatted text preview:

IntroductionProduct OverviewPurpose and Scope of DocumentDefinitionsRelated DocumentsProduct Requirements and Architectural ImplicationsFunctional RequirementsHardware Requirements and Performance BudgetsExtensibility and Future ConsiderationsSystem ArchitectureSoftware ArchitectureHardware ArchitectureAvailability and ReliabilityDesign DescriptionDesign OverviewDesign RationaleDiagram of Interconnection of Principal ObjectsFunctional CapabilitiesNormal PathwaysError Detection and RecoveryPeak Load HandlingPerformance, Capacity and Control ConsiderationsInterfacesSupporting SubsystemsExternal InterfacesRelease SupportUpgrade and RollbackInstallationStartupShutdownHierarchical Authentication System Design SpecificationBy Authors:Bryson Hepler Tom IrelandVenkat KannanSamir KarandeAparna LaguOctober 14, 2002Release 1.0Revision HistoryDate Rev Description of Change Originator10-09-2002 Draft A,1 Initial version of draft Samir Karande10-12-2002 Draft A.2 Updated Sections Venkat Kannan10-12-2002 Draft A.3 Updated Spelling, added date, Added Names Tom Ireland10-12-2002 Draft A.5 Minor edit updates Bryson Hepler10-14-2002 Release1.0Updated with review comments, updated with links to related documentsSamir KarandeTable of ContentsIntroduction..........................................................................................................................3Introduction..........................................................................................................................3Product Overview............................................................................................................3Purpose and Scope of Document.....................................................................................3Definitions.......................................................................................................................3Related Documents..........................................................................................................3Product Requirements and Architectural Implications........................................................4Functional Requirements.................................................................................................4Hardware Requirements and Performance Budgets........................................................4Extensibility and Future Considerations..........................................................................4System Architecture.............................................................................................................5Software Architecture......................................................................................................6Hardware Architecture.....................................................................................................6Availability and Reliability..............................................................................................7Design Description..............................................................................................................8Design Overview.............................................................................................................8Design Rationale..............................................................................................................8Diagram of Interconnection of Principal Objects............................................................9Functional Capabilities......................................................................................................10Normal Pathways...........................................................................................................10Error Detection and Recovery.......................................................................................10Peak Load Handling......................................................................................................10Performance, Capacity and Control Considerations......................................................10Interfaces............................................................................................................................11Supporting Subsystems..................................................................................................11External Interfaces.........................................................................................................11Release Support.................................................................................................................12Upgrade and Rollback...................................................................................................12Installation.....................................................................................................................12Startup............................................................................................................................12Shutdown.......................................................................................................................12Table of FiguresFigure 1: Architecture for Web-based applications: Hierarchical Authentication System............................5Figure 2: Software Architecture...................................................................................................................6Figure 3: Protection Proxy: Conceptual protection offering........................................................................9Figure 4: Protection Proxy: More insight into implementation details.........................................................9IntroductionThis document describes the High Level Design of Hierarchical AuthenticationSystem.Product OverviewHierarchical Authentication System shall implement a authentication system inwhich users shall be granted access to the available information depending on theavailable access rights to the user. The authentication system shall implementdata encapsulation/security by protecting it from unauthorized access and shallalso provide privileged access to the users with the right set of accesspermissions.Purpose and Scope of DocumentThis document describes the architecture and high-level design of theHierarchical Authentication System. The document may be useful to architects,developers and project management.DefinitionsAcronym DefinitionClient Browser ApplicationWeb/Internet World Wide WebWeb Server A program that responds to Web RequestsUser A


View Full Document

RIVIER CS 608 - Hierarchical Authentication System- Design Specification

Download Hierarchical Authentication System- Design Specification
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Hierarchical Authentication System- Design Specification and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Hierarchical Authentication System- Design Specification 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?