Identity Authentication and Data Access Authorization in Regional Education Informatization
During the procedure of the Region-informatization, there are encountered different types of challenges. Playing the key roles in the construction mechanism, Governments, Universities, and enterprises are building their own information systems that are unable to be interoperable because of lacking interconnection standard. So these systems’ effective data-sharing mechanism poses to be a major point of concern. In this paper, from the top design of informatization eco-system, we are going to conduct discussion on the roles played by these participants in addition to the mechanism which these participants’ system is to interconnect, so that we could enhance the development of Region-informatization. We consider the Authentication System built in Shanghai Education as an illustration together with showing the process, design, implementation and the current situation comprehensively. The new approaches in this paper is to provide a fusion scheme of Oauth2 and Shibboleth, which combines the advantages of both. And in the maintenance on federation, provide some methods and practices to improve service level
Zhou Z.J. etal., 2007. Research on classification and sharing mechanism of educational information resources [J]. E-education Research,2007(10)
Yin R.,2007. Research on the construction and sharing mechanism of regional basic educational information resources [J]. China Educational Technology, 2007(9)
Xiong C.P etal.,2010. Study on the development and application of educational information resources "regional co construction and sharing" [J]. Open Education Research,2010(01)
Liu Y.Q.,2013. Mode and operation management of foreign high education information resources sharing [J]. Library & Information,2013(02)
Zhang X. & Zhang L.G.,2011. Construction of Regional Sharing Model of information education resources [J]. China Medical Education Technology,2011(02)
Yu S.Q & Zhao X.L.,2009. Education informatization based on Information Ecology [J]. China Educational Technology,2009(08)
Feng Q.,2015. The concept of maintenance service products based on cross certification [J]. Journal of East China Normal University,2015(S1)
Ge J.M.,2011. Research and implementation of wireless access method based on Cross Authentication [D]Shanghai,Shanghai Jiao Tong University School of Software,2011
Wiki.shibboleth.net. (2017). Home - Shibboleth 2 - Shibboleth Wiki. [online] Available at: https://wiki.shibboleth.net/confluence/display/SHIB2/Home [Accessed 16 Apr. 2017].
Identity Assurance Assessment Framework.[online] Available at: http://www.incommon.org/docs/assurance/IAAF.pdf
- There are currently no refbacks.