Single Sign-on Application Architecture and Design

Topics: World Wide Web, Internet, User Pages: 5 (1304 words) Published: April 15, 2006
Single Sign-on Application Architecture and Design
The subject matter of this paper is the integration of single sign-on based web architecture in place of the current design that provides multiple sites for company employees. Currently, employees wishing to access company related information are required to access approximately eight different websites and maintain records for different user names and passwords for each site. This paper will outline the design specifics that will be necessary for full integration and user functionality of the new web-based portal.

One of the initial design considerations when looking at this project was the overall network architecture that the new layout would require. Currently, users have the option to access seven of websites over a regular internet connection. The preferred browser that is used by users is Microsoft Internet Explorer. Users simply enter in the web URL and provide the required username and password when prompted. The other website is accessed via corporate VPN over a secured (https) internet connection. As with the other sites, the employees will be prompted for a username and password and then are granted access to the corporate intranet.

Since all facilities have active internet connections, the overall communications architecture is already in place for office users. As long as users are able to access a secured internet connection (https) then there should be no issue connecting to the VPN.

Once the new application architecture is implemented, employees will be required to run an internet browser (preferably IE6) with a minimum of 128-bit encryption. User will then browse to a secured URL through their web browser to establish a secure connection with the corporate VPN. This will require that each location's firewall be configured to pass all secured traffic over port 443. Once a secured connection is established, users will be prompted to login with either their username or clock number and their chosen password.

After successful authentication to the website, employees will be taken to the main graphical user interface. This interface is where the majority of user interaction will occur and intranet websites can be accessed. The layout will be composed of links to the eight websites to which users have access. Since authentication to the main corporate VPN has already taken place, each site will no longer require a separate username and password combination. Each website that the user browses to will host all information related to that site. Users will have the ease of returning to the main VPN homepage at anytime by clicking on the "home" tab that will be displayed on all pages. This will allow for easy navigation throughout all corporate intranet sites.

The web systems and sites will be hosted out of corporate headquarters and operate off clustered server suites running Microsoft IIS (Internet Information Services). A clustered environment will provide the fault tolerance and failover capabilities required to maintain product efficiency as well as provide the processing power required to handle large amounts of user activity simultaneously. According to, "…if one of the nodes in a cluster becomes unavailable as a result of failure or maintenance, another node immediately begins providing service, a process known as failover. Users who are accessing the service continue to access the service, and are unaware that it is now being provided from a different server (node)" (What's New in Clustering Technologies, 2004). This solution is necessary to maintain the projected uptime of near 99%. In addition, with redundant server capabilities, this will allow IT personnel to perform maintenance tasks on server related systems and applications with no noticeable impact on site users.

Single sign-on will be provided through a central authentication service (CAS) server located at corporate headquarters. This server is the main...

References: Newman, A. (2002). Its central authentication service
version 1.0)
Szorc, G. (2005). Retrieved Oct. 31, 2005, from Central
Authentication Service Web site:
What 's new in clustering technologies. (2004). Retrieved Oct. 31, 2005,
from Cluster Service (MSCS) Web site:
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Application Architecture & Process Design Essay
  • Application Architecture and Process Design:
  • Essay about Application Architecture and Process Design
  • Describe the Application Architecture and Process Design Essay
  • space design considerations for an architecture school Essay
  • Application Architecture Essay
  • Fundamentals of Application Architecture Essay

Become a StudyMode Member

Sign Up - It's Free