Research and practice about the identity authentication technology

Keywords: identity authentication; Single sign-on model; Kerberos authentication Abstract. During the rapid development of the network, this is very important that the system is security.we should will be thinking about the problem ,it is the system's first line of security . How do we protect and build it?In this paper, we introduce about Kerberos authentication and certification process; At the same time we introduce the Cookie technology and LDAP directory service methods. At last ,We have been established a unified identity authentication ,it is single sign-on model. we will rely on the model. During the running of the system,I t will be ensured the safety and reliability. Preface Today,the variety of application service about network is very wide.we can see at any time in our life. It is used to identify the identity authentication in Network application system. The different identity of the user authorization has different operation, Users need to remember a lot of user name and password,but the Password is easy to forget. The system is not convenient to manage user's data, it will be caused data inconsistencies in the database.It will be established a centralized identity authentication module in the application system for identity authentication, As long as the user authentication is right, the user's operation is very convenient,it is very easy switching between subsystems in the portal. Users do not need to remember the login name and password, the management about network resources is unified and centralized. The operation mechanism and environment of colleges and universities is very especially, With the rapid development of university informatization construction pace, we must establish and improve in the unified identity authentication system, it will be unified management about the function of centralized management.