diplomsko delo
Nina Cerar (Author), Mira Trebar (Mentor), David Jelenc (Co-mentor)

Abstract

Upravljanje identitet in nadzora dostopa sta ključni komponenti spletnih aplikacij, ki zahtevajo preverjanje pristnosti končnih uporabnikov. V ta namen se v številnih rešitvah uporabljajo standardizirani protokoli, kot sta protokola OpenID Connect in OAuth 2.0. V odprtokodnem sistemu Keycloak, ki je namenjen upravljanju identitet in nadzora dostopa, so razvijalcu v pomoč njegove številne funkcionalnosti in komponente. Za prikaz njegove vpeljave v aplikacijo je razvita testna spletna aplikacija v javanskem programskem okolju Quarkus, na temo spletne knjigarne. Za prikaz delovanja aplikacije so narejene končne točke z različnimi metodami zahtev. Z njimi je prikazano delovanje sistema na podlagi vlog in atributov, na različnih primerih uporabe.

Keywords

upravljanje identitet;nadzor dostopa;sistem Keycloak;visokošolski strokovni študij;diplomske naloge;

Data

Language: Slovenian
Year of publishing:
Typology: 2.11 - Undergraduate Thesis
Organization: UL FRI - Faculty of Computer and Information Science
Publisher: [N. Cerar]
UDC: 004(043.2)
COBISS: 121502979 Link will open in a new window
Views: 27
Downloads: 8
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary title: Identity management and access control systems
Secondary abstract: Identity management and access control are key components of web applications that require end-user authentication. For this purpose, many solutions use standardized protocols such as the OpenID Connect and OAuth 2.0. One such solution is Keycloak, an open source identity management and access control system, that offers developers many functionalities and components. To demonstrate its implementation in the application, a test web application is developed in Java using the Quarkus framework, on the topic of an online bookstore. Endpoints are made using different request methods to demonstrate the application's performance. They are used to show the operation of the system based on roles and attributes, on different use cases.
Secondary keywords: identity management;access control;system Keycloak;computer science;diploma;Računalništvo;Univerzitetna in visokošolska dela;
Type (COBISS): Bachelor thesis/paper
Study programme: 1000470
Embargo end date (OpenAIRE): 1970-01-01
Thesis comment: Univ. v Ljubljani, Fak. za računalništvo in informatiko
Pages: 51 str.
ID: 16391553