• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2008, Vol. 30 ›› Issue (5): 26-28.

• 论文 • Previous Articles     Next Articles

  

  • Online:2008-05-01 Published:2010-05-19

Abstract:

As for the illegal access threats from the Intranet during the enterprise IT management, the paper gives a scheme of realizing legal access authentica  tion and management , which combines the 802. 1x protocol and the Active Directory. Then,we give a specific case analysis to expatiate on the unified au  thentication process and merits of the Windows domain and 802. 1x.

Key words: 802. lx protocol, user authentication, Active Diretory, intranet security