Single sign on approaches

NTUH is a large enterprise having the ramifications of roles and access permissions. For

growing diversity, complexities of acute hospital care, it is particularly difficult to achieve,

predict clearly mapping medical providers into roles or assigning access permissions,

privileges to roles in healthcare environments. Initially, the hospital adopts the classical role

based access control mechanism to deal with users, roles, and associated access rights

(Barkley, 1997; 2004-Single). However, we encounter a dilemma: either few roles defined

inducing role expansion (Adamcik et al., 1986; Bullough, 1976) or a role per individual

resulting in role proliferation (Zhang, 2003; Woods, 2007). Therefore, to cope with the

conflicts, a NTUH employee is entitled a basic set of permissions, following the principle of

least privilege, according to his/her occupational territory. Additional access permissions,

authorities will be aggrandized on demand. In here, the access permissions are pre-defined

as web page access rights.

The SSOS scheme has been implemented as followings. For authentication, user’s employee

ID, SSN (Social Security Number), and current timestamp are utilized to randomly generate

the authentication access key. The key is utilized to authenticate among the NTUH

components to achieve the SSOS scheme as described in the previous section. For

authorization or access permissions, each HIS web page is assigned an identity, i.e., a web

36 Web Intelligence and Intelligent Agents

page ID; every user is correlated with a set of web pages. If a user does not have the

authority, the user can not access, execute the web pages. The user ID and his/her

associated web page IDs are stored and maintained in the HIS database. In addition, prefetched,

paired page ID & user ID can be cached in Win-Session Server in order to improve

the validation performance. The cached data are synchronized with HIS database on hourly

basis.

The architecture of Web-session Servers is developed, deployed under the.NET web

services environment. The Win-session Servers are implemented as daemons. All requests

received in the Web-session Servers are forwarded to the daemons and operated there,

including database interfaces.

Auth-WS is the core of the SSOS scheme for certifications. In the scheme, the Portal service

and HIS components are developed under Microsoft.Net technologies. Thus, these two

modules can communicate with Auth-WS directly. However, we design a COM component

to adopt, facilitate the communications between the Legacy HIS applications and the Auth-

WS. The communications between the Auth-WS and the Outsourcing Systems are achieved

via their APIs. The flows of the scheme are demonstrated in Figure 2 red arrows.

4.3 Portal design & implementation

In order to achieve the requirements, we design and enhance a new, dynamic portal for

NTUH. First, the portal integrates SSOS features. Secondly, we establish a hierarchical

architecture and classify function linkages into groups which will be described clearly later.

Therefore, the portal can provide intuitive and effective access. In addition, the portal site

needs to provide visualized menu selections. The independent function linkages (URL links)

are kept in files, i.e., configuration files. These files will be used for menu configuration and

generation dynamically.


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: