ECTS credits: 5
Lectures: 2
Exercises: 1

Course objective:

Students shall gain knowledge in the area of identifying and authenticating users of information systems.

Course contents:

Introduction. Types and models of authorization: register and password, fingerprint, eye scanning, etc. Protocols for authorization (Kerberos). Authorization of access to network resources. RADIUS server. LDAP. Central key distribution (KDC). Authentication. Active Directory infrastructure, implementation and administration. AAA on network equipment and DBMS systems. Integration of AAA.


Student shall gain knowledge and skills needed for planning, creating and maintaining the system for authorizing and authenticating users. Practical skills in managing RADIUS and LDAP servers. Skills in using the AAA service when making software applications.

Learning outcomes:

Having passed the exam, the student will be able to: 1. Determine security risks when designing information systems. 2. Compare advantages and disadvantages of all user authorization models. 3. Self-evaluate the suitability of Kerberos protocol for the authorization in an information system. 4. Plan the implementation of user authorization and authentication system. 5. Integrate various services into the security infrastructure of the information systemIntegrate. The mentioned learning outcomes contribute to learning outcomes of the study programme: - Propose solutions to engineering problems in the profession (4). - Propose improvements in data security and system security (8). - Analyze the influence of the IS characteristic on its performance and security (9).