Authentication Systems Analysis, Planning, and Design

Description

Customers and employees often have several accounts with their own usernames and passwords that they have to remember, and creating more accounts with their own specific credentials only add to the already unnecessary hindrance of service adoption - why not use an existing service? 

Our Authentication Systems Analysis, Planning, and Design service allows our teams to work together in order to identify your needs and determine the best approach and authentication system based on your specific needs and expectations. Below you will find two great examples of authentication systems and services to help better understand the types of systems that are available to you.

  1. OAuth - Facebook, Google, and several other social media platforms can verify, and provide information about, your users
  2. LDAP and Active Directory - Single authentication systems that combine several accounts and their respective credentials into a single username and password

Why It’s Valuable and How It’s Beneficial

Using a single authentication end point reduces management costs, plain and simple. With a single authentication end point, your IT professionals no longer have to go through multiple systems to manage access permission and keep user information up to date.

What You Purchase and Receive

The Authentication Systems Analysis, Planning, and Design service provides our clients with all of the following fully completed designs, plans, and reports.

  1. Analysis and verification of existing, available authentication services to determine their compatibility and integrability, which comprises the following:
    1. SWOT Analysis: Also known as a SWOT matrix, a SWOT is a structured planning method used to evaluate the strengths, weaknesses, opportunities, and threats involved in a project or business venture.
  2. Complete specification and outline of service implementation and integration for client-selected authentication service, which comprises the following:
    1. Software Requirements Specification (SRS): Documentation of the essential requirements, such as functions, performance, design constraints, and attributes, of the software. The software requirements are derived from the system specification.
    2. Software Design Description (SDD): A representation of software created to facilitate analysis, planning, implementation, and decision making. The software design description is used as a medium for communicating software design information, and may be thought of as a blueprint or model of the system.
    3. Interface Requirements Specification (IRS): Documentation that specifies requirements for interfaces between systems or components. These requirements include constrains on formats and timing.
    4. Interface Design Description (IDD): Documentation that describes the architecture and design of interfaces between system and components. These descriptions may include control algorithms, protocols, data contents and formats, and performance metrics.
    5. Software Project Management Plan (SPMP): A plan containing the policies, procedures, and work instructions for managing a software development project that defines the technical and managerial processes necessary to develop work products that satisfy the product requirements.

How Much It Will Cost

The cost of our Authentication Systems Analysis, Planning, and Design service is determined based on your deadlines and expectations, and the amount of time and effort necessary to provide the deliverables guaranteed by our service level expectations.This service may be provided against a consulting retainer as well, where Black Box will provide any requested services up to a purchased number of hours - especially useful when your budget is as tight as your time line.

How We Will Work Together

All research materials, information, and documentation will be maintained, compiled, and stored by Programming and Application Services, and directly accessible over secure channels or through Black Box secure systems. Private Black Box accounts are created and assigned to our clients as soon as work begins, providing them with limited access to information and documentation related to ongoing design and development requiring client feedback or input.

Portfolio Showcase

The UGA at Oxford Study Abroad Program has been in existence for over twenty-five years. One of the most successful programs on campus, the program is a big reason that the University of Georgia has risen to rank in the top twenty in the nation for University student participation in study abroad programs.