Om Patil
Om Patil
Micro-Project Proposal
3.0Project Methodology
a) Identify the core functionality and requirements for the user authentication system..
b) Design the system architecture and components of the authentication system.
c) Implement the system’s core features and functionality.
d) Ensure the system is working as expected and is secure.
e) Make the system live and accessible to users..
f) Provide documentation for end-users, developers, and administrators.
4.0 Action Plan (Sequence and time required for major activity)
Planned
Sr. Planned Name of
Details of activity Finish
No. Start Date Responsible
Date Team Member
Information Gathering and Topic
1 Om Patil
Finalization
Preparing Project Proposal Om Patil
2
and Approval
3 Implementing Project Om Patil
5.0 Resource Required (Major resources such as raw material, some machining facility,
software etc.
3 Operating systems
Book 1
Prof. D.J.Ugale
OSY-22415, Subject In-
chargeName and
Signature of Staff
Annexure –II
Micro-Project Report
1.0 Rationale:-
The **User Authentication System** micro-project is essential because it addresses a core functionality that
is fundamental to the security and usability of almost all modern web applications. By implementing this
system, developers gain hands-on experience in designing secure user authentication processes, including
password hashing, session management, and token-based authentication. It reinforces critical skills in both
**frontend and backend development**, offering practical knowledge in user data handling, database
management, and secure communication. Additionally, this project provides valuable exposure to
**cybersecurity best practices**, preparing developers to build more resilient applications and protect
sensitive user information from common vulnerabilities and attacks.
Chose a relational database for storing user credentials and session information..
Planned authentication flow and security measures (e.g., password hashing, JWT tokens)...
Implemented bcrypt for password hashing and JWT for session management.
Created users table for storing hashed passwords and other user data..
Deployed the frontend on platforms like Netlify and backend on Heroku or AWS...
Explanation :
• The development of the **User Authentication System** began with a clear
understanding of the core requirements, including user registration, login,
password recovery, and secure session management. The system was designed
with a **client-server architecture**, where the frontend (built with HTML, CSS,
and JavaScript) communicates with the backend (using **Node.js** and
**Express.js**) via RESTful APIs. User credentials were securely stored in a
**MySQL** (or **PostgreSQL**) database, with passwords hashed using
**bcrypt** and sessions managed through **JWT tokens**. Security was
prioritized throughout, including the use of input validation to prevent
vulnerabilities such as **SQL injection**, and ensuring session tokens were stored
securely using **HTTP-only cookies**.
• Once the frontend and backend were implemented, the system underwent
rigorous **unit and integration testing** to ensure functional correctness and
security. Testing tools like **Jest** and **Mocha** were used to verify user flows,
while **security testing** helped identify vulnerabilities like **XSS** and
**session hijacking**. After successful testing, the system was deployed to cloud
platforms such as **Heroku** for the backend and **Netlify** for the frontend,
with **SSL/TLS encryption** applied for secure communication. Comprehensive
documentation was created, covering the technical architecture, API details, and a
user guide. The system was maintained and enhanced post-deployment, with
features like **two-factor authentication (2FA)** and **OAuth integration**
added to improve security..
Advantages of User Authentication System
Enhanced Security
Scalable and Flexible
User-Friendly Interface
Support for Role-Based Access Control
Easy Deployment:
Future Enhancements:
Scalability
Efficient Session Management:
Comprehensive Security Testing
Maintenance and updates
Disadvantages of User Authentication System
Security Vulnerabilities :Even with advanced encryption and hashing mechanisms,
authentication systems can still be vulnerable to attacks such as brute-force attacks,
credential stuffing, or social engineering..
+-------------------------+
| User Requests Login |
+-------------------------+
|
v
+-------------------------+
| Enter Username & |
| Password |
+-------------------------+
|
v
+-------------------------+
| Validate Credentials | -----> Check username and password
+-------------------------+
|
+---------+---------+
| |
v v
+--------------------+ +---------------------+
| Valid Credentials | | Invalid Credentials |
| Generate Token | | Display Error |
| & Start Session | | Prompt to Retry |
+--------------------+ +---------------------+
| |
v v
+------------------------+ +-----------------------+
| Grant Access to System| | End (Retry/Exit) |
| (Login Successful) | +-----------------------+
+------------------------+ |
| |
v v
+-----------------------------+ +--------------------+
| Session Timeout/Expiry | | User Logs Out |
| Logout (End Session) | | (Manual Logout) |
+-----------------------------+ +--------------------+
|
v
+---------------------------+
| End (Exit System) |
+---------------------------+
5.0 Actual Methodology Followed
Planned
Sr. Planned Name of
Details of activity Finish
No. Start Responsible Team
Date
Date Member
Information Gathering and Topic
1 Om Patil
Finalization
Preparing Project Proposal Om Patil
2
and Approval
3 Implementing Project Om Patil
Sr.
Name of Resource/Material Specifications Qty. Remarks
No.
1 www.javatpoint.com Online website 1
3 Operating Systems
Book 1
Also, we got to know about finding average waiting time and averageturnaround for
Round Robin Scheduling Algorithtime each process executing in operating system.
Round Robin scheduling is an algorithm mainly used by operating systemsand
applications thatserve multiple clients that request to use resources.
Round-Robin is a useful tool for having your team generate ideas, without being influenced unduly by
others in the group. This method also used to ensures that everyone on your team gets an equal say in the
ideas that you generate. We can use either the written and verbal variations of this technique.
Annexure IV
Micro-Project Evaluation Sheet
Name of Student : Om Sharad Patil Enrollment No:23611470241 Name of
Programme : Computer Engineering Semester: Fifth
Course Title: operating systems Code: 22415
Title of the Micro-Project: User Authentication System
Course Outcomes Achieved:-
a) Install operating system and configure it. Not Addressed
(A) Process and Product Assessment (Convert above total marks out of 6 Marks)
1 Relevance to the course
Literature Review/
2
Information Collection
Completion of the
3
Targetas per
Project Proposal
Analysis of Data and
4
Representation
Quality of
5
Prototype/Model
6 Report Preparation
(B) Individual Presentation/Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Viva
(A) Process and Product Assessment (B) Individual Presentation/Viva Total Marks
(6 Marks) (4 Marks) (10 Marks)
Dated Signature: