IT122 - IAS2 Project Description
IT122 - IAS2 Project Description
Project Title: Secure Authentication and Authorization System Implementation for the <capstone title>
Description: The goal of this project is to design and implement a robust and secure authentication and
authorization system for the software application that your group being developed for Capstone
Project. The authentication system should ensure that only authorized users can access the
application and perform specific actions based on their roles and permissions. <this could be
adjusted depending on your goal on security – as we have discussed before>
D2: Source code implementation of the authentication and authorization system integrated into
their software application.
▪ Folder Structure: Overview of the folder structure and organization of the source code.
▪ Authentication Module: Implementation of the authentication process, including user
registration, login, and password recovery functionality.
▪ Authorization Module: Implementation of the access control mechanisms, including
defining roles and permissions, and enforcing authorization rules.
▪ Secure Session Management: Implementation of techniques to ensure secure session
management, such as using secure session tokens and session expiration mechanisms.
▪ Security Libraries and Frameworks: Documentation of any external libraries or frameworks
used to enhance the security of the system.
D3: User documentation on how to use and manage the authentication and authorization
features.
▪ User Guide: Step-by-step instructions on how to use the authentication and authorization
features of the software application.
▪ User Management: Explanation of how users can register, log in, manage their passwords,
and update their profile information.
▪ Role Management: Instructions on how administrators can define roles, assign
permissions, and manage user access.
▪ Best Practices: Recommendations for users to follow best practices for password security
and account protection.
D4: Test cases and test results demonstrating the effectiveness and security of the
implemented system.
▪ Test Cases: Comprehensive list of test cases covering different scenarios related to
authentication, authorization, and session management.
▪ Test Results: Documentation of the test results, including any issues encountered and their
resolutions.
▪ Security Assessment: Evaluation of the security measures implemented, including
vulnerability assessments.
Submission guidelines
▪ Each group will be sent a link to their own Google Drive folder where the deliverables are submitted
▪ Format:
Font size (body): 12
Font size (page number): 11 – top right
Margins: Left – 1.5”, Right – 1”, Top – 1”, Bottom – 1”
Paper size: letter (short)
▪ Files to submit: