Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

!PLEASE DO NOT TYPE THE PROGRAM, JUST SCREENSHOT IT FOR ME PLEASE! I NEED A JAVA PROGRAM FOR THE FOLLOWING... MD5 HASH: !PLEASE DO NOT

!PLEASE DO NOT TYPE THE PROGRAM, JUST SCREENSHOT IT FOR ME PLEASE! I NEED A JAVA PROGRAM FOR THE FOLLOWING...

image text in transcribed

MD5 HASH:

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

!PLEASE DO NOT TYPE THE PROGRAM, JUST SCREENSHOT IT FOR ME PLEASE!

Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized users. You have also been given three files, one for each role: zookeeper,veterinarian, and admin, Each role file describes the data the particular role should be authorized to access. Create an authentication system that does all of the following: Asks the user for a username Asks the user for a password . Converts the password using a message digest five (MDS5) hash o t is not required that you write the MDS from scratch. Use the code located in this document and follow the comments in it to perform this operation. . Checks the credentials against the valid credentials provided in the credentials file Use the hashed passwords in the second column; the third column contains the actual passwords for testing and the fourth row contains the role of each user o .Limits failed attempts to three before notifying the user and exiting the program Gives authenticated users access to the correct role file after successful authentication The system information stored in the role file should be displayed. For example, if a zookeeper's credentials is successfully authenticated, then the contents from the zookeeper file will be displayed. If an admin's credentials is successfully authenticated, then the contents from the admin file will be displayed o Allows a user to log out Stays on the credential screen until either a successful attempt has been made, three unsuccessful attempts have been made, or a user chooses to exit . Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized users. You have also been given three files, one for each role: zookeeper,veterinarian, and admin, Each role file describes the data the particular role should be authorized to access. Create an authentication system that does all of the following: Asks the user for a username Asks the user for a password . Converts the password using a message digest five (MDS5) hash o t is not required that you write the MDS from scratch. Use the code located in this document and follow the comments in it to perform this operation. . Checks the credentials against the valid credentials provided in the credentials file Use the hashed passwords in the second column; the third column contains the actual passwords for testing and the fourth row contains the role of each user o .Limits failed attempts to three before notifying the user and exiting the program Gives authenticated users access to the correct role file after successful authentication The system information stored in the role file should be displayed. For example, if a zookeeper's credentials is successfully authenticated, then the contents from the zookeeper file will be displayed. If an admin's credentials is successfully authenticated, then the contents from the admin file will be displayed o Allows a user to log out Stays on the credential screen until either a successful attempt has been made, three unsuccessful attempts have been made, or a user chooses to exit

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Databases Object Oriented Deductive Hypermedia Technologies

Authors: Kamran Parsaye, Mark Chignell, Setrag Khoshafian, Harry Wong

1st Edition

0471503452, 978-0471503453

More Books

Students also viewed these Databases questions