Implementasi Autentikasi dan Otorisasi pada Sistem Informasi Berbasis Web
DOI:
https://doi.org/10.61722/jipm.v4i2.2273Keywords:
authentication, authorization, web security, information systems, role-based access control (RBAC)Abstract
The rapid development of web-based information systems demands security mechanisms capable of protecting data and effectively controlling user access. One of the main problems that often occurs is a weak authentication and authorization system, potentially leading to unauthorized access and data leaks. This research aims to design a security system model based on authentication and authorization for web-based information systems.The method used is a system design research approach, which includes requirements analysis, formulation of design principles, system architecture design, and development of authentication and authorization flows. The proposed system model applies the Role-Based Access Control (RBAC) concept to manage access rights, and hashing techniques to secure user passwords.The results show that the designed model can improve system security by separating authentication and authorization processes, limiting user access based on roles, and protecting login data from potential leaks. Furthermore, the use of session management on the backend helps maintain the stability of user access while interacting with the system.Thus, the proposed model can be a solution in improving the security of web-based information systems and can be used as a basis for developing a system that is more secure, structured, and easy to implement.
References
Bucko, A., Vishi, K., Krasniqi, B., & Rexha, B. (2023). Enhancing JWT authentication and authorization in web applications based on user behavior history. Computers, 12(4), 78.
Trnka, M., Abdelfattah, A. S., Shrestha, A., Coffey, M., & Cerny, T. (2022). Systematic review of authentication and authorization advancements for the internet of things. Sensors, 22(4), 1361.
Bast, C., & Yeh, K. H. (2024). Emerging authentication technologies for zero trust on the internet of things. Symmetry, 16(8), 993.
Ayyagari, A., Jain, S., & Aggarwal, A. (2023). Innovations in multi-factor authentication: Exploring OAuth for enhanced security. Innovative Research Thoughts, 9(4), 254–267.
Dalimunthe, S., Putra, E. H., & Ridha, M. A. F. (2023). RESTful API security using JSON web token (JWT) with HMAC-SHA512 algorithm. IT Journal Research and Development, 8(1), 81–94.
Alzahrani, B. A., (2023). Secure Authentication and Authorization for Web Applications Using Token-Based Mechanisms.
Applied Sciences, 13(10), 6142.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 JURNAL ILMIAH PENELITIAN MAHASISWA

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.










