Implementasi Autentikasi dan Otorisasi pada Sistem Informasi Berbasis Web

Authors

  • Evan Adicandra Politeknik Negeri Padang
  • Yulindon Yulindon Politeknik Negeri Padang
  • Ratna Dewi Politeknik Negeri Padang
  • Silfia Rifka Politeknik Negeri Padang

DOI:

https://doi.org/10.61722/jipm.v4i2.2273

Keywords:

authentication, authorization, web security, information systems, role-based access control (RBAC)

Abstract

The rapid development of web-based information systems demands security mechanisms capable of protecting data and effectively controlling user access. One of the main problems that often occurs is a weak authentication and authorization system, potentially leading to unauthorized access and data leaks. This research aims to design a security system model based on authentication and authorization for web-based information systems.The method used is a system design research approach, which includes requirements analysis, formulation of design principles, system architecture design, and development of authentication and authorization flows. The proposed system model applies the Role-Based Access Control (RBAC) concept to manage access rights, and hashing techniques to secure user passwords.The results show that the designed model can improve system security by separating authentication and authorization processes, limiting user access based on roles, and protecting login data from potential leaks. Furthermore, the use of session management on the backend helps maintain the stability of user access while interacting with the system.Thus, the proposed model can be a solution in improving the security of web-based information systems and can be used as a basis for developing a system that is more secure, structured, and easy to implement.

References

Bucko, A., Vishi, K., Krasniqi, B., & Rexha, B. (2023). Enhancing JWT authentication and authorization in web applications based on user behavior history. Computers, 12(4), 78.

Trnka, M., Abdelfattah, A. S., Shrestha, A., Coffey, M., & Cerny, T. (2022). Systematic review of authentication and authorization advancements for the internet of things. Sensors, 22(4), 1361.

Bast, C., & Yeh, K. H. (2024). Emerging authentication technologies for zero trust on the internet of things. Symmetry, 16(8), 993.

Ayyagari, A., Jain, S., & Aggarwal, A. (2023). Innovations in multi-factor authentication: Exploring OAuth for enhanced security. Innovative Research Thoughts, 9(4), 254–267.

Dalimunthe, S., Putra, E. H., & Ridha, M. A. F. (2023). RESTful API security using JSON web token (JWT) with HMAC-SHA512 algorithm. IT Journal Research and Development, 8(1), 81–94.

Alzahrani, B. A., (2023). Secure Authentication and Authorization for Web Applications Using Token-Based Mechanisms.

Applied Sciences, 13(10), 6142.

Downloads

Published

2026-04-11

How to Cite

Evan Adicandra, Yulindon Yulindon, Ratna Dewi, & Silfia Rifka. (2026). Implementasi Autentikasi dan Otorisasi pada Sistem Informasi Berbasis Web. JURNAL ILMIAH PENELITIAN MAHASISWA, 4(2), 289–298. https://doi.org/10.61722/jipm.v4i2.2273