KURŞUN E. (Executive), ARPACIK Ö., KARAMAN S., YAĞANOĞLU M., BAŞCI M. B., NALKIRAN K., et al.
Project Supported by Higher Education Institutions, 2020 - 2021
Nowadays, with the development of technology, information systems are used for
various purposes in different fields. Various services are provided to staff and students with a
total of 47 information systems such as Student Information System, University Information
Management System, Alumni Information System, and Course Information System at Atatürk
University, Integration of systems is required in order to monitor the performance of these
systems, to provide easy access, to highlight visibility and to minimize risk. Within the scope
of this need, the focus is on developing an authentication method with the lowest risk factor
and highest performance at a single control point and creating a model with a singularized data
architecture with a common database infrastructure. In this context, it is aimed to increase the
quality of the services offered and to reduce the costs and risks with the system developed.
Almost all electronic services carry out identity verification using different methods.
For this reason, a comprehensive method has been developed that can serve a general purpose.
The NodeJS application language and the Cassandra database have been chosen for this method
to be of high performance and standards that today's services can easily access. In addition, the
user has been verified by querying the UUID cookie value, which is a global variable on the
browser, to the SSO service over the standard GET query of the services, and these services
and operations have been developed to serve all browsers and hardware.
While 27 external systems including e-Government were integrated at the beginning of
the project, this number increased to 47 with the completion of the project. In addition, in order
to determine the primary source for each data to be made at this stage, code matching tables
between systems and a protocol for communication have been prepared. In the next stage,
within the scope of the protocol from the subsystems; report design, development and testing
have been done. Finally, all of the common data was extracted, and it was aimed to get these
data from the primary source and to make repeated data system load analysis and it was
completed. According to the results of the analysis, a single point reading and writing process
was made, and the project was completed by developing a repetitive data trigger and cleaner
application