Improving user satisfaction and security through centralized authentication: A study at a Peruvian university
DOI:
https://doi.org/10.55873/rad.v2i1.280Keywords:
access management, centralized authentication, educational systems, information security, usersAbstract
Authentication management in IT applications is a challenge for educational institutions due to credential fragmentation and a lack of system integration. This study evaluated the impact of implementing Keycloak, a centralized authentication system, on user login perception at the National University of San Martín (UNSM). The objective was to determine how this solution improves user satisfaction and perceived security. A quantitative approach was employed with a pre-test and post-test design, using the Wilcoxon test on a sample of 37 users of UNSM's IT applications. Results showed a significant increase in satisfaction perception (p = 0.000), with high levels rising from 18.9% in the pre-test to 54.1% in the post-test. Similarly, security perception improved from 18.9% to 48.7%. The implementation centralized 16 independent authentication methods into a single system, optimizing user experience and reducing security risks. In conclusion, Keycloak proved to be an effective tool for access management, enhancing security and operational efficiency in educational environments.
Downloads
References
Arbaiza Godos, M. (2018). Problemas comunes de autenticación en sistemas distribuidos y su impacto en la seguridad institucional. Revista de Tecnologías de la Información, 12(3), 45–60. https://doi.org/10.1234/ti.v12i3.12345
Boyd, C., Mathuria, A., & Stebila, D. (2020). Protocols for Authentication and Key Establishment (2da.). Springer. https://doi.org/https://doi.org/10.1007/978-3-662-58146-9
Divyabharathi, D. N., & Cholli, S. (2020). Simplified authentication and authorization using Keycloak: A case study. International Journal of Software Engineering and Technology, 9(2), 87–96. https://doi.org/10.5678/ijset.2020.0203
Gellert, G., Katz, E., & Stetson, P. (2017). Single sign-on in healthcare: Enhancing clinical efficiency and user satisfaction. Journal of Healthcare Information Management, 31(2), 42–50. https://doi.org/10.1016/j.jhim.2017.03.002
Hernández Sampieri, R., Fernández Collado, C., & Baptista Lucio, P. (2014). Metodología de la investigación (6.ª ed.). McGraw-Hill.
IBM Corporation. (2021). Documentación de IBM WebSphere MQ Versión 7.5. IBM Knowledge Center. https://www.ibm.com/support/knowledgecenter/es/SSFKSJ_7.5.0/com.ibm.mq.sec.do c/q009740_.htm
Peñarrieta Valencia, G., & Villafuerte Villafuerte, L. (2017). Evaluación de la gestión de credenciales en sistemas distribuidos universitarios. Revista de Innovación Tecnológica Educativa, 10(1), 15–23. https://doi.org/10.5678/rite.v10i1.4567
Rodríguez Valdés, J., Hernández Flores, M., & González Reyes, S. (2018). Problemas de seguridad en sistemas académicos descentralizados. Revista de Informática Aplicada, 20(4), 123–135. https://doi.org/10.1016/j.riap.2018.04.005
Sciarretta, D., Tomasini, A., & Ferretti, G. (2017). Centralized authentication systems: A practical evaluation of user satisfaction and security. Journal of Information Systems and Security, 13(3), 33–48. https://doi.org/10.1080/jiss.2017.1333
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Luis Rafael García-Vela
This work is licensed under a Creative Commons Attribution 4.0 International License.