Assuming the user registration is a single page, depending on the expertise of your developers, it will take (approximately)...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
one developer between a week and a month to build a registrations system. If the system is built in Java, the developer should be skilled in HTML and JSP, and have Java or .NET experience. If the system is designed in object-oriented (OO) languages like Java and .NET, it would be beneficial to have OO design skills.
Since the form will have to call your database for verification purposes, the code that sits on your application server will need code to connect to -- and read from -- those back-end databases. Both Java and .NET are capable of this, and any language proficient developer shouldn't have trouble writing this code.
At a bare minimum, the form should have enough data to verify legitimate users and prevent insider threats or hacker attempts. For example, include the following data in your form:
- The employee's full first and last name and title.
- The employee's phone number.
- An internal ID number for the employee other than their Social Security Number.
- The name of the employee's department.
- The location of the employee – cube number or some internal building address.
- The name of the employee's supervisor.
This list is far from exhaustive and is merely a preliminary guideline to help you get started.
Remember, all forms should contain code that logs and time stamps all submissions for auditing later, in case of hacking attempts or other intentional misuse.
Finally, be sure to add code that validates completion of the form, or that the user isn't entering malicious information. Forms with blank fields or with nonsensical entries should be discarded. Most importantly, forms should log all hacking attempts to prevent tampering – whether by employees or outsiders – up to no good.
Dig Deeper on Privileged access management
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.