Figure 3 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.
Context in source publication
Context 1
... authentication system based on CAS cannot meet the needs of large concurrency and heavy load well. After exploration and practice, the high availability scheme for unified identity authentication system is designed as shown in Figure 3. The high availability design has two key points. ...