7
Isaeva Maria V.
Russian Technological University MIREA
Kiprina Lyudmila Yu.
Kostroma State University
Semenov Nikita M.
Kostroma State University
Identification of usersin the informationmanagementsystem for project-based educationalintensivestudents
Isaeva M. V., Kiprina L. Yu., Semenov N. M. Identification of usersin the informationmana-gementsystem for project-based educationalintensivestudents. Technologies & Quality. 2026. No 1(71). P. 40–47. (In Russ.) https://doi.org/ 10.34216/2587-6147-2026-1-71-40-47.
DOI: https://doi.org/10.34216/2587-6147-2026-1-71-40-47
УДК: 004.4
EDN: JJRQDS
Publish date: 2026-02-09
Annotation: The article is devoted to the design and implementation of the subsystem of identification and access control in the information management system of design and educational intensive students. The JSON Web Tokens technology has been chosen as the basic authentication mechanism, which ensures secure data transfer without the need to store session status on the server, which complies with the principles of a RESTful architecture and increases the scalability of the system. The paper describes in detail the logic of the module, including the authentication process on the client side using RTK Query. Special attention is paid to the role-based access control model implemented within the system. The concept of the user’s “current role” has been introduced, which allows for the correct handling of scenarios with multiple roles, for which a special permission class has been developed in the Django REST Framework.
Keywords: identification, authentication, authorization, JSON Web Tokens (JWT), RBAC, Django REST Framework, RTK Query, accesscontrol, educationalintensive courses
Literature list: 1. Puzanova Zh. V., Kostrikin E. G. Project-based approach in teaching: University practice. Vestnik Rossijskogo universiteta druzhby narodov. Seriya: Sociologiya [Bulletin of the Peoples' Friendship University of Russia. Series: Sociology]. 2025;25(3):652–664. (In Russ.) 2. Donskaya E.Yu. Application of project-based learning in higher education. Mir nauki. Pedagogika i psihologiya [World of Science. Pedagogy and psychology]. 2023;11(3). URL: https://mir-nauki.com/PDF/13PDMN323.pdf. (accessed 12.01.2026). (In Russ.) 3. Abramova E. A. Application of the project approach in the implementation of the educational at the university. Sovremennye naukoyomkie tekhnologii. Regional'noe prilozhenie [Modern high-techtechnologies. Regional application]. 2022;2(70):39–46. URL: https://snt-isuct.ru/article/view/4573 (accessed 12.01.2026). (In Russ.) 4. Feoktistov I. V. Comparative study of authentication methods in information systems. Innovacii i investicii [Innovations and Investments]. 2023;7:193–198. (In Russ.) 5. Devitsyna S., Pilkevich P., Udod E. Ways to improve the security of servicesusing JWT-tokens. Ekonomika. Informatika [Economics. Computer Science]. 2023;50(1):144–151. (In Russ.) 6. Monakhov M., Uymin A. JSON Web Token infrastructure. Informatika, vychislitel'naya tekhnika i upravlenie. Seriya: Estestvennye i tekhnicheskie nauki [Security infrastructure. Series: Natural and Technical Sciences]. 2023;1:136–141. (In Russ.) 7. Betelin A. B., Egorychev I. B., Prilipko A. A., Prilipko G. A., Romanyuk S. G., Samborskiy D. V. Some features of JWT authentication in web applications. Trudy NIISI [Proceedings of the Scientific Research Institute of System Analisis of the Russian Academy of Sciences]. 2021;11,1:4–10. (In Russ.) 8. Bolshakov A. S., Dobryakov A. S., Tuktarov R. R. On the implementation of information security in distributed data storage system for small businesses. Inzhenernyj vestnik Dona [Engineering Bulletin of the Don]. 2025;2(122):374–397. URL: http://www.ivdon.ru/uploads/article/pdf/IVD_54N12y24_Bolshakov. pdf_16c0147d0c.pdf (accessed 12.01.2026). (In Russ.) 9. RFC 7519. JSON Web Token (JWT). URL: https://datatracker.ietf.org/doc/html/rfc7519 (accessed 12.01.2026). 10. Role Based Access Control. URL: https://csrc.nist.gov/projects/role-based-access-control (accessed 15.01.2026). 11. Davydov D. Standards of a role-based approachtoaccessmanagement. Cleverics.ru. Digital Enterprise, web site. URL:https://cleverics.ru/digital/2015/10/incits-rbac-standards (accessed 15.01.2026)* 9 (In Russ.) 12. Kornienko S. V., Protasov M. S. Implementation of the role-based access control model (mutually exclusive roles model) at higher education institution. Intellektual’nye tekhnologii na transporte [Intelligent technologies in transport]. 2025;4(44):5–16. (In Russ.)
Author's info: Isaeva Maria V.,Russian Technological University MIREA, Moscow, Russia, mary_is@rambler.ru; https://orcid.org/0000-0002-0714-4424
Co-author's info: Kiprina Lyudmila Yu., Kostroma State University, Kostroma, Russia, lskipr@gmail.com; https://orcid.org/0000-0002-0629-7699
Co-author's info: Semenov Nikita M., Kostroma State University, Kostroma, Russia, semenovknikita@gmail.com; https://orcid.org/0009-0003-5175-876X