History
• Arabit company has was established in April 2020.
• The company was achieved 1st level (top level) of knowledge-based certificate in September 2020.
• Development of JAME software product line began in 2010 and after using it in two major companies, its copyright was transferred to Arabit company in 2020.
Activity
• Main fields of activity of company are research, design, development, procurement, maintenance, consulting, learning, technology transfer, purchase, sell, export, import and deployment of software, hardware and network appliances.
• Two main products of company are: 1. Shenasar as central identification and authentication platform and 2. JAME as software product line to facilitate web applications development.
Services
1. Shenasar: as central identification, authentication, authorization and accounting platform which its main features are the
followings: (https://arabit.ir/assets/Shenasar_en.pdf)
- Using AI in Face Recognition: Artificial intelligence (deep
learning) helps matching base picture (for instance, national
card picture) with current face picture. Deep learning supports
to learning the system to increase its accuracy incrementally.
- Liveness Detection: Liveness detection helps to avoid detecting predefined pictures in system and making sure target person is in front the live camera.
- Digital Signature Support: Digital signature is a secure way to
identify user. In various operations including critical financial of
legal services, digital signature can be generated and verified
(using USB or mobile tokens)
- Single Sign On: Single sign on is a major requirement in most
web, mobile or desktop applications which its state-of-the-art
protocols are OAuth2 and OpenID Connect. Using these protocols identification can be done in a standard way in any platform and programing language.
- Single Log Out: Enabling single log out means by logging
out from one application (module), user will be log out from
other applications and there is no need to log out from every
ARABIT
(ANDISHEH RAYAN BITA)
application.
- Authentication Delegation: Authentication delegation is applicable when users are predefined in a specific structure. Authentication delegation can be done based on Active Directory,
LDAP or web services.
- Access Control Based on Roles and Permissions: Role-based
access control (RBAC) is a common way control access. Moreover, defining fine-grain permissions in permissions tree helps to
apply authorization at each desired level.
- Users Management Directly or via Organizational Posts: Assigning roles to users can be done directly or via organizational
posts (corresponding to positions in organizations). By assigning roles to posts, after job rotations in organizations/companies, it is just needed to assign/revoke posts to users.
- Password Policy: There are some policies in defining user passwords such as complexity (using lowercase letter, uppercase
letter, number and special characters), preventing previous
passwords selection, forbidding common keywords (dictionary
attack prevention) and forcing periodic password change.
- State-of-the-art Technical Features: Responsive User Interface, REST Services, Supporting 6 Different Database, Running
in Various Operating Systems and Improving Performance using Caching, Clustering, …
2. JAME Software Product Line: JAME means Java(script) Application Manufacturing Environment and it consists of 7 main
modules:
- Frontend: Using Material as Design System, More Than 60
Predefined Components, Data Binding, I18N, Code Splitting,
Navigation and Error Handling based on React, TypeScript and
MUI (Material UI)
- Backend: Using REST, Database Exception Translation, File Uploading/Downloading, List Report & Print Generation, Auditing
(creating human-readable diff or representation logs based on
operations) based on Java, Spring Boot, Hibernate, Maven
- CI/CD: Code Quality Control, Automatic Release Management,
End2End (E2E) Test, Automatic Deployment, Docker Compatible using SonarQube, Jenkins, Selenium, Docker and Maven
- Code Generator: Creating Code Generation Model based on
Predefined Metamodel, Visual Model Editor, Generating Code
for Search, Creation, Editing, Display, Deletion, List Report, Print
and Access Control based on EMF and Eclipse M2T
- Dynamic Form: Creating Dynamic Search, Creation/Editing
and Display Forms by defining Related Table and Fields (Columns)
- Business Rule Management: Creating Business Rules, Categorize and Running Them in Applications based on Drools
- Microservice: Including API Gateway, Service Registry, Config
Server, Log Aggregation and Message Queue
