Sunteți pe pagina 1din 48

A

REPORT ON
“Employee Leave Management System”

A Report Submitted As A Partial Fulfillment Of The Requirement


For The Degree Of Bachelor Of Computer Application Under

Internal Guide Submitted By

Karabi Choudhury Vickey Singh

BCA Department BCA Department

Dispur College Dispur College

Roll No:

(Signature of the Guide) (Signature of the Student)

2
PREFACE

s are indispensible part of management education. They enlighten us with the


facts and provide us a valuable knowledge about the topic under the study. In
professional courses like BCA, we are familiar with strong theoretical
knowledge about various computer application objects through classroom
techniques. But this is such which makes us work on the area of our interest
or specialization and help us gain much valuable knowledge on the topic of
study.

I did my grand on the topic “” in order to make the date manner. Where ever
possible, tables and figures have been incorporated, recommendations have
been made on the basis of finding herein.

Vickey Singh
Course: BCA

Roll No:

Registration No:
Date:
Place:
BCA Department

3
CERTIFICATE OF ORIGINALITY FROM THE
GUIDE

This is to certify that the report entitled “Employee Leave Management


System”submitted to in partial fulfillment of the requirement for the award of
the BCA is an original work carried by Vickey Singh, Roll No:
, under the supervision of Karabi Choudhury, Head of the BCA
Department, Dispur College.

The matter embodied in this is a genuine work done by the student and has not
been submitted either to this University or to any other University/Institute for the
fulfillment of the requirement of any course of study.

External Examiner

(Signature of the Guide)

Karabi Choudhury

BCA Department

Dispur College

Date:

Place:

4
ACKNOWLEDGEMENT
I take this opportunity to thank all those persons, whose constant guidance,
support and help have appreciated me to see the face of the completion of
this . Preparing a is a tedious task and was fortunate enough to get support
from a large number of persons to whom, I shall always remain grateful.

I feel immense pleasure in expressing my sincere thanks and gratitude to


my guide by Karabi Choudhury of BCA Department for his valuable
guidance and constant encouragement throughout the entire work entitled
“” without which this study would have never been possible.

I also express my sincere thanks and gratitude to Dr. Amar Saikia, Principal
of Dispur College, for giving me the chance to complete my BCA under . I
am also thankful to Mrs. Bijoyata Saha and Mrs. Karabi Choudhury, Assistant
Professors of Dispur College, for their kind cooperation and help to
successfully complete my . At last I also express my thanks to all of my
friends who gave me the constant inspiration for fulfillment of my .

Vickey Singh

Course: BCA

Roll No:

Date: Registration No:

Place: BCA Department

5
SELF DECLARATION

I hereby declare that the entitled “Employee Leave Management


System” has been carried out by me and is submitted in the partial fulfillment
for the BCA in Dispur College under .

I also declare that, any or all contents incorporated in this dissertation, has not
been submitted in any form for the award of any other degree to any Institute or
University.

Vickey Singh

Course: BCA

Roll No:

Date: Registration No:

Place: BCA Department

6
TO WHOM IT MAY CONCERN

This is to certify that the entitled “” is bonfire work done by Vickey Singh of
th
BCA 6 Semester having
Roll No: and Registration No: of 2017-18.

In partial fulfillment of the requirement for the award of BCA and have been
carried out my direct supervision and guidance. This report or a similar report
on the topic have not been submitted for any other examination and does not
form part of any course undergone by the candidate.

Internal Guide

Karabi Choudhury

BCA Department

Dispur College

7
Contents

INTRODUCTION TO
SYSTEM ARCHITECTURE

TECHNICAL FEASIBILITY

OPERATIONAL FEASIBILITY

FUNCTIONAL REQUIREMENTS

SOFTWARE REQUIREMENTS

HARDWARE REQUIREMENTS

INTROUDCTION TO PHP

INTRODUCTION TO MYSQL

INTRODUCTION

DATA FLOW DIAGRAM

E-R DIAGRAMS

OUTPUT SCREENS

SYSTEM SECURITY

INTRODUCTION

SECURITY IN SOFTWARE

BIBLIOGRAPHY

8
9
INTERDUCTION

This is aimed at developing a web based Leave Management Tool, which is of importance to
either an organization or a college.

The is an Intranet based application that can be accessed throughout the organization or a
specified group/Dept. This system can be used to automate the workflow of leave
applications and their approvals. The periodic crediting of leave is also automated. There are
features like notifications, cancellation of leave, automatic approval of leave, report
generators etc in this Tool.

This is aimed at developing a web based Leave Management Tool, which is of importance to
either an organization or a college.

The Easy Leave is an Intranet based application that can be accessed throughout the
organization or a specified group/Dept. This system can be used to automate the workflow of
leave applications and their approvals. The periodic crediting of leave is also automated.
There are features like notifications, cancellation of leave, automatic approval of leave, report
generators etc in this Tool.

Functional components of the :

There are registered people in the system. Some are approvers. An approver can also be a
requestor. In an organization, the hierarchy could be Engineers/Managers/Business
Managers/Managing Director etc. In a college, it could be Lecturer/Professor/Head of the
Department/Dean/Principal etc.

Following is a list of functionalities of the system:

A person should be able to

login to the system through the first page of the application

change the password after logging into the system

see his/her eligibility details (like how many days of leave he/she is eligible for etc)

10
query the leave balance

see his/her leave history since the time he/she joined the company/college

apply for leave, specifying the from and to dates, reason for taking leave, address for
communication while on leave and his/her superior‟s email id

see his/her current leave applications and the leave applications that are submitted to
him/her for approval or cancellation

approve/reject the leave applications that are submitted to him/her

withdraw his/her leave application (which has not been approved yet)

Cancel his/her leave (which has been already approved). This will need to be
approved by his/her Superior

get help about the leave system on how to use the different features of the system

As soon as a leave application /cancellation request /withdrawal /approval /rejection


/password-change is made by the person, an automatic email should be sent to the person and
his superior giving details about the action

The number of days of leave (as per the assumed leave policy) should be automatically
credited to everybody and a notification regarding the same be sent to them automatically

An automatic leave-approval facility for leave applications which are older than 2 weeks
should be there. Notification about the automatic leave approval should be sent to the person
as well as his superior

1.1 EXISTING SYSTEM:

All Work are done manually.

Cannot Upload and Download the latest updates.

No use of Web Services and Remoting.

Risk of mismanagement and of data when the is under development. Less


Security.

11
No proper coordination between different Applications and Users.

Fewer Users - Friendly.

1.2 PROPOSED SYSTEM:

The development of the new system contains the following activities, which try to automate
the entire process keeping in view of the database integration approach.

User friendliness is provided in the application with various controls.

The system makes the overall management much easier and flexible.

Readily upload the latest updates, allows user to download the alerts by clicking the
URL.

There is no risk of data mismanagement at any level while the development is under
process.

12
SYSTEM ANLAYSIS

2.1 STUDY OF THE SYSTEM

To provide flexibility to the users, the interfaces have been developed that are accessible
through a browser. The GUI‟S at the top level have been categorized as

1. Administrative user interface


2. The operational or generic user interface

The „administrative user interface‟ concentrates on the consistent information that is


practically, part of the organizational activities and which needs proper authentication for the
data collection. These interfaces help the administrators with all the transactional states like
Data insertion, Data deletion and Date updation along with the extensive data search
capabilities.

The „operational or generic user interface‟ helps the end users of the system in transactions
through the existing data and required services. The operational user interface also helps the
ordinary users in managing their own information in a customized manner as per the included
flexibilities

2.2 INPUT & OUTPOUT REPRESENTETION

Input design is a part of overall system design. The main objective during the input design is
as given below:

To produce a cost-effective method of input.


To achieve the highest possible level of accuracy.
To ensure that the input is acceptable and understood by the user.

INPUT STAGES:

The main input stages can be listed as below:

Data recording
Data transcription
Data conversion

13
Data verification
Data control
Data transmission
Data validation
Data correction

INPUT TYPES:

It is necessary to determine the various types of inputs. Inputs can be categorized as follows:

External inputs, which are prime inputs for the system.


Internal inputs, which are user communications with the system.
Operational, which are computer department‟s communications to the system?
Interactive, which are inputs entered during a dialogue.

INPUT MEDIA:

At this stage choice has to be made about the input media. To conclude about the input media
consideration has to be given to;

Type of input
Flexibility of format
Speed
Accuracy
Verification methods
Rejection rates
Ease of correction
Storage and handling requirements
Security
Easy to use
Portability
Keeping in view the above description of the input types and input media, it can be said that
most of the inputs are of the form of internal and interactive. As

14
Input data is to be the directly keyed in by the user, the keyboard can be considered to be the
most suitable input device.

OUTPUT DESIGN:

In general are:

External Outputs whose destination is outside the organization.


Internal Outputs whose destination is with in organization and they are the User‟s
main interface with the computer. Outputs from computer systems are required
primarily to communicate the results of processing to users. They are
also used to provide a permanent copy of the results for later consultation. The
various types of outputs
Operational outputs whose use is purely with in the computer department.
Interface outputs, which involve the user in communicating directly with the
system.

OUTPUT DEFINITION

The outputs should be defined in terms of the following points:

Type of the output


Content of the output
Format of the output
Location of the output
Frequency of the output
Volume of the output
Sequence of the output

It is not always desirable to print or display data as it is held on a computer. It should be


decided as which form of the output is the most suitable.

For Example

Will decimal points need to be inserted

Should leading zeros be suppressed.

15
OUTPUT MEDIA:

In the next stage it is to be decided that which medium is the most appropriate for the output.
The main considerations when deciding about the output media are:

The suitability for the device to the particular application.


The need for a hard copy.
The response time required.
The location of the users
The software and hardware available.

Keeping in view the above description the is to have outputs mainly coming under the
category of internal outputs. The main outputs desired according to the requirement
specification are:

The outputs were needed to be generated as a hard copy and as well as queries to be viewed
on the screen. Keeping in view these outputs, the format for the output is taken from the
outputs, which are currently being obtained after manual processing. The standard printer is
to be used as output media for hard copies.

16
2.4 SYSTEM ARCHITECTURE

Architecture flow:

Below architecture diagram represents mainly flow of requests from users to database
through servers. In this scenario overall system is designed in three tires separately using
three layers called presentation layer, business logic layer and data link layer. This was
developed using 3-tire architecture.

17
FEASIBILITY STUDY

Preliminary investigation examines feasibility; the likelihood the system will be useful
to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All systems are feasible if they are given unlimited resources and infinite time. There
are aspects in the feasibility study portion of the preliminary investigation:

Technical Feasibility
Operation Feasibility
Economical Feasibility

3.1 TECHNICAL FEASIBILITY

The technical issue usually raised during the feasibility stage of the investigation
includes the following:

Does the necessary technology exist to do what is suggested?


Do the proposed equipments have the technical capacity to hold the data required to
use the new system?
Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
Can the system be upgraded if developed?
Are there technical guarantees of accuracy, reliability, ease of access and
data security?

3.2 OPERATIONAL FEASIBILITY


OPERATIONAL FEASIBILITY

User-friendly

Customer will use the forms for their various transactions i.e. for adding new routes,
viewing the routes details. Also the Customer wants the reports to view the various

18
transactions based on the constraints. Theses forms and reports are generated as user-
friendly to the Client.

Reliability

The package wills pick-up current transactions on line. Regarding the old transactions,
User will enter them in to the system.

Security

The web server and database server should be protected from hacking, virus etc

Portability

The application will be developed using standard open source software (Except Oracle)
like Java, tomcat web server, Internet Explorer Browser etc these software will work both
on Windows and Linux o/s. Hence portability problems will not arise.

Availability

This software will be available always.

Maintainability

The system called the ewheelz uses the 2-tier architecture. The 1st tier is the GUI, which
is said to be front-end and the 2nd tier is the database, which uses My-Sql, which is the
back-end.

The front-end can be run on different systems (clients). The database will be running at
the server. Users access these forms by using the user-ids and the passwords.

3.3 ECONOMIC FEASILITY

The computerized system takes care of the present existing system‟s data flow and
procedures completely and should generate all the reports of the manual system besides a
host of other management reports.

It should be built as a web based application with separate web server and database
server. This is required as the activities are spread through out the organization customer

19
wants a centralized database. Further some of the linked transactions take place in
different locations.

Open source software like TOMCAT, JAVA, Mysql and Linux is used to minimize
the cost for the Customer.

20
REQUIREMENTS SPECIFICATIONS

4.1 FUNCTIONAL REQUIREMENTS SPECIFICATION


This application consists following modules.

MODULES
Administration
Employee
Search
Report
Authentication

4.2 MODULE DESCRIPTION


Administrator:-

In this module the Administrator has the privileges to add all the Employees and
register them in the organization and check the information of the Employee and check the
status of the leave when they have taken and what type of leave they have taken and search is
done based on the employee and report is generated based on employee.

Search:-

This module contain complete search like Leave search, Type of Leave, Employee
based on the leave and starting and ending day of leave.

Employee:-

In this module employee has the privileges to use his username and password for
login and he can see the request given by the customer and he can pass the process to the
Business Manager and maintain the record of the customers.

Reports:-

This module contains all the information about the reports generated by the Employees based
on the Performance and by the leave status.

20
Authentication:-

This module contains all the information about the authenticated user. User without his
username and password can‟t enter into the login if he is only the authenticated user then he
can enter to his login.

4.3 PERFORMANCE REQUIREMENTS

Performance is measured in terms of the output provided by the application. Requirement


specification plays an important part in the analysis of a system. Only when the requirement
specifications are properly given, it is possible to design a system, which will fit into required
environment. It rests largely with the users of the existing system to give the requirement
specifications because they are the people who finally use the system. This is because the
requirements have to be known during the initial stages so that the system can be designed
according to those requirements. It is very difficult to change the system once it has been
designed and on the other hand designing a system, which does not cater to the requirements
of the user, is of no use.

The requirement specification for any system can be broadly stated as given below:

The system should be able to interface with the existing system


The system should be accurate
The system should be better than the existing system
The existing system is completely dependent on the user to perform all the duties.

4.3 SOFTWARE REQUIREMENTS:

One of the most difficult tasks is that, the selection of the software, once system requirement
is known is determining whether a particular software package fits the requirements. After
initial selection further security is needed to determine the desirability of particular software
compared with other candidates. This section first summarizes the application requirement
question and then suggests more detailed comparisons.

21
Operating System-------- Windows 95/98/NT/2000

Browser-------- IE

Web/Application Server-------- apache web server

Database Server-------- Mysql

Database Connectivity-------- JDBC

Other Tools & Technologies -------- PHP, HTML

4.4 HARDWARE REQUIREMENTS:

The selection of hardware is very important in the existence and proper working of any
software. In the selection of hardware, the size and the capacity requirements are also
important.

The Web Based Manufacturing System can be efficiently run on Pentium system with at least
128 MB RAM and Hard disk drive having 20 GB. Floppy disk drive of 1.44 MB and 14 inch
Samsung color monitor suits the information system operation.(A Printer is required for hard
copy output).

Pentium processor-------- 233 MHZ or above


RAM Capacity-------- 4GB
Hard Disk-------- 20GB
Floppy disk-------- 1.44 MB
CD-ROM Drive-------- 32 HZ
KEYBOARD-------- 108 Standard

22
INTRODUCTION TO PHP

PHP

PHP: Hypertext Preprocessor, is a widely used, general-purpose scripting language that was
originally designed for web development, to produce dynamic web pages. It can be
embedded into HTML and generally runs on a web server, which needs to be configured to
process PHP code and create web page content from it. It can be deployed on most web
servers and on almost every operating system and platform free of charge.

PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by The PHP
Group and serves as the de facto standard for PHP as there is no formal specification.PHP is
free software released under the PHP License, which is incompatible with the GNU General
Public License (GPL) because of restrictions on the use of the term PHP

PHP has evolved to include a command line interface capability and can also be used in
standalone graphical applications.

About HTML

HTML, which stands for Hyper Text Markup Language, is the predominant markup language
for web pages. It provides a means to create structured documents by denoting structural
semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and
other items. It allows images and objects to be embedded and can be used to create
interactive forms. It is written in the form of HTML elements consisting of "tags" surrounded
by angle brackets within the web page content. It can include or can load scripts in languages
such as JavaScript which affect the behavior of HTML processors like Web browsers; and
Cascading Style Sheets (CSS) to define the appearance and layout of text and other material.
The W3C, maintainer of both HTML and CSS standards, encourages the use of CSS over
explicit presentational markup.

Hyper Text Markup Language(HTML) is the encoding scheme used to create and format a
web document. A user need not be an expert programmer to make use of HTML for creating
hypertext documents that can be put on the internet.

Most graphical e-mail clients allow the use of a subset of HTML (often ill-defined) to provide
formatting and semantic markup not available with plain text. This may include typographic
information like coloured headings, emphasized and quoted text, inline images

23
and diagrams. Many such clients include both a GUI editor for composing HTML e-mail
messages and a rendering engine for displaying them. Use of HTML in e-mail is controversial
because of compatibility issues, because it can help disguise phishing attacks, because it can
confuse spam filters and because the message size is larger than plain text.

NAMING CONVENTIONS

The most common filename extension for files containing HTML is .html. A common
abbreviation of this is .htm, which originated because some early operating systems and file
systems, such as DOS and FAT, limited file extensions to three letters.

HTML APPLICATION

An HTML Application is a Microsoft Windows application that uses HTML and Dynamic
HTML in a browser to provide the application's graphical interface. A regular HTML file is
confined to the security model of the web browser, communicating only to web servers and
manipulating only webpage objects and site cookies. An HTA runs as a fully trusted
application and therefore has more privileges, like creation/editing/removal of files and
Windows Registry entries. Because they operate outside the browser's security model, HTAs
cannot be executed via HTTP, but must be downloaded (just like an EXE file) and executed
from local file system

ABOUT JAVASCRIPT

JavaScript is an object-oriented scripting language used to enable programmatic access to


objects within both the client application and other applications. It is primarily used in the
form of client-side JavaScript, implemented as an integrated component of the web browser,
allowing the development of enhanced user interfaces and dynamic websites. JavaScript is a
dialect of the ECMAScript standard and is characterized as a dynamic, weakly typed,
prototype-based language with first-class functions. JavaScript was influenced by many
languages and was designed to look like Java, but to be easier for non-programmers to work
with.

24
What is MySQL?

MySQL, the most popular Open Source SQL database management system, is
developed, distributed, and supported by Oracle Corporation.

Data Types
Many data types: signed/unsigned integers 1, 2, 3, 4, and 8 bytes long, FLOAT,
DOUBLE, CHAR, VARCHAR, BINARY,VARBINARY, TEXT, B LOB, DATE,
TIME, DATETIME, TIMESTAMP, YEAR, SET, ENUM.

Fixed-length and variable-length string types.

Statements and Functions


Full operator and function support in the SELECT list and WHERE clause of
queries. For example:

mysql> SELECT CONCAT(first_name, ' ', last_name)

-> FROM citizen

-> WHERE income/dependents > 10000 AND age > 30;

Full support for SQL GROUP BY and ORDER BY clauses. Support for
group functions(COUNT(), AVG(), STD(),SUM(), MAX(), MIN(), and
GROUP_CONCAT()).

Support for LEFT OUTER JOIN and RIGHT OUTER JOIN with both standard
SQL and ODBC syntax.

Support for aliases on tables and columns as required by standard SQL.

Support for DELETE, INSERT, REPLACE, and UPDATE to return the number of
rows that were changed (affected), or to return the number of rows matched instead
by setting a flag when connecting to the server.

Support for MySQL-specific SHOW statements that retrieve information about


databases, storage engines, tables, and indexes. MySQL 5.0 adds support for the
INFORMATION_SCHEMA database, implemented according to standard SQL.

25
An EXPLAIN statement to show how the optimizer resolves a query.

Independence of function names from table or column names. For example, ABS is
a valid column name. The only restriction is that for a function call, no spaces are
permitted between the function name and the “(” that follows it.

You can refer to tables from different databases in the same statement.

Security
A privilege and password system that is very flexible and secure, and that enables
host-based verification.

Password security by encryption of all password traffic when you connect to a


server.

Connectivity
Clients can connect to MySQL Server using several protocols:

Clients can connect using TCP/IP sockets on any platform.

On Windows systems in the NT family (NT, 2000, XP, 2003, or Vista), clients can
connect using named pipes if the server is started with the --enable-named-pipe
option. In MySQL 4.1 and higher, Windows servers also support shared-memory
connections if started with the --shared-memory option. Clients can connect through
shared memory by using the --protocol=memory option.

On Unix systems, clients can connect using Unix domain socket files.

MySQL client programs can be written in many languages. A client library written
in C is available for clients written in C or C++, or for any language that provides C
bindings.

APIs for C, C++, Eiffel, Java, Perl, PHP, Python, Ruby, and Tcl are available,
enabling MySQL clients to be written in many languages.

The Connector/ODBC (MyODBC) interface provides MySQL support for client


programs that use ODBC (Open Database Connectivity) connections. For example,
you can use MS Access to connect to your MySQL server. Clients can be run on

26
Windows or Unix. Connector/ODBC source is available. All ODBC 2.5 functions
are supported, as are many others.

The Connector/J interface provides MySQL support for Java client programs that
use JDBC connections. Clients can be run on Windows or Unix. Connector/J source
is available.

MySQL Connector/Net enables developers to easily create .NET applications that


require secure, high-performance data connectivity with MySQL. It implements the
required ADO.NET interfaces and integrates into ADO.NET aware tools.
Developers can build applications using their choice of .NET languages. MySQL
Connector/Net is a fully managed ADO.NET driver written in 100% pure C#.

27
\SYSTEM DESIGN

Introduction: Systems design is the process or art of defining the architecture,

components, modules, interfaces, and data for a system to satisfy specified requirements. One

could see it as the application of systems theory to product development. There is some

overlap and synergy with the disciplines of systems analysis, systems architecture and

systems engineering.

DFD 0 Level

Administrator Employee

Provide services Emp

Receive Report
Emp_id

Easy-Leave
Report
Details
Search
Details
Report
_id
Report
Search
_id
Search

Authenticati
on

28
DFD 1 Level

29
ER Diagram

30
5.4 NORMALIZATION

A Database is a collection of interrelated data stored with a minimum of redundancy to


serve many applications. The database design is used to group data into a number of
tables and minimizes the artificiality embedded in using separate files. The tables are
organized to:

Reduced duplication of data.


Simplify functions like adding, deleting, modifying data etc..,
Retrieving data
Clarity and ease of use
More information at low cost

Normalization

Normalization is built around the concept of normal forms. A relation is said


to be in a particular normal form if it satisfies a certain specified set of constraints on the
kind of functional dependencies that could be associated with the relation. The normal
forms are used to ensure that various types of anomalies and inconsistencies are not
introduced into the database.

First Normal Form:

A relation R is in first normal form if and only if all underlying domains


contained atomic values only.

Second Normal Form:

A relation R is said to be in second normal form if and only if it is in first


normal form and every non-key attribute is fully dependent on the primary key.

31
Third Normal Form:

A relation R is said to be in third normal form if and only if it is in second


normal form and every non key attribute is non transitively depend on the primary key.

Data Dictionary
admin

Field Type Null Key Default


id int(11) NO PRI (NULL)
UserName varchar(100) NO (NULL)

Password varchar(100) NO (NULL)

updationDate timestamp NO 0000-00-00


00:00:00

tbldepartments

Field Type Null Key Default

id int(11) NO PRI (NULL)

DepartmentName varchar(150) YES (NULL)

DepartmentShortName varchar(100) NO (NULL)

32
DepartmentCode varchar(50)YES (NULL)

CreationDate timestampYES CURRENT_TIMESTAMP

tblemployees

Field Type Null Key Default

id int(11) NO PRI (NULL)

EmpId varchar(100) NO (NULL)

FirstName varchar(150) NO (NULL)

LastName varchar(150) NO (NULL)

EmailId varchar(200) NO (NULL)

Password varchar(180) NO (NULL)

Gender varchar(100) NO (NULL)

33
Dob varchar(100) NO (NULL)

Department varchar(255) NO (NULL)

Address varchar(255) NO (NULL)

City varchar(200) NO (NULL)

Country varchar(150) NO (NULL)

Phonenumber char(11) NO (NULL)

Status int(1) NO (NULL)

RegDate timestamp NO CURRENT_TIMESTAMP

tblleaves

Field Type Null Key Default

id int(11) NO PRI (NULL)

34
LeaveType varchar(110) NO (NULL)

ToDate varchar(120) NO (NULL)

FromDate varchar(120) NO (NULL)

Description mediumtext NO (NULL)

PostingDate timestamp NO CURRENT_TIMESTAMP

AdminRemark mediumtext YES (NULL)

AdminRemarkDate varchar(120) YES (NULL)

Status int(1) NO (NULL)

IsRead int(1) NO (NULL)

empid int(11) YES MUL (NULL)

tblleavetype

35
Field Type Null Key Default

id int(11) NO PRI (NULL)

LeaveType varchar(200) YES (NULL)

Description mediumtext YES (NULL)

CreationDate timestamp NO CURRENT_TIMESTAMP

36
OUTPUT SCREENS

Employee Login Screen

37
Employee Profile PAGE

38
Apply Leave PAGE.

39
Admin Login PAGE

40
MANAGE EMPLOYEES PAGE

41
LEAVE HISTORY PAGE

42
ADD LEAVES PAGE

43
MANAGE DEPARTMENT PAGE

44
DASHBOARD PAGE

45
SYSTEM SECURITY

8.1 System Security:

Setting Up Authentication for Web Applications

Introduction:
To configure authentication for a Web Application, use the <login-config> element of the
web.xml deployment descriptor. In this element you define the security realm containing the
user credentials, the method of authentication, and the location of resources for
authentication.

8.2 SECURITY IN SOFTWARE


To set up authentication for Web Applications:

1. Open the web.xml deployment descriptor in a text editor or use the Administration
Console. Specify the authentication method using the <auth-method> element. The
available options are:

BASIC

Basic authentication uses the Web Browser to display a username/password dialog box. This
username and password is authenticated against the realm.

FORM

Form-based authentication requires that you return an HTML form containing the username
and password. The fields returned from the form elements must be: j_username and
j_password, and the action attribute must be j_security_check. Here is an example of the
HTML coding for using FORM authentication:

<form method="POST" action="j_security_check">

<input type="text" <input type="password" name="j_username">


name="j_password">

46
</form>

The resource used to generate the HTML form may be an HTML page, a JSP, or a servlet.
You define this resource with the <form-login-page> element.

The HTTP session object is created when the login page is served. Therefore, the
session.isNew() method returns FALSE when called from pages served after successful
authentication.

47
9. BIBLIOGRAPHY

BIBLIOGRAPHY

BookName: PHP6 and MySQL AuthorName: SteveSuehring,TimConverse,andJoyce Park

Websites
http://www.w3schools.com

http://www.quibids.com

http://www.ubid.com

http://www.i-bidder.com

http://www.redbid.com

www.google.com.

www.wikipedia.com

www.w3schools.com

www.wikipedia.com

www.apache.org
www.management.com
www.code.com

48

S-ar putea să vă placă și