Web-based single sign-on with form-fill proxy application
First Claim
1. A method comprising:
- based on a response received from an application, modifying, by a computer system, the response to include one or more computer-executable instructions, wherein the response is based on a first request by a device to access the application; and
sending, by the computer system, the modified response to the device;
wherein execution of the one or more computer-executable instructions on the device causes the device to;
obtain, from the computer system, a plurality of credentials associated with a user of the device;
invoke an automated logon chooser process that, until a successful logon is detected, for each credential of the plurality of credentials, submits the credential to the application for logon; and
in response to detecting the successful logon to the application, send, to the computer system, a second request to update a user credential associated with the user for the application with the credential that resulted in the successful logon.
2 Assignments
0 Petitions
Accused Products
Abstract
Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the user for one or more web applications. The web-based SSO system can be extended to support one or more different access control methods, such as form-fill, Federated (OIF), SSO Protected (OAM), and other policies. The web-based SSO system can include a user interface through which the user can access different web applications, systems, etc. and manage their credentials. Each SSO service can be associated with a web interface allowing the SSO services to be accessed over the web. The web interfaces can provide CRUD (create, read, update, delete) functionality for each SSO service. To support different access policy types, the web-based SSO system can include an extensible data manager that can manage data access to different types of repositories transparently.
45 Citations
20 Claims
-
1. A method comprising:
-
based on a response received from an application, modifying, by a computer system, the response to include one or more computer-executable instructions, wherein the response is based on a first request by a device to access the application; and sending, by the computer system, the modified response to the device; wherein execution of the one or more computer-executable instructions on the device causes the device to; obtain, from the computer system, a plurality of credentials associated with a user of the device; invoke an automated logon chooser process that, until a successful logon is detected, for each credential of the plurality of credentials, submits the credential to the application for logon; and in response to detecting the successful logon to the application, send, to the computer system, a second request to update a user credential associated with the user for the application with the credential that resulted in the successful logon. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
one or more processors; and a memory accessible to the one or more processors, the memory storing one or more instructions which, upon execution by the one or more processors, causes the one or more processors to; based on a response received from an application, modify the response to include one or more computer-executable instructions, wherein the response is based on a first request by a device to access the application; and send the modified response to the device; wherein execution of the one or more computer-executable instructions on the device causes the device to; obtain, from the system, a plurality of credentials associated with a user of the device; invoke an automated logon chooser process that, until a successful logon is detected, for each credential of the plurality of credentials, submits the credential to the application for logon; and in response to detecting the successful logon to the application, send, to the system, a second request to update a user credential associated with the user for the application with the credential that resulted in the successful logon. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
sending, by a device, to a computer system, a first request to access an application; and based on the first request, receiving, by the device, from the computer system, a response including one or more computer-executable instructions; executing, by the device, the one or more computer-executable instructions that are included in the response received from the computer system, wherein execution of the one or more computer-executable instructions causes the device to; obtain, from the computer system, a plurality of credentials associated with a user of the device; invoke an automated logon chooser process that, until a successful logon is detected, for each credential of the plurality of credentials, submits the credential to the application for logon; and in response to detecting the successful logon to the application, send, to the computer system, a second request to update a user credential associated with the user for the application with the credential that resulted in the successful logon. - View Dependent Claims (18, 19, 20)
-
Specification