System, method and computer program product for authenticating and authorizing an external entity
First Claim
Patent Images
1. A non-transitory computer readable medium having program instructions stored thereon that are capable of causing a computer system that implements a plurality of instances of a multi-tenant database system to perform operations comprising:
- receiving, from a user, a request to permit an application to access data of a tenant that is stored in a first of the plurality of instances of the multi-tenant database system, wherein the application is executable externally from the multi-tenant database system;
in response to receiving the request, generating authentication information for the application, wherein the authentication information is usable to authenticate the application;
distributing the authentication information to the plurality of instances of the multi-tenant database system;
receiving, from the application at a second of the plurality of instances of the multi-tenant database system, a request for the data stored in the first instance; and
in response to the second instance receiving the authentication information from the application, returning the requested data from the first instance.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an external entity can enable improved data security, more efficient data transfer, improved data access channels, etc.
167 Citations
18 Claims
-
1. A non-transitory computer readable medium having program instructions stored thereon that are capable of causing a computer system that implements a plurality of instances of a multi-tenant database system to perform operations comprising:
-
receiving, from a user, a request to permit an application to access data of a tenant that is stored in a first of the plurality of instances of the multi-tenant database system, wherein the application is executable externally from the multi-tenant database system; in response to receiving the request, generating authentication information for the application, wherein the authentication information is usable to authenticate the application; distributing the authentication information to the plurality of instances of the multi-tenant database system; receiving, from the application at a second of the plurality of instances of the multi-tenant database system, a request for the data stored in the first instance; and in response to the second instance receiving the authentication information from the application, returning the requested data from the first instance. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, at a first instance of a database system, a request from a user to permit an entity to access data stored in the first instance of the database system, wherein the entity is an entity external to the database system and provides a service using the data, and wherein the first instance is one of a plurality of instances of the database system; in response to the request; creating, at the first instance, authentication information that is usable to authenticate the entity; and distributing, from the first instance, the authentication information to the plurality of instances of the database system such that the entity is able to authenticate with another one of the plurality of instances to access data stored in the first instance of the database system; receiving, at a second of the plurality of instances, the authentication information with a request from the entity for data stored in the database system; and in response to receiving the authentication information, the second instance providing data from the first instance to the entity to service the request from the entity. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium having program instructions stored thereon that are capable of causing a computer system that implements a first of a plurality of instances of a database system to perform operations comprising:
-
receiving, from a second of the plurality of instances, authentication information generated at the second instance, wherein the authentication information is for an entity external to the database system and usable to access data stored at the second instance; receiving, from the entity, an authentication request that includes the authentication information; and in response to verifying the authentication information from the entity, providing data from the second instance to the entity. - View Dependent Claims (16, 17, 18)
-
Specification