Method and apparatus for managing identity information on a network
First Claim
1. A method of managing identity information on behalf of network services, the method comprising the steps of:
- obtaining a first meta data record describing a first of said network services; and
utilizing said first meta data record to obtain a first service data record containing first identity management information for an user of the first network service.
1 Assignment
0 Petitions
Accused Products
Abstract
A centralized identity management service includes a dynamically configured client interface that communication with a directory assess daemon. The data access daemon processes and fulfils requests by communicating with third party databases. A data access layer is interposed between the data access daemon and databases to allow the directories to be modified without affecting the data access daemon. Providing a self-configuring user interface facilitates rapid creation of network services and allows the services to be modified without manually reconfiguring the user interface. Common data format schemas facilitates deployment of new services on the network by allowing services to be defined to take advantage of the features provided by the identity management infrastructure.
53 Citations
22 Claims
-
1. A method of managing identity information on behalf of network services, the method comprising the steps of:
-
obtaining a first meta data record describing a first of said network services; and
utilizing said first meta data record to obtain a first service data record containing first identity management information for an user of the first network service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of fulfilling identity management information requests from a network user, comprising:
-
obtaining meta data associated with a network service;
using the meta data to present an identity management user interface to an user of the network service; and
populating the identity management user interface with identity information associated with the user. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An identity management infrastructure, comprising:
-
an interface layer configured to receive first identity management requests from first network users of a first network service and second identity management requests from second network users of a second network service;
a data access daemon configured to process the first and second identity management requests; and
a data access layer configured to enable the data access daemon to access identity management data from at least one identity management database in connection with processing the identity management requests. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification