Role-based authorization of network services using diversified security tokens
First Claim
1. In a network environment that includes a service providing computing system and a network connected to the service providing computing system, the service providing computing system offering one or more services, the network being capable of delivering to the service providing computing system a plurality of service request messages associated with diversified security token types, a method for the service providing computing system to perform role-based authorization of the one or more services using the security tokens associated with the received service request messages despite the received service request messages having diversified security token types, the method comprising the following:
- an act of receiving a service request message over the network, the service request message requesting a service offered by the service providing computing system;
an act of accessing a security token associated with the received service request message;
an act of identifying one or more roles that include the identity associated with the security token;
an act of correlating the one or more identified roles with the accessed security token; and
an act of authorizing the requested service using the one or more roles correlated with the security token that is associated with the service request message that requests the requested service.
2 Assignments
0 Petitions
Accused Products
Abstract
A mechanism for performing role-based authorization of the one or more services using security tokens associated with received service request messages. This role-based authentication is performed regardless of the type of security token associated with the received service request messages. Upon receiving a service request message over the network for a particular service offered by the service providing computing system, the service providing computing system accesses a security token associated with the received service request message. Then, the computing system identifies one or more roles that include the identity associated with the security token, and correlates the roles with the security token. These correlated roles are then used to authorize the requested service. This mechanism is performed regardless of the type of the security token.
93 Citations
35 Claims
-
1. In a network environment that includes a service providing computing system and a network connected to the service providing computing system, the service providing computing system offering one or more services, the network being capable of delivering to the service providing computing system a plurality of service request messages associated with diversified security token types, a method for the service providing computing system to perform role-based authorization of the one or more services using the security tokens associated with the received service request messages despite the received service request messages having diversified security token types, the method comprising the following:
-
an act of receiving a service request message over the network, the service request message requesting a service offered by the service providing computing system;
an act of accessing a security token associated with the received service request message;
an act of identifying one or more roles that include the identity associated with the security token;
an act of correlating the one or more identified roles with the accessed security token; and
an act of authorizing the requested service using the one or more roles correlated with the security token that is associated with the service request message that requests the requested service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product for use in a network environment that includes a service providing computing system and a network connected to the service providing computing system, the service providing computing system offering one or more services, the network being capable of delivering to the service providing computing system a plurality of service request messages associated with diversified security token types, the computer program product for allowing the service providing computing system to perform role-based authorization of the one or more services using the security tokens associated with the received service request messages despite the received service request messages having diversified security token types, the computer program product comprising one or more computer-readable media having computer-executable instructions that, when executed by one or more processors of the service providing computing system, causes the service providing computing system to perform the following when receiving a service request message that requests a service offered by the service providing computing system:
-
an act of accessing a security token associated with the received service request message;
an act of identifying one or more roles that include the identity associated with the security token;
an act of correlating the one or more identified roles with the accessed security token; and
an act of authorizing the requested service using the one or more roles correlated with the security token that is associated with the service request message that requests the requested service. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification