Single sign-on (SSO) for non-SSO-compliant applications
First Claim
Patent Images
1. A method for providing SSO authentication when accessing non-SSO-compliant applications, the method comprising:
- forwarding a user name and a password received from a non-SSO-compliant application to an SSO proxy;
encapsulating said user name and password in a request to access a protected application;
authenticating said user name and password responsive to said request using SSO authentication; and
generating an SSO token if said authentication step is successful.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for providing SSO authentication when accessing non-SSO-compliant applications, the method including forwarding a user name and a password received from a non-SSO-compliant application to an SSO proxy, encapsulating the user name and password in a request to access a protected application, authenticating the user name and password responsive to the request using SSO authentication, and generating an SSO token if said authentication step is successful.
-
Citations
38 Claims
-
1. A method for providing SSO authentication when accessing non-SSO-compliant applications, the method comprising:
-
forwarding a user name and a password received from a non-SSO-compliant application to an SSO proxy;
encapsulating said user name and password in a request to access a protected application;
authenticating said user name and password responsive to said request using SSO authentication; and
generating an SSO token if said authentication step is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for SSO authentication for use with non-SSO-compliant applications, the system comprising:
-
an SSO proxy operative to receive a user name and password from a non-SSO-compliant application and encapsulate said user name and password in a request to access a protected application; and
an authenticator operative to authenticate said user name and password responsive to said request using SSO authentication and generate an SSO token if said authentication is successful. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for providing SSO authentication when accessing non-SSO-compliant applications, the method comprising:
-
forwarding a user name and token received from a non-SSO-compliant application to an SSO proxy;
encapsulating said user name and token in a request to access a protected application;
authenticating said token responsive to said request using SSO authentication; and
generating a security context for said request if said authentication step is successful. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for SSO authentication for use with non-SSO-compliant applications, the system comprising:
-
an SSO proxy operative to receive a user name and token from a non-SSO-compliant application and encapsulate said user name and token in a request to access a protected application; and
an authenticator operative to authenticate said user name and token responsive to said request using SSO authentication and generate a security context for said request if said authentication step is successful. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for implementing SSO authentication in support of non-SSO-compliant application access, the method comprising:
-
providing a SSO proxy operative to receive a user name and a password from a non-SSO-compliant application; and
configuring said SSO proxy to a) encapsulate said user name and password in a request to access a protected application, and b) send said request to a computer operative to c) authenticate said user name and password responsive to said request using SSO authentication; and
d) generate an SSO token if said authentication is successful.
-
-
38. A computer program embodied on a computer-readable medium, the computer program comprising:
-
a first code segment operative to forward a user name and a password received from a non-SSO-compliant application to an SSO proxy;
a second code segment operative to encapsulate said user name and password in a request to access a protected application;
a third code segment operative to authenticate said user name and password responsive to said request using SSO authentication; and
a fourth code segment operative to generate an SSO token if said authentication is successful.
-
Specification