Centralized enterprise security policy framework
First Claim
Patent Images
1. A method for authenticating using a centralized enterprise security framework, comprising:
- receiving a plurality of operation requests from a plurality of applications at a centralized enterprise security framework;
retrieving a plurality of entries from a directory structure within the centralized enterprise security framework; and
validating each requests if a comparison between the request and its corresponding entry is successful.
1 Assignment
0 Petitions
Accused Products
Abstract
A centralized enterprise security and provisioning policy framework is described. Enterprise wide security and provisioning is stored in a hierarchical fashion in a centralized LDAP based Directory server. Each policy and user maps directly to a unique entry in the directory. Policy entries can be created at specific administrative points in the Directory Information Tree instead of having to duplicate these policies as attributes of every user entry in the directory. The policies can be classified into provisioning, authentication, and authorization policies.
-
Citations
31 Claims
-
1. A method for authenticating using a centralized enterprise security framework, comprising:
-
receiving a plurality of operation requests from a plurality of applications at a centralized enterprise security framework;
retrieving a plurality of entries from a directory structure within the centralized enterprise security framework; and
validating each requests if a comparison between the request and its corresponding entry is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A centralized enterprise security policy framework comprising:
-
an LDAP database server including a directory information tree;
a plurality of security policies for a plurality of applications;
a plurality of user identities, each policy and user identity combination mapping to a unique entry in the directory information tree. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product embodied on computer readable medium, the computer readable medium having stored thereon a sequence of instructions which, when executed by a processor, causes the processor to execute a method for authenticating using a centralized enterprise security framework, the method comprising:
-
receiving a plurality of operation requests from a plurality of applications at a centralized enterprise security framework;
retrieving a plurality of entries from a directory structure within the centralized enterprise security framework; and
validating each requests if a comparison between the request and its corresponding entry is successful. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for authenticating comprising:
-
means for receiving a plurality of operation requests from a plurality of applications at a centralized enterprise security framework;
means for retrieving a plurality of entries from a directory structure within the centralized enterprise security framework; and
means for validating each requests if a comparison between the request and its corresponding entry is successful.
-
Specification