Security for external system management
First Claim
Patent Images
1. A method comprising:
- receiving a request to manage a system from a client at an interface;
determining if a level of security is desired for the interface;
if a level of security is desired for the interface, then;
obtaining identification information from the request;
converting the identification information into a format that is compatible with the system to be managed; and
determining whether the system provides authorization for the client to manage the system.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for enhanced security for external system management. A request to manage a system is received from a client at an interface. A determination is made whether a level of security is desired for the interface. If a level of security is desired for the interface, then identification information is obtained from the request and is converted into a format that is compatible with the system to be managed. A determination is made whether the system provides authorization for the client to manage the system.
-
Citations
31 Claims
-
1. A method comprising:
-
receiving a request to manage a system from a client at an interface;
determining if a level of security is desired for the interface;
if a level of security is desired for the interface, then;
obtaining identification information from the request;
converting the identification information into a format that is compatible with the system to be managed; and
determining whether the system provides authorization for the client to manage the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
registering a web service as an interface for a server;
receiving a request to manage an application on the server from an external client at the web service;
determining if enhanced security is desired for the web service;
if enhanced security is desired for the web service, then providing an enhanced security function, the enhanced security function including;
extracting identification information from the request;
converting the identification information into a format that is compatible with the application; and
searching the application for the identification information. - View Dependent Claims (10, 11)
-
-
12. A server comprising:
-
a container comprising an application, the application including authorization data concerning users who are authorized to access the application; and
an interface, the interface to be connected to a client system for management of the application, the interface to include an enhanced security function, the enhanced security function to extract identity information from a communication from a client system and determine whether the client system has authority to manage the application. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a client system, the client system to provide a request to manage a computer application, the request to include identification information regarding the client system; and
a server, the server including the computer application and an interface, the client system to be coupled with the interface, the computer application including data regarding access credentials;
the interface to remove identification information from the request and convert the identification information into a format compatible with the computer application, the interface to compare the converted identification information with the data regarding access credentials to determine whether the client system is authorized to access the computer application. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A machine-readable medium having stored thereon data representing sequences of instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving a request to manage a system from a client at an interface;
determining if a level of security is desired for the interface;
if a level of security is desired for the interface, then;
obtaining identification information from the request;
converting the identification information to a format that is compatible with the system to be managed; and
determining whether the system provides authorization for the client to manage the system. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31)
-
Specification