×

Enterprise service-to-service trust framework

  • US 20070118878A1
  • Filed: 03/22/2006
  • Published: 05/24/2007
  • Est. Priority Date: 11/22/2005
  • Status: Active Grant
First Claim
Patent Images

1. In an enterprise computing network, a system for providing authorization and authentication in response to a service request from a client computer, the system comprising:

  • a centralized policy server comprising a centralized policy repository, the centralized policy repository comprising;

    (a) an information store configured to store a plurality of sets of trust information, each of the plurality of sets of trust information comprising trust information about one of a plurality of services;

    (b) one or more authorization models, each of the one or more authorization models comprising information about a mode of interaction between two or more services;

    (c) one or more authentication policies, each of the one or more authentication policies defining a set of authentication requirements for a particular service; and

    (d) one or more authorization policies, each of the one or more authentication policies defining a set of authorization requirements for a particular service;

    a first server computer comprising a first processor and a first set of instructions executable by the first processor, the first set of instructions comprising;

    (a) instructions to receive with a first service the service request from the client computer;

    (b) instructions to ascertain that the service request requests an operation to be performed by second service at a second server computer;

    (c) instructions to obtain from the centralized policy repository an identifier of the first service;

    (d) instructions to transmit a request for the operation for reception by the second server computer, the request comprising the identifier of the first service;

    a second server computer comprising a second processor and a second set of instructions executable by the second processor, the second set of instructions comprising;

    (a) instructions to receive, with the second service, the request for the operation from the first server computer;

    (b) instructions to transmit an authentication request for reception by the centralized policy server, the authentication request comprising the identifier;

    (c) instructions to transmit an authorization request for reception by the centralized policy server; and

    (d) instructions to provide the requested operation, based on an authentication status and an authorization status of the first server; and

    an application programming interface (“

    API”

    ) configured allow the first service and the second service to communicate with the centralized policy repository;

    wherein the centralized policy server further comprises a third processor and a third set of instructions executable by the third processor, the third set of instructions comprising;

    (a) instructions to receive the authentication request;

    (b) instructions to identify the first service, based on the identifier;

    (c) instructions to determine, based on an authentication policy for the second service, a set of authentication information for the first service, the set of authentication information being sufficient to authenticate the first service;

    (d) instructions to provide the set of authentication information to the second server computer;

    (d) instructions to receive the authorization request;

    (e) instructions to determine, based on an authorization policy for the second service, a set of authorization information for the first service, the set of authorization information being sufficient to indicate whether the first service is authorized for the second service; and

    (f) instructions to provide the set of authorization information to the second server computer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×