Apparatus system and method to provide authentication services to legacy applications
First Claim
1. A system to provide authentication services to legacy applications, the system comprising:
- a client configured to authenticate using a legacy authentication protocol;
an authentication proxy module configured to receive legacy authentication credentials corresponding to the legacy authentication protocol; and
the authentication proxy module further configured to authenticate the user corresponding to the legacy authentication credentials using the Kerberos authentication protocol.
25 Assignments
0 Petitions
Accused Products
Abstract
Authentication credentials from legacy applications are translated to Kerberos authentication requests. Authentication credentials from the legacy application are directed to an authentication proxy module. The authentication proxy module acts as a credential translator for the application by receiving a set of credentials such as a user name and password, then managing the process of authenticating to a Kerberos server and obtaining services from one or more Kerberized applications, including Kerberos session encryption. A credential binding module associates a user corresponding to authentication credentials from a legacy authentication protocol with one or more Kerberos credentials. Anonymous authentication credentials may be translated to authentication requests for a network directory services object, such as a computer object or service object.
-
Citations
25 Claims
-
1. A system to provide authentication services to legacy applications, the system comprising:
-
a client configured to authenticate using a legacy authentication protocol;
an authentication proxy module configured to receive legacy authentication credentials corresponding to the legacy authentication protocol; and
the authentication proxy module further configured to authenticate the user corresponding to the legacy authentication credentials using the Kerberos authentication protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus to provide authentication services to legacy applications, the apparatus comprising:
-
an authentication proxy module configured to receive legacy authentication credentials corresponding to a legacy authentication protocol; and
the authentication proxy module further configured to authenticate a user corresponding to the legacy authentication credentials using the Kerberos authentication protocol. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for providing authentication services to legacy applications, the method comprising:
-
directing legacy authentication credentials corresponding to a legacy authentication protocol to a local authentication process;
receiving the legacy authentication credentials with the local authentication process; and
authenticating a user corresponding to the legacy authentication credentials using the Kerberos authentication protocol in response to receiving the authentication credentials. - View Dependent Claims (20, 21, 22)
-
-
23. A computer readable storage medium comprising computer readable program code configured to carry out a method to providing authentication services to legacy applications, the method comprising:
-
directing legacy authentication credentials corresponding to a legacy authentication protocol to a local authentication process;
receiving the legacy authentication credentials with the local authentication process; and
authenticating a user corresponding to the legacy authentication credentials using the Kerberos authentication protocol in response to receiving the authentication credentials. - View Dependent Claims (24, 25)
-
Specification