CREDENTIAL VAULT ENCRYPTION
First Claim
Patent Images
1. A method comprising:
- maintaining application role mappings at a reverse proxy server;
receiving a request for a web application at the reverse proxy server;
determining the proper user role for the web application at the reverse proxy server;
sending the proper user role as part of a HTTP header to the web application;
wherein the web application uses the user role without doing an independent mapping of the user to a role.
2 Assignments
0 Petitions
Accused Products
Abstract
Application role mappings can be maintained at a reverse proxy server. When a request for a web application is received at the reverse proxy servers, the proper user role for the web application can be determined at the reverse proxy server. The proper user role can be sent as part of a HTTP header to the web application. The web application can use the user role without doing an independent mapping of the user to a role.
165 Citations
21 Claims
-
1. A method comprising:
-
maintaining application role mappings at a reverse proxy server; receiving a request for a web application at the reverse proxy server; determining the proper user role for the web application at the reverse proxy server; sending the proper user role as part of a HTTP header to the web application;
wherein the web application uses the user role without doing an independent mapping of the user to a role. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer readable medium including code to:
-
maintaining application role mapping at a reverse proxy server; receiving a request for a web application at the reverse proxy server; and determining the proper user role for the web application at the reverse proxy server; sending the proper user role as part of a HTTP header to the web application;
wherein the web application uses the user role without doing an independent mapping of the user to a role. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
maintaining application role mapping at a reverse proxy server; receiving a request for a web application at the reverse proxy server; determining the proper user role for the web application at the reverse proxy server; sending the proper user role as part of a HTTP header to the web application;
wherein the web application uses the role in a presentation to the user without doing an independent mapping of the user to a role;
wherein the request comes from another web application as a result of an active tag in the other web application. - View Dependent Claims (15, 16, 17)
-
-
18. A method comprising:
-
maintaining of application role mapping at a reverse proxy server; receiving a request for a web application at the reverse proxy server the reverse proxy server; determining the proper user role for the web application; and sending the proper user role as part of a HTTP header to the web application;
wherein the web application uses the role in a presentation to the user without doing an independent mapping of the user to a role;
wherein the reverse proxy server looks up roles for multiple web application that are combined into a single presentation to the user. - View Dependent Claims (19, 20, 21)
-
Specification