TECHNIQUES TO PERFORM FEDERATED AUTHENTICATION
First Claim
1. A method, comprising:
- receiving an authentication request to authenticate a client using a basic authentication protocol by a resource server;
discovering an identity server for the client with a user name, the identity server in a home realm for the client;
retrieving authentication information from the identity server using an enhanced authentication protocol; and
authenticating the client to access resource services using the authentication information.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques to perform federated authentication are described. An apparatus may comprise a resource server may have an authentication proxy component to perform authentication operations on behalf of a client. The authentication proxy component comprises an authentication handling module operative to receive an authentication request to authenticate the client using a basic authentication protocol. The authentication proxy component also comprises an authentication discovery module communicatively coupled to the authentication handling module, the authentication discovery module operative to discover an identity server for the client. The authentication proxy component further comprises an authentication manager module communicatively coupled to the authentication discovery module, the authentication manager module operative to retrieve authentication information from the identity server using an enhanced authentication protocol, and authenticate the client to access resource services using the authentication information. Other embodiments are described and claimed.
97 Citations
20 Claims
-
1. A method, comprising:
-
receiving an authentication request to authenticate a client using a basic authentication protocol by a resource server; discovering an identity server for the client with a user name, the identity server in a home realm for the client; retrieving authentication information from the identity server using an enhanced authentication protocol; and authenticating the client to access resource services using the authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An article comprising a storage medium containing instructions that if executed enable a system to:
-
receive an authentication request to authenticate a client using a basic authentication protocol by a resource server; retrieve authentication information from an identity server for the client using an enhanced authentication protocol; and authenticate the client to access resource services using the authentication information. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An apparatus, comprising:
a resource server having an authentication proxy component to perform authentication operations on behalf of a client, the authentication proxy component comprising; an authentication handling module operative to receive an authentication request to authenticate the client using a basic authentication protocol; an authentication discovery module communicatively coupled to the authentication handling module, the authentication discovery module operative to discover an identity server for the client; and an authentication manager module communicatively coupled to the authentication discovery module, the authentication manager module operative to retrieve authentication information from the identity server using an enhanced authentication protocol, and authenticate the client to access resource services using the authentication information. - View Dependent Claims (17, 18, 19, 20)
Specification