Managing Web Single Sign-On Applications
First Claim
1. A method of managing a web single sign-on (SSO) application with a common set of uniform resource locators (URLs), comprising:
- defining a first servlet mapping including a description of a protected URL resource pattern;
defining a second servlet mapping including a description of an unprotected URL resource pattern;
determining display logic support to establish if display logic of the web SSO application supports both the first servlet mapping and the second servlet mapping;
configuring the display logic of the web SSO application based on the determination;
defining an intercepting filter configured to review a received request for a resource, to determine if a source issuing the request is an authorized source, and redirecting the requesting source to a protected URL resource pattern for the requested resource if the source is an unauthorized source; and
registering URL patterns for the common set of URLs in the intercepting filter, the URL patterns including definitions of the protected URL resource pattern and the unprotected URL resource pattern.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of managing a web single sign-on (SSO) application with a common set of uniform resource locators (URLs) includes defining a first servlet mapping including a description of a protected URL resource pattern, defining a second servlet mapping including a description of an unprotected URL resource pattern, determining display logic support to establish if display logic of the web SSO application supports both the first servlet mapping and the second servlet mapping, configuring the display logic of the web SSO application based on the determination, defining an intercepting filter, and registering URL patterns for the common set of URLs in the intercepting filter, the URL patterns including definitions of the protected URL resource pattern and the unprotected URL resource pattern.
-
Citations
20 Claims
-
1. A method of managing a web single sign-on (SSO) application with a common set of uniform resource locators (URLs), comprising:
-
defining a first servlet mapping including a description of a protected URL resource pattern; defining a second servlet mapping including a description of an unprotected URL resource pattern; determining display logic support to establish if display logic of the web SSO application supports both the first servlet mapping and the second servlet mapping; configuring the display logic of the web SSO application based on the determination; defining an intercepting filter configured to review a received request for a resource, to determine if a source issuing the request is an authorized source, and redirecting the requesting source to a protected URL resource pattern for the requested resource if the source is an unauthorized source; and registering URL patterns for the common set of URLs in the intercepting filter, the URL patterns including definitions of the protected URL resource pattern and the unprotected URL resource pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product including a computer usable medium having computer executable instructions embodied therewith that, when executed on a computer apparatus, carry out a method of managing a web single sign-on (SSO) application with a common set of uniform resource locators (URLs), the method comprising:
-
defining a first servlet mapping including a description of a protected URL resource pattern; defining a second servlet mapping including a description of an unprotected URL resource pattern; determining display logic support to establish if display logic of the web SSO application supports both the first servlet mapping and the second servlet mapping; configuring the display logic of the web SSO application based on the determination; defining an intercepting filter configured to review a received request for a resource, to determine if a source issuing the request is an authorized source, and redirecting the requesting source to a protected URL resource pattern for the requested resource if the source is an unauthorized source; and registering URL patterns for the common set of URLs in the intercepting filter, the URL patterns including definitions of the protected URL resource pattern and the unprotected URL resource pattern. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a web browser; a web single sign-on (SSO) application in operative communication with the web browser; and a web application in operative communication with the SSO application;
wherein the system is configured to perform a method comprising,defining a first servlet mapping including a description of a protected URL resource pattern; defining a second servlet mapping including a description of an unprotected URL resource pattern; determining display logic support to establish if display logic of the web application supports both the first servlet mapping and the second servlet mapping configuring the display logic of the web application based on the determination; defining an intercepting filter configured to review a received request for a resource, to determine if a source issuing the request is an authorized source, and redirecting the requesting source to a protected URL resource pattern for the requested resource if the source is an unauthorized source; and registering URL patterns for a common set of URLs in the intercepting filter, the URL patterns including definitions of the protected URL resource pattern and the unprotected URL resource pattern. - View Dependent Claims (18, 19, 20)
-
Specification