SYSTEM, METHOD AND PROGRAM FOR USER AUTHENTICATION, AND RECORDING MEDIUM ON WHICH THE PROGRAM IS RECORDED
First Claim
1. A method for authenticating a user, comprising:
- a first server of a plurality of servers receiving an access request from the user to access a federated computing environment that comprises the plurality of servers, wherein the first server comprises an authentication policy table, wherein the authentication policy table of the first server comprises an authentication policy of each server of the plurality of servers registered therein, and wherein an authentication policy for each server of the plurality of servers is defined as at least one rule of each server for authenticating users of the federated computing environment;
after said receiving the access request, said first server receiving input authentication information from the user;
said first server obtaining a server address of a second server having an authentication policy that matches an authentication policy of the first server;
said first server transmitting the input authentication information to a second server via the server address of the second server;
after said transmitting the input authentication information to the second server, said first server receiving from the second server a notification that the second server has successfully authorized the user; and
after said receiving the notification that the second server has successfully authorized the user, said first server permitting the user to access the federated computing environment.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, and system, and computer program product for authenticating a user. A first server of a plurality of servers receives an access request from the user to access a federated computing environment that comprises multiple servers. After receiving the access request, the first server: receives input authentication information from the user, obtains a server address of a second server having an authentication policy that matches an authentication policy of the first server, transmits the input authentication information to the second server via the server address of the second server, receives from the second server a notification that the second server has successfully authorized the user, and permits the user to access the federated computing environment.
-
Citations
18 Claims
-
1. A method for authenticating a user, comprising:
-
a first server of a plurality of servers receiving an access request from the user to access a federated computing environment that comprises the plurality of servers, wherein the first server comprises an authentication policy table, wherein the authentication policy table of the first server comprises an authentication policy of each server of the plurality of servers registered therein, and wherein an authentication policy for each server of the plurality of servers is defined as at least one rule of each server for authenticating users of the federated computing environment; after said receiving the access request, said first server receiving input authentication information from the user; said first server obtaining a server address of a second server having an authentication policy that matches an authentication policy of the first server; said first server transmitting the input authentication information to a second server via the server address of the second server; after said transmitting the input authentication information to the second server, said first server receiving from the second server a notification that the second server has successfully authorized the user; and after said receiving the notification that the second server has successfully authorized the user, said first server permitting the user to access the federated computing environment. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system comprising a processor and a non-transitory computer readable memory unit coupled to the processor, said memory unit containing program code configured to be executed by the processor to implement a method for authenticating a user, said method comprising:
-
a first server of a plurality of servers receiving an access request from the user to access a federated computing environment that comprises the plurality of servers, wherein the first server comprises an authentication policy table, wherein the authentication policy table of the first server comprises an authentication policy of each server of the plurality of servers registered therein, and wherein an authentication policy for each server of the plurality of servers is defined as at least one rule of each server for authenticating users of the federated computing environment; after said receiving the access request, said first server receiving input authentication information from the user; said first server obtaining a server address of a second server having an authentication policy that matches an authentication policy of the first server; said first server transmitting the input authentication information to a second server via the server address of the second server; after said transmitting the input authentication information to the second server, said first server receiving from the second server a notification that the second server has successfully authorized the user; and after said receiving the notification that the second server has successfully authorized the user, said first server permitting the user to access the federated computing environment. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product, comprising a non-transitory computer readable storage medium having program code stored therein, said program code configured to be executed by a computer processor to perform a method for authenticating a user, said method comprising:
-
a first server of a plurality of servers receiving an access request from the user to access a federated computing environment that comprises the plurality of servers, wherein the first server comprises an authentication policy table, wherein the authentication policy table of the first server comprises an authentication policy of each server of the plurality of servers registered therein, and wherein an authentication policy for each server of the plurality of servers is defined as at least one rule of each server for authenticating users of the federated computing environment; after said receiving the access request, said first server receiving input authentication information from the user; said first server obtaining a server address of a second server having an authentication policy that matches an authentication policy of the first server; said first server transmitting the input authentication information to a second server via the server address of the second server; after said transmitting the input authentication information to the second server, said first server receiving from the second server a notification that the second server has successfully authorized the user; and after said receiving the notification that the second server has successfully authorized the user, said first server permitting the user to access the federated computing environment. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification