TECHNIQUES FOR VIRTUAL REPRESENTATIONAL STATE TRANSFER (REST) INTERFACES
First Claim
1. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
- configuring a proxy device to act as an intermediary between a client and a Representational State Transfer (REST) service executing on a server of the network;
intercepting, at the proxy device, a REST formatted request sent from the client to the REST service;
enforcing, at the proxy device, an enterprise policy against the REST formatted request; and
providing, by the proxy device, the REST formatted request when the enterprise policy is satisfied to the REST service for processing on behalf of the client.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.
80 Citations
20 Claims
-
1. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
-
configuring a proxy device to act as an intermediary between a client and a Representational State Transfer (REST) service executing on a server of the network; intercepting, at the proxy device, a REST formatted request sent from the client to the REST service; enforcing, at the proxy device, an enterprise policy against the REST formatted request; and providing, by the proxy device, the REST formatted request when the enterprise policy is satisfied to the REST service for processing on behalf of the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
-
interposing a proxy between a Representational State Transfer (REST) service and a client of the network; enforcing security, at the proxy, between interactions of the REST service and the client; selectively modifying, at the proxy, the interactions between the REST service and the client; and auditing, at the proxy, the interactions between the REST service and the client. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 18, 19, 20)
-
-
17. A multiprocessor-implemented system, comprising:
-
a proxy service implemented in a computer-readable storage medium and to execute on a proxy of a network; the proxy service configured to act as an intermediary between clients of a network and Representational State Transfer (REST) servers to authenticate client requests, translate the requests, and enforce enterprise policy against the requests, and the proxy service configured to authenticate REST server responses, translate the responses and enforce the enterprise policy against the responses.
-
Specification