UNIFIED SYSTEM INTERFACE FOR AUTHENTICATION AND AUTHORIZATION
First Claim
1. A computer-implemented method for authorizing access of a privileged application, the method comprising:
- receiving, at an authorization framework via an authorization application programming interface (API), a request from a trusted application for authorizing a client application, the client application requesting a service provided by the trusted application;
authorizing, by the authorization framework in response to the request, the client application in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service;
authenticating, by the authorization framework, a user associated with the client application to determine whether the user is allowed to access the requested service; and
returning, from the authorization framework via the authorization API, a value to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication.
2 Assignments
0 Petitions
Accused Products
Abstract
A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a client application, where the client application requests a service provided by the trusted application. In response to the request, the client application is authorized in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service. A user associated with the client application is authenticated to determine whether the user is allowed to access the requested service. Thereafter, a value is returned from the authorization framework via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication.
-
Citations
21 Claims
-
1. A computer-implemented method for authorizing access of a privileged application, the method comprising:
-
receiving, at an authorization framework via an authorization application programming interface (API), a request from a trusted application for authorizing a client application, the client application requesting a service provided by the trusted application; authorizing, by the authorization framework in response to the request, the client application in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service; authenticating, by the authorization framework, a user associated with the client application to determine whether the user is allowed to access the requested service; and returning, from the authorization framework via the authorization API, a value to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer readable storage medium including instructions that, when executed by a processing system, cause the processing system to perform a method comprising:
-
receiving, at an authorization framework via an authorization application programming interface (API), a request from a trusted application for authorizing a client application, the client application requesting a service provided by the trusted application; authorizing, by the authorization framework in response to the request, the client application in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service; authenticating, by the authorization framework, a user associated with the client application to determine whether the user is allowed to access the requested service; and returning, from the authorization framework via the authorization API, a value to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for authorizing access of a privileged application, the system comprising:
-
an authorization application programming interface (API) to receive an authorization application programming interface (API), a request from a trusted application for authorizing a client application, the client application requesting a service provided by the trusted application; an authorization unit coupled to the authorization API to authorize, in response to the request, the client application in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service; and an authentication unit coupled to the authorization unit to authenticate a user associated with the client application to determine whether the user is allowed to access the requested service, wherein a value is returned via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification