Security management framework
First Claim
Patent Images
1. A computer-implemented method for providing access to a resource, the method comprising the steps of:
- validating, with an adapter, a request for access to a resource received from a software program located on a client computer based at least on a username, a password, and an IP address included in the request which identifies the software program;
identifying, with the adapter, an environment of the software program;
identifying, with the adapter, a resource file located on a server, wherein the resource file includes encrypted credentials for accessing the resource, and wherein the adapter is remote from the server;
retrieving encrypted credentials from the resource file based at least on the environment of the software program;
decrypting, with the server, the encrypted credentials; and
providing, with the adapter, decrypted credentials to the software program located on a client computer, wherein the software program is configured to use the decrypted credentials to access the resource.
1 Assignment
0 Petitions
Accused Products
Abstract
A framework is provided for securing and managing sensitive credential information required for a software program, such as an application or a script, to access a resource. The centralized framework validates a request for access to a resource received from the software program, retrieves the encrypted credentials associated with the requested resource, decrypts the encrypted credentials, and provides decrypted credentials to the software program for use in accessing the resource.
18 Citations
32 Claims
-
1. A computer-implemented method for providing access to a resource, the method comprising the steps of:
-
validating, with an adapter, a request for access to a resource received from a software program located on a client computer based at least on a username, a password, and an IP address included in the request which identifies the software program; identifying, with the adapter, an environment of the software program; identifying, with the adapter, a resource file located on a server, wherein the resource file includes encrypted credentials for accessing the resource, and wherein the adapter is remote from the server; retrieving encrypted credentials from the resource file based at least on the environment of the software program; decrypting, with the server, the encrypted credentials; and providing, with the adapter, decrypted credentials to the software program located on a client computer, wherein the software program is configured to use the decrypted credentials to access the resource. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
2. (canceled)
-
12. A system for providing access to a resource, the system comprising:
-
an adapter communicatively connected to a client computer configured to execute a software program, wherein the adapter is configured to; validate a request for access to a resource received from the software program located on the client computer based at least on a username, a password, and an IP address included in the request which identifies the software program, and identify an environment of the software program, identify a resource file stored in a computer-readable memory, wherein the resource file includes encrypted credentials for accessing the resource; and a server computer communicatively connected to the remotely located adapter, wherein the server computer is configured to; retrieve the encrypted credentials from the resource file based at least on the environment of the software program, decrypt the encrypted credentials, and provide the decrypted credentials to the software program located on the client computer via the adapter, wherein the decrypted credentials allow the software program to access the resource. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
13. (canceled)
-
14. (canceled)
-
15. (canceled)
-
24. (canceled)
-
25. (canceled)
-
26. (canceled)
-
27. (canceled)
-
28. A computer-readable storage medium storing computer code, wherein the computer code comprises:
-
code, executable by an adapter, configured for validating a request for access to a resource received from a software program located on a client computer based at least on a username, a password, and an IP address included in the request which identifies the software program; code, executable by the adapter, for identifying an environment of the software program, code, executable by the adapter, configured for identifying a resource file, wherein the resource file includes encrypted credentials for accessing the resource; code, executable by a server, configured for retrieving the encrypted credentials from the resource file based at least on the environment of the software program, and the server is remote from the adapter; code, executable by the server, configured for decrypting the encrypted credentials; and code, executable by the adapter, configured for providing decrypted credentials to the software program located on a client computer, wherein the decrypted credentials allow the software program to access the resource. - View Dependent Claims (29)
-
-
30. A computer-implemented method for providing access to a resource, the method comprising the steps of:
-
validating, with an adapter, a request for access to a resource received from a software program located on a client computer based at least on a username, a password, and an IP address included in the request which identifies the software program and a signature; identifying, with the adapter, an environment of the software program; identifying, with the adapter, a resource file located on a server based at least on the environment of the software program, wherein the resource file includes encrypted credentials for accessing the resource, wherein the encrypted credentials include a resource username, a resource password, a URL address of the resource, and meta data of the resource, and wherein the adapter is remote from the server; retrieving, with a server, environment-specific encrypted credentials from the resource file from a computer-readable memory based at least on the environment of the software program; decrypting, with the server, the encrypted credentials; and providing, with the adapter, decrypted credentials to the software program located on a client computer, wherein the decrypted credentials allow the software program to access the resource. - View Dependent Claims (31)
-
-
32. A system for providing access to a resource, the system comprising:
-
an adapter communicatively connected to a client computer configured to execute an application or a script, wherein the adapter is configured to; validate a request for access to a resource received from the application or the script based on a username, a password, and an IP address included in the request which identifies the application or the script and a signature, identify an environment of the software program; identify a resource file stored in a computer-readable memory based at least on the environment of the application or the script, wherein the resource file includes encrypted credentials for accessing the resource, wherein the credentials include a resource username, a resource password, a URL address of the resource, and meta data of the resource; and a server computer communicatively connected to the remotely located adapter, wherein the server computer is configured to; retrieve the encrypted credentials from the resource file based at least on the environment of the application or script; decrypt the encrypted credentials; and provide the decrypted credentials to the application or the script, wherein the decrypted credentials allow the application or the script to access the resource.
-
Specification