MOBILE APPLICATION, IDENTITY INTERFACE
First Claim
1. A system, comprising:
- a memory storing a plurality of instructions; and
one or more processors configured to access the memory, wherein the one or more processors are further configured to execute the plurality of instructions to;
receive, from a client application, a request to perform a function associated with a service provider, the request formatted as a representational state transfer (REST) call;
determine, based at least in part on the REST call, an access management service call corresponding to the service provider for which performance of the function is requested; and
perform the access management service call.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for managing identities are provided. In some examples, identity management, authentication, authorization, and token exchange frameworks may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more identity management operations associated with an account of a service provider. Based at least in part on the requested operation and/or the particular service provider, an application programming interface (API) may be utilized to generate and/or perform one or more instructions and/or method calls for managing identity information of the service provider.
-
Citations
20 Claims
-
1. A system, comprising:
-
a memory storing a plurality of instructions; and one or more processors configured to access the memory, wherein the one or more processors are further configured to execute the plurality of instructions to; receive, from a client application, a request to perform a function associated with a service provider, the request formatted as a representational state transfer (REST) call; determine, based at least in part on the REST call, an access management service call corresponding to the service provider for which performance of the function is requested; and perform the access management service call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method, comprising:
-
receiving, by a computer system, a representational state transfer (REST) interface access request for accessing a third-party server, the REST interface access request received from a client application; determining, by the computer system, an access management service call corresponding to the third-party server for which access is requested, the determining based at least in part on the REST interface access request received from the client application; providing, by the computer system, the access management service call to an access management service associated with the third-party server for which access is requested, the access management service call including a token request for accessing the third-party server; receiving, by the computer system, a token for accessing the third-party server; and providing, by the computer system, the token to the client application. - View Dependent Claims (12, 13, 14)
-
-
15. A computer-readable memory storing a plurality of instructions executable by one or more processors, the plurality of instructions comprising:
-
instructions that cause the one or more processors to receive, from a user agent, a representational state transfer (REST) interface call for requesting access to a service provider; instructions that cause the one or more processors to determine, based at least in part on the REST interface call from the user agent, a method call for utilizing an access management service associated with the service provider, a format of the method call corresponding to the access management service; instructions that cause the one or more processors to transmit, to the access management service associated with the service provider, the method call for utilizing the access management service; instructions that cause the one or more processors to receive, from the access management service, an access decision; and instructions that cause the one or more processors to provide, based at least in part on access decision, an access token to the client application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification