Propagating Delegated Authorized Credentials Through Legacy Systems
First Claim
1. A method implemented by an information handling system comprising:
- receiving, over an electronic data channel, an access token from a requestor;
validating the received access token;
generating an error in response to an unsuccessful validation; and
in response to a successful validation;
retrieving one or more legacy access tokens that correspond to the received access token; and
transmitting the one or more retrieved legacy access tokens to the requestor over the electronic data channel.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided to access resources at legacy systems. In this approach, a resource request destined to a legacy system is receiving from a requestor with the resource request including an access token and being on behalf of a resource owner. A validation process is performed on the access token. If the access token is valid, the approach identifies the resource owner and one or more legacy access tokens used to access the legacy system. Another request is formed with the new request including the legacy access tokens. The new request is transmitted to the legacy system and a response is received back from the legacy system. The response received from the legacy system is transmitted back to the requestor.
-
Citations
25 Claims
-
1. A method implemented by an information handling system comprising:
-
receiving, over an electronic data channel, an access token from a requestor; validating the received access token; generating an error in response to an unsuccessful validation; and in response to a successful validation; retrieving one or more legacy access tokens that correspond to the received access token; and transmitting the one or more retrieved legacy access tokens to the requestor over the electronic data channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An information handling system comprising:
-
one or more processors; a memory coupled to at least one of the processors; a network adapter that connects the information handling system to a computer network; and a set of instructions stored in the memory and executed by at least one of the processors, wherein the set of instructions perform actions of; receiving, over an electronic data channel, an access token from a requestor; validating the received access token; generating an error in response to an unsuccessful validation; and in response to a successful validation; retrieving one or more legacy access tokens that correspond to the received access token; and transmitting the one or more retrieved legacy access tokens to the requestor over the electronic data channel. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product stored in a computer readable storage medium, comprising computer instructions that, when executed by an information handling system, causes the information handling system to perform actions that include:
-
receiving, over an electronic data channel, an access token from a requestor; validating the received access token; generating an error in response to an unsuccessful validation; and in response to a successful validation; retrieving one or more legacy access tokens that correspond to the received access token; and transmitting the one or more retrieved legacy access tokens to the requestor over the electronic data channel. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A method implemented by an information handling system comprising:
-
receiving, from a requestor, a first resource request destined to a legacy system, wherein the first resource request includes an access token, and wherein the first resource request is on behalf of a resource owner; performing a validation process on the access token; returning an error in response to the access token being invalid; and in response to the access token being valid; identifying the resource owner corresponding to the access token; identifying one or more legacy access tokens used to access the legacy system; forming a second resource request that includes at least one of the one or more legacy access tokens; transmitting the second resource request to the legacy system; receiving a response from the legacy system; and transmitting the response to the requestor.
-
Specification