HANDLING CLAIMS TRAVERSING SECURITY BOUNDARIES
First Claim
1. In a computing environment having a plurality of security contexts, a method of sharing security claims across different security contexts, the method comprising:
- for a first security context, identifying a first set of security claims;
modifying the first set of security claims to create a second set of security claims that is allowed to be sent from the first security context;
for a second security context, identifying security claim requirements; and
modifying the second set of security claims to satisfy the security claim requirements for the second security context.
2 Assignments
0 Petitions
Accused Products
Abstract
Sharing security claims across different security contexts. A method includes, for a first security context, identifying a first set of security claims. The method further includes for the first security context identifying a second set of security claims from the first set of security claims that is allowed to be sent from the first security context. The first set of security claims is modified to create the second set of security claims. For a second security context, security claim requirements are identified. The second set of security claims is modified to satisfy the security claim requirements for the second security context.
6 Citations
20 Claims
-
1. In a computing environment having a plurality of security contexts, a method of sharing security claims across different security contexts, the method comprising:
-
for a first security context, identifying a first set of security claims; modifying the first set of security claims to create a second set of security claims that is allowed to be sent from the first security context; for a second security context, identifying security claim requirements; and modifying the second set of security claims to satisfy the security claim requirements for the second security context. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. One or more computer readable media comprising computer executable instructions that when executed by one or more processors cause one or more processors to perform the following:
-
for a first security context, identifying a first set of security claims; modifying the first set of security claims to create a second set of security claims that is allowed to be sent from the first security context; for a second security context, identifying security claim requirements; and modifying the second set of security claims to satisfy the security claim requirements for the second security context. - View Dependent Claims (16, 17, 18, 19)
-
-
20. In a computing environment having a plurality of security contexts, a computing system configured to share security claims across different security contexts, the system comprising:
-
a first security context, wherein the first security context comprises a scope within which claims are interpreted uniformly for the first security context; a first claims transformation engine embodied in the first security context, wherein the first claims transformation engine is configured to; identify a first set of security claims that are valid for the first security context; and modify the first set of security claims to create a second set of security claims that is allowed to be sent from the first security context; a second security context, wherein the second security context comprises a scope within which claims are interpreted uniformly for the second security context; and a second claims transformation engine embodied in the second security context, wherein the second claims transformation engine is configured to modify the second set of security claims to satisfy the security claim requirements for the second security context.
-
Specification