EFFICIENT SINGLE SIGN-ON AND IDENTITY PROVIDER CONFIGURATION AND DEPLOYMENT IN A DATABASE SYSTEM
First Claim
1. A method of deploying an identity provider service for a computer-implemented system, the method comprising:
- receiving a user command;
in response to receiving the user command, and without processing any additional user commands, user instructions, or user-entered data at the computer-implemented system, creating the identity provider service at the computer-implemented system; and
after creating the identity provider service, and without processing any additional user commands, user instructions, or user-entered data at the computer-implemented system, configuring the identity provider service to allow the computer-implemented system to publish electronic identity information for its users.
0 Assignments
0 Petitions
Accused Products
Abstract
Various techniques and procedures related to user authentication, identity providers, and single sign-on (SSO) are presented here. One approach creates an SSO link between two organizations in a streamlined manner using an internal cross-user systemwide digital certificate, and without processing any user-created, user-uploaded, or user-assigned digital certificates. Another approach presented here configures an identity provider service for an entity or organization by processing a single user command. The identity provider service is automatically configured in the background without processing any additional user commands, user instructions, or user-entered data.
-
Citations
18 Claims
-
1. A method of deploying an identity provider service for a computer-implemented system, the method comprising:
-
receiving a user command; in response to receiving the user command, and without processing any additional user commands, user instructions, or user-entered data at the computer-implemented system, creating the identity provider service at the computer-implemented system; and after creating the identity provider service, and without processing any additional user commands, user instructions, or user-entered data at the computer-implemented system, configuring the identity provider service to allow the computer-implemented system to publish electronic identity information for its users. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method of publishing electronic identity information for a user, the method comprising:
-
providing a first markup language document for presentation to the user, the first markup language document defining an active graphical user interface (GUI) element; receiving a user command that indicates activation of the active GUI element; in response to receiving the user command, and without requiring any additional user commands, user instructions, or user-entered data, creating an identity provider service at the computer-implemented system; and thereafter, providing a second markup language document for presentation to the user, the second markup language document confirming successful configuration of the identity provider service. - View Dependent Claims (9, 10, 11)
-
-
13. A computer system comprising a processor and a memory, wherein the memory comprises computer-executable instructions that, when executed by the processor, cause the computer system to:
-
receive a user command; in response to receiving the user command, and without processing any additional user commands, user instructions, or user-entered data at the computer system, create the identity provider service at the computer-implemented system; and after creating the identity provider service, and without processing any additional user commands, user instructions, or user-entered data at the computer system, configure the identity provider service to allow the computer system to publish electronic identity information for its users. - View Dependent Claims (12, 14, 15, 16, 17, 18)
-
Specification