Query Interface to Policy Server
First Claim
1. A method for custom authentication, the method comprising:
- storing information in memory regarding a plurality of custom-authenticated user groups, wherein membership in each custom-authenticated user group is determined based on a user dossier;
receiving an access request sent over a communication network from a user of a client device, the access request including authentication information from the user; and
executing instructions stored in memory, wherein execution of the instructions by a processor;
identifies that the access request is associated with a custom-authenticated user group,determines that the authentication information in the access request does not meet the requirements of the dossier associated with the requested custom-authenticated user group,generates a query to one or more databases to obtain additional information to complete the dossier for the user, andpermits or denies the access request based on the completed dossier for the user.
32 Assignments
0 Petitions
Accused Products
Abstract
A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to determine whether an access request is made by a user. Each user belongs to one or more user groups and each information resource belongs to one or more information sets. Access is permitted or denied according to access policies which define access in terms of the user groups and information sets. The first access filter in the path performs the access check, encrypts and authenticates the request; the other access filters in the path do not repeat the access check. The interface used by applications to determine whether a user has access to an entity is now an SQL entity. The policy server assembles the information needed for the response to the query from various information sources, including source external to the policy server.
12 Citations
1 Claim
-
1. A method for custom authentication, the method comprising:
-
storing information in memory regarding a plurality of custom-authenticated user groups, wherein membership in each custom-authenticated user group is determined based on a user dossier; receiving an access request sent over a communication network from a user of a client device, the access request including authentication information from the user; and
executing instructions stored in memory, wherein execution of the instructions by a processor;identifies that the access request is associated with a custom-authenticated user group, determines that the authentication information in the access request does not meet the requirements of the dossier associated with the requested custom-authenticated user group, generates a query to one or more databases to obtain additional information to complete the dossier for the user, and permits or denies the access request based on the completed dossier for the user.
-
Specification