MULTIPLE RESOURCE SERVERS INTERACTING WITH SINGLE OAUTH SERVER
First Claim
1. A computer-implemented method comprising:
- receiving, at an OAuth authorization server, a request from a first client application that executes in a context of a first identity domain of a plurality of isolated identity domains;
selecting, from a plurality of OAuth service profiles that the OAuth authorization server maintains, a first OAuth service profile that is applicable only to the first identity domain;
determining, based on the first OAuth service profile, whether the first client application is permitted to access a first resource server;
in response to determining that the first client application is permitted to access the first resource server, generating a first token for the first client application based on scope information that the OAuth authorization server obtains from the first resource server;
receiving, at the OAuth authorization server, a request from a second client application that executes in a context of a second identity domain of the plurality of isolated identity domains, the second identity domain being separate from the first identity domain;
selecting, from the plurality of OAuth service profiles that the OAuth authorization server maintains, a second OAuth service profile that is applicable only to the second identity domain;
determining, based on the second OAuth service profile, whether the second client application is permitted to access a second resource server; and
in response to determining that the second client application is permitted to access the second resource server, generating a second token for the second client application based on scope information that the OAuth authorization server obtains from the second resource server.
1 Assignment
0 Petitions
Accused Products
Abstract
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access.
59 Citations
19 Claims
-
1. A computer-implemented method comprising:
-
receiving, at an OAuth authorization server, a request from a first client application that executes in a context of a first identity domain of a plurality of isolated identity domains; selecting, from a plurality of OAuth service profiles that the OAuth authorization server maintains, a first OAuth service profile that is applicable only to the first identity domain; determining, based on the first OAuth service profile, whether the first client application is permitted to access a first resource server; in response to determining that the first client application is permitted to access the first resource server, generating a first token for the first client application based on scope information that the OAuth authorization server obtains from the first resource server; receiving, at the OAuth authorization server, a request from a second client application that executes in a context of a second identity domain of the plurality of isolated identity domains, the second identity domain being separate from the first identity domain; selecting, from the plurality of OAuth service profiles that the OAuth authorization server maintains, a second OAuth service profile that is applicable only to the second identity domain; determining, based on the second OAuth service profile, whether the second client application is permitted to access a second resource server; and in response to determining that the second client application is permitted to access the second resource server, generating a second token for the second client application based on scope information that the OAuth authorization server obtains from the second resource server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable memory comprising instructions which, when executed by one or more processors, cause the one or more processors to perform:
-
receiving, at an OAuth authorization server, a request from a first client application that executes in a context of a first identity domain of a plurality of isolated identity domains; selecting, from a plurality of OAuth service profiles that the OAuth authorization server maintains, a first OAuth service profile that is applicable only to the first identity domain; determining, based on the first OAuth service profile, whether the first client application is permitted to access a first resource server; in response to determining that the first client application is permitted to access the first resource server, generating a first token for the first client application based on scope information that the OAuth authorization server obtains from the first resource server; receiving, at the OAuth authorization server, a request from a second client application that executes in a context of a second identity domain of the plurality of isolated identity domains, the second identity domain being separate from the first identity domain; selecting, from the plurality of OAuth service profiles that the OAuth authorization server maintains, a second OAuth service profile that is applicable only to the second identity domain; determining, based on the second OAuth service profile, whether the second client application is permitted to access a second resource server; and in response to determining that the second client application is permitted to access the second resource server, generating a second token for the second client application based on scope information that the OAuth authorization server obtains from the second resource server. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An OAuth authorization server comprising:
-
one or more hardware processors configured to receive, at an OAuth authorization server, a request from a first client application that executes in a context of a first identity domain of a plurality of isolated identity domains; one or more hardware processors configured to select, from a plurality of OAuth service profiles that the OAuth authorization server maintains, a first OAuth service profile that is applicable only to the first identity domain; one or more hardware processors configured to determine, based on the first OAuth service profile, whether the first client application is permitted to access a first resource server; one or more hardware processors configured to generate, in response to determining that the first client application is permitted to access the first resource server, a first token for the first client application based on scope information that the OAuth authorization server obtains from the first resource server; one or more hardware processors configured to receive, at the OAuth authorization server, a request from a second client application that executes in a context of a second identity domain of the plurality of isolated identity domains, the second identity domain being separate from the first identity domain; one or more hardware processors configured to select, from the plurality of OAuth service profiles that the OAuth authorization server maintains, a second OAuth service profile that is applicable only to the second identity domain; one or more hardware processors configured to determine, based on the second OAuth service profile, whether the second client application is permitted to access a second resource server; and one or more hardware processors configured to generate, in response to determining that the second client application is permitted to access the second resource server, a second token for the second client application based on scope information that the OAuth authorization server obtains from the second resource server.
-
Specification