IDENTITY POOL BRIDGING FOR MANAGED DIRECTORY SERVICES
First Claim
1. A computer-implemented method for identity pool bridging, comprising:
- under the control of one or more computer systems configured with executable instructions,enabling a user to utilize a set of credentials to access an interface provided by a computing resource service provider to access a managed directory service;
receiving, at the computing resource service provider, a first request from the user to create an identity pool within the managed directory service of the computing resource service provider, the first request comprising information based at least in part on the set of credentials;
as a result of the first request, creating, at the managed directory service, the identity pool and a shadow administrative account within the identity pool, the shadow administrative account usable for managing access to a directory within the managed directory service;
transmitting, through the computing resource service provider and to the managed directory service, a second request from the user to obtain a directory token for accessing the shadow administrative account;
receiving the directory token from the managed directory service; and
enabling the user to utilize the received directory token to perform actions within the directory.
1 Assignment
0 Petitions
Accused Products
Abstract
A customer of a computing resource service provider may utilize a set of credentials to request creation of an identity pool within a managed directory service. Accordingly, the managed directory service may create the identity pool. Instead of having the customer create a separate account within this identity pool, the managed directory service may create a shadow administrator account within the identity pool, which may be used to manage other users and resources in the identity pool within the managed directory service. The managed directory service further exposes an application programming interface command that may be used to obtain a set of credentials for accessing the shadow administrator account. The customer may use this command to receive the set of credentials and access the shadow administrator account. Accordingly, the customer can manage users and resources in the identity pool within the managed directory service.
21 Citations
20 Claims
-
1. A computer-implemented method for identity pool bridging, comprising:
under the control of one or more computer systems configured with executable instructions, enabling a user to utilize a set of credentials to access an interface provided by a computing resource service provider to access a managed directory service; receiving, at the computing resource service provider, a first request from the user to create an identity pool within the managed directory service of the computing resource service provider, the first request comprising information based at least in part on the set of credentials; as a result of the first request, creating, at the managed directory service, the identity pool and a shadow administrative account within the identity pool, the shadow administrative account usable for managing access to a directory within the managed directory service; transmitting, through the computing resource service provider and to the managed directory service, a second request from the user to obtain a directory token for accessing the shadow administrative account; receiving the directory token from the managed directory service; and enabling the user to utilize the received directory token to perform actions within the directory. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. A computer system, comprising:
-
one or more processors; and memory having collectively stored therein instructions that, when executed by the computer system, cause the computer system to; authenticate a requestor utilizing credential information for accessing one or more services provided by a computing resource service provider; receive, from the requestor, a request to create an identity pool within a managed directory service provided by the computing resource service provider, the access to the managed directory service based at least in part on the credential information; after authenticating the requestor, create the identity pool within the managed directory service and an account usable by the requestor within the created identity pool; and enable the requestor to access the account from within the managed directory service. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium having collectively stored thereon executable instructions that, when executed by one or more processors of a computer system, cause the computer system to at least:
-
verify a requestor utilizing credential information to access one or more services provided by a computing resource service provider is authorized to access a managed directory service provided by the computing resource service provider; receive, from the requestor, a request to create an identity pool within the managed directory service; after verifying that the requestor is authorized to access the managed directory service, create the identity pool within the managed directory service and an account usable by the requestor within the created identity pool; and enable the requestor to access the account from within the managed directory service. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification