Detection And Repair Of Broken Single Sign-On Integration
First Claim
1. A computer-implemented method performed by an identity management system, the method comprising:
- storing, for each of a plurality a third-party services, a single sign-on (SSO) integration for the third-party service, the SSO integration comprising information enabling automated login to the third-party service; and
detecting, for a first one of the third-party services and a corresponding first one of the SSO integrations, that the first SSO integration is broken.
1 Assignment
0 Petitions
Accused Products
Abstract
An identity management system provides single sign-on (SSO) services to clients, logging the clients into a variety of third-party services for which the clients have accounts. An SSO integration is stored for each of the third-party services, the SSO integration including information that allows the identity management system to automate the login for the corresponding third-party service, such as locations of the login pages, and/or identities of username and password fields. The identity management system uses different techniques in different embodiments to detect that a given SSO integration is broken (i.e., no longer permits login for its corresponding third-party service) and/or to repair the SSO integration.
-
Citations
21 Claims
-
1. A computer-implemented method performed by an identity management system, the method comprising:
-
storing, for each of a plurality a third-party services, a single sign-on (SSO) integration for the third-party service, the SSO integration comprising information enabling automated login to the third-party service; and detecting, for a first one of the third-party services and a corresponding first one of the SSO integrations, that the first SSO integration is broken. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification