CENTRALIZED PLUGGABLE AUTHENTICATION AND AUTHORIZATION
First Claim
Patent Images
1. A method comprising, by a first computing device of an infrastructure:
- receiving a request from a second computing device to access a first entity of the infrastructure, the second computing device being coupled to the first computing device, wherein the request comprises a first ticket previously assigned by the first computing device, and wherein the first ticket authenticates and authorizes the second computing device for access to at least a second entity of the infrastructure;
determining an eligibility of the second computing device to access at least the first entity of the infrastructure based at least on the first ticket and the first entity; and
if the second computing device is determined to be eligible to access the first entity, assigning a second ticket to the second computing device responsive to the received request, wherein the second ticket authenticates and authorizes the second computing device for access to at least the first entity of the infrastructure.
14 Assignments
0 Petitions
Accused Products
Abstract
In particular embodiments, a first computing device may receive a request from a second computing device to access a first entity of an infrastructure, the second computing device being coupled to the first computing device, then determining an eligibility of the second computing device to access as least the first entity of the infrastructure, and if the second computing device is determined to be eligible to access the first entity, then assigning a second ticket to the second computing device responsive to the received request.
-
Citations
20 Claims
-
1. A method comprising, by a first computing device of an infrastructure:
-
receiving a request from a second computing device to access a first entity of the infrastructure, the second computing device being coupled to the first computing device, wherein the request comprises a first ticket previously assigned by the first computing device, and wherein the first ticket authenticates and authorizes the second computing device for access to at least a second entity of the infrastructure; determining an eligibility of the second computing device to access at least the first entity of the infrastructure based at least on the first ticket and the first entity; and if the second computing device is determined to be eligible to access the first entity, assigning a second ticket to the second computing device responsive to the received request, wherein the second ticket authenticates and authorizes the second computing device for access to at least the first entity of the infrastructure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. One or more computer-readable non-transitory storage media embodying logic that is operable when executed to:
by a first computing device of an infrastructure; receiving a request from a second computing device to access a first entity of the infrastructure, the second computing device being coupled to the first computing device, wherein the request comprises a first ticket previously assigned by the first computing device, and wherein the first ticket authenticates and authorizes the second computing device for access to at least a second entity of the infrastructure; determining an eligibility of the second computing device to access at least the first entity of the infrastructure based at least on the first ticket and the first entity; and if the second computing device is determined to be eligible to access the first entity, assigning a second ticket to the second computing device responsive to the received request, wherein the second ticket authenticates and authorizes the second computing device for access to at least the first entity of the infrastructure. - View Dependent Claims (12, 13, 14, 15)
-
16. An information handling system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; by a first computing device of an infrastructure; receiving a request from a second computing device to access a first entity of the infrastructure, the second computing device being coupled to the first computing device, wherein the request comprises a first ticket previously assigned by the first computing device, and wherein the first ticket authenticates and authorizes the second computing device for access to at least a second entity of the infrastructure; determining an eligibility of the second computing device to access at least the first entity of the infrastructure based at least on the first ticket and the first entity; and if the second computing device is determined to be eligible to access the first entity, assigning a second ticket to the second computing device responsive to the received request, wherein the second ticket authenticates and authorizes the second computing device for access to at least the first entity of the infrastructure. - View Dependent Claims (17, 18, 19, 20)
-
Specification