POLICY ENFORCEMENT POINT FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
First Claim
1. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to provide cloud-based identity and access management, the providing comprising:
- receiving a request by a cloud gate for an identity management service for reaching an application;
determining a tenancy from a header value of the request;
looking up a policy configured to be applied for the tenancy;
applying the policy to the request; and
sending the request to a microservice based on a result of the applying of the policy to the request, wherein the microservice performs the identity management service for reaching the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system provides cloud-based identity and access management. The system receives a request by a web gate for an identity management service for reaching an application, and determines a tenancy from a header value of the request. The system looks up a policy configured to be applied for the tenancy, and applies the policy to the request. The system then sends the request to a microservice based on a result of the applying of the policy to the request, where the microservice performs the identity management service for reaching the application.
-
Citations
20 Claims
-
1. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to provide cloud-based identity and access management, the providing comprising:
-
receiving a request by a cloud gate for an identity management service for reaching an application; determining a tenancy from a header value of the request; looking up a policy configured to be applied for the tenancy; applying the policy to the request; and sending the request to a microservice based on a result of the applying of the policy to the request, wherein the microservice performs the identity management service for reaching the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of providing cloud-based identity and access management, comprising:
-
receiving a request by a cloud gate for an identity management service for reaching an application; determining a tenancy from a header value of the request; looking up a policy configured to be applied for the tenancy; applying the policy to the request; and sending the request to a microservice based on a result of the applying of the policy to the request, wherein the microservice performs the identity management service for reaching the application. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for providing cloud-based identity and access management, comprising:
-
a receiving module that receives a request by a cloud gate for an identity management service for reaching an application; a determining module that determines a tenancy from a header value of the request; a look up module that looks up a policy configured to be applied for the tenancy; an applying module that applies the policy to the request; and a sending module that sends the request to a microservice based on a result of the applying of the policy to the request, wherein the microservice performs the identity management service for reaching the application.
-
Specification