SECURITY TOKENS FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
First Claim
1. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to provide cloud-based identity and access management, the providing comprising:
- receiving a request from a client for obtaining an access token for a user to access a resource;
determining, based on the request, a tenancy of the client, a tenancy of the user, and a tenancy of the resource;
accessing a microservice based on the request; and
performing an identity management service by the microservice based on the request, wherein the identity management service includes generating the access token that identifies the tenancy of the resource and the tenancy of the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A system provides cloud-based identity and access management. The system receives a request from a client for obtaining an access token for a user to access a resource. The system determines, based on the request, a tenancy of the client, a tenancy of the user, and a tenancy of the resource. The system accesses a microservice based on the request, and performs an identity management service by the microservice based on the request, where the identity management service includes generating the access token that identifies the tenancy of the resource and the tenancy of the user.
-
Citations
20 Claims
-
1. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to provide cloud-based identity and access management, the providing comprising:
-
receiving a request from a client for obtaining an access token for a user to access a resource; determining, based on the request, a tenancy of the client, a tenancy of the user, and a tenancy of the resource; accessing a microservice based on the request; and performing an identity management service by the microservice based on the request, wherein the identity management service includes generating the access token that identifies the tenancy of the resource and the tenancy of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of providing cloud-based identity and access management, comprising:
-
receiving a request from a client for obtaining an access token for a user to access a resource; determining, based on the request, a tenancy of the client, a tenancy of the user, and a tenancy of the resource; accessing a microservice based on the request; and performing an identity management service by the microservice based on the request, wherein the identity management service includes generating the access token that identifies the tenancy of the resource and the tenancy of the user. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system for providing cloud-based identity and access management, comprising:
-
a receiving module that receives a request from a client for obtaining an access token for a user to access a resource; a determining module that determines, based on the request, a tenancy of the client, a tenancy of the user, and a tenancy of the resource; an accessing module that accesses a microservice based on the request; and a performing module that performs an identity management service by the microservice based on the request, wherein the identity management service includes generating the access token that identifies the tenancy of the resource and the tenancy of the user.
-
Specification