Apparatus and method for managing multiple user identities on a networked computer system
First Claim
1. An apparatus comprising:
- at least one processor;
a memory coupled to the at least one processor;
first software residing in the memory and executed by the at least one processor, the first software including a first user registry that contains a first user identity for a selected user that is used to authenticate the selected user to the first software;
second software residing in the memory and executed by the at least one processor, the second software including a second user registry that contains a second user identity for the selected user that is used to authenticate the selected user to the second software; and
an identity mapping mechanism that provides a mapping between the first user identity and the second user identity.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method allow a system administrator to manage multiple user identities in multiple user registries in different processing environments. An identity mapping mechanism is provided that includes a directory service that includes entries that reference user identities in the multiple registries, and that reference identity mappings between those entries. The identity mapping mechanism includes an interface defined by a plurality of APIs that allow accessing and correlating the multiple user identities and the identity mappings. A programmer can generate an application or tool that uses the identity mapping mechanism by calling the APIs in the interface. In this manner, administration of user identities occurs with the user as the primary focus, rather than the platform. In addition, a common tool can be used to manage the user identities of different environments, making administration of user identities in a heterogenous network more efficient and cost-effective.
95 Citations
27 Claims
-
1. An apparatus comprising:
-
at least one processor; a memory coupled to the at least one processor; first software residing in the memory and executed by the at least one processor, the first software including a first user registry that contains a first user identity for a selected user that is used to authenticate the selected user to the first software; second software residing in the memory and executed by the at least one processor, the second software including a second user registry that contains a second user identity for the selected user that is used to authenticate the selected user to the second software; and an identity mapping mechanism that provides a mapping between the first user identity and the second user identity. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
at least one processor; a memory coupled to the at least one processor; first software residing in the memory and executed by the at least one processor, the first software including a first user registry containing a first plurality of user identities that are used to authenticate users to the first software; second software residing in the memory and executed by the at least one processor, the second software including a second user registry residing in the memory containing a second plurality of user identities that are used to authenticate users to the second software; a directory service that contains a plurality of user identity mappings that correlate a first user identity in the first user registry to a second user identity in the second user registry, and that references the first and second user registries; and schema for the directory service that specifies relationships between a plurality of entries in the directory service, where at least one entry includes the user identity mappings. - View Dependent Claims (8, 9, 10, 11, 27)
-
-
12. A method for managing a plurality of user identities on a plurality of computer systems coupled to a network, each user identity corresponding to a defined processing environment, the method comprising the steps of:
-
providing an identity mapping mechanism that provides a mapping between a first user identity in a first user registry in first software and a second user identity in a second user registry in second software, wherein the first user identity is used to authenticate a selected user to the first software and the second user identity is used to authenticate the selected user to the second software; and invoking the identity mapping mechanism to determine the mapping between the first user identity and the second user identity. - View Dependent Claims (13, 14)
-
-
15. A method for correlating a plurality of user identities on a plurality of computer systems coupled to a network, the method comprising the steps of:
-
generating a global identifier corresponding to a user; mapping a first user identity in a first user registry in first software to the global identifier, wherein the first user identity is used to authenticate a selected user to the first software; and mapping a second user identity in a second user registry in second software to the global identifier, wherein the second user identity is used to authenticate the selected user to the second software.
-
-
16. A program product comprising:
-
(A) an identity mapping mechanism that provides a mapping between; (A1) a first user identity for a selected user residing in a first user registry in first software, wherein the first user identity is used to authenticate a selected user to the first software; and (A2) a second user identity for the selected user residing in a second user registry in second software, wherein the second user identity is used to authenticate a selected user to the second software; and (B) computer-readable signal bearing media bearing the identity mapping mechanism. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A program product comprising:
-
(A) a directory service that contains a plurality of user identity mappings that correlate a first user identity in a first user registry in first software to a second user identity in a second user registry in second software, and that references the first and second user registries, wherein the first user identity is used to authenticate a selected user to the first software and the second user identity is used to authenticate the selected user to the second software; and (B) schema for the directory service that specifies relationships between a plurality of entries in the directory service, where at least one entry includes the user identity mappings; and (C) computer-readable recordable media media bearing the directory service and the schema. - View Dependent Claims (23, 24, 25, 26)
-
Specification