Technique for synchronizing security credentials using a trusted authenticating domain
First Claim
1. In a computing environment having a plurality of secure network connections, a computer program product for securely propagating security credentials using a trusted authenticating domain, the computer program product embodied on one or more computer-readable media and comprising:
- computer-readable program code means for receiving, by a password synchronization agent (“
PSA”
) from a user at a client device over a first secure connection between the client device and the PSA on which the PSA has authenticated itself to the client device, a password propagation request providing an identifier of the user and an identifying secret of the user;
computer-readable program code means for forwarding, by the PSA to a trusted authenticating domain over a second secure connection therebetween on which the trusted authenticating domain has authenticated itself to the PSA, the received user identifier and identifying secret, wherein the trusted authenticating domain stores identifying secrets for user identifiers only as secured, non-recoverable versions thereof;
computer-readable program code means for receiving, by the PSA from the trusted authenticating domain over the second connection, a validation result created by the trusted authenticating domain responsive to the forwarding, the validation result being a successful result if it indicates that the trusted authenticating domain had previously stored, for the user identifier, a secured version of the identifying secret; and
computer-readable program code means for propagating, if the validation result is the successful result, the received user identifier and identifying secret from the PSA to a master registry over a third mutually-authenticated secure connection therebetween, such that the master registry can store, for the user identifier, a secured version of the identifying secret, wherein the secured version stored by the master registry is not required to be identical to the secured version stored at the trusted authenticating domain.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a method, system, and computer program product for synchronizing security credentials of users and/or groups of users between directories, operating system platforms, and/or registries. A user'"'"'s security credentials at a master registry are to be securely set (or reset). To ensure that the user has the required permission for this operation, the user is first authenticated with a trusted authenticating domain. The authenticating domain may be identified by the user, or the identification of the domain may be obtained from the master registry. The master registry may store an identification of the authenticating domain on a per-user basis, or for groups of users, or for the master registry as a whole. The credentials may be propagated to other registries, in addition to the master. This technique enables synchronizing multiple copies of a user'"'"'s security credentials without requiring access to a plaintext version thereof, and without forcing the credentials to a new value as part of the synchronization process.
-
Citations
34 Claims
-
1. In a computing environment having a plurality of secure network connections, a computer program product for securely propagating security credentials using a trusted authenticating domain, the computer program product embodied on one or more computer-readable media and comprising:
-
computer-readable program code means for receiving, by a password synchronization agent (“
PSA”
) from a user at a client device over a first secure connection between the client device and the PSA on which the PSA has authenticated itself to the client device, a password propagation request providing an identifier of the user and an identifying secret of the user;computer-readable program code means for forwarding, by the PSA to a trusted authenticating domain over a second secure connection therebetween on which the trusted authenticating domain has authenticated itself to the PSA, the received user identifier and identifying secret, wherein the trusted authenticating domain stores identifying secrets for user identifiers only as secured, non-recoverable versions thereof; computer-readable program code means for receiving, by the PSA from the trusted authenticating domain over the second connection, a validation result created by the trusted authenticating domain responsive to the forwarding, the validation result being a successful result if it indicates that the trusted authenticating domain had previously stored, for the user identifier, a secured version of the identifying secret; and computer-readable program code means for propagating, if the validation result is the successful result, the received user identifier and identifying secret from the PSA to a master registry over a third mutually-authenticated secure connection therebetween, such that the master registry can store, for the user identifier, a secured version of the identifying secret, wherein the secured version stored by the master registry is not required to be identical to the secured version stored at the trusted authenticating domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 30)
-
-
15. A system for securely propagating security credentials using a trusted authenticating domain, comprising:
-
means for receiving by a password synchronization agent (“
PSA”
) from a user at a client device over a first secure connection between the client device and the PSA on which the PSA has authenticated itself to the client device, a password propagation request providing an identifier of the user and an identifying secret of the user;means for forwarding, by the PSA to a trusted authenticating domain over a second secure connection therebetween on which the trusted authenticating domain has authenticated itself to the PSA, the received user identifier and identifying secret, wherein the trusted authenticating domain stores identifying secrets for user identifiers only as secured, non-recoverable versions thereof; means for receiving, by the PSA from the trusted authenticating domain over the second connection, a validation result created by the trusted authenticating domain responsive to the forwarding, the validation result being a successful result if it indicates that the trusted authenticating domain had previously stored, for the user identifier, a secured version of the identifying secret; and means for propagating, if the validation result is the successful result, the received user identifier and identifying secret from the PSA to a master registry over a third mutually-authenticated source connection therebetween, such that the master registry can store, for the user identifier, a secured version of the identifying secret, wherein the secured version stored by the master registry is not required to be identical to the secured version stored at the trusted authenticating domain. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 31)
-
-
29. A computer-implemented method for securely propagating security credentials using a trusted authenticating domain, comprising steps of:
-
receiving, by a password synchronization agent (“
PSA”
) from a user at a client device over a first secure connection between the client device and the PSA on which the PSA has authenticated itself to the client device, a password propagation request providing an identifier of the user and an identifying secret of the user;forwarding, by the PSA to a trusted authenticating domain over a second secure connection therebetween on which the trusted authenticating domain has authenticated itself to the PSA, the received user identifier and identifying secret, wherein the trusted authenticating domain stores identifying secrets for user identifiers only as secured, non-recoverable versions thereof; receiving, by the PSA from the trusted authenticating domain over the second connection, a validation result created by the trusted authenticating domain responsive to the forwarding, the validation result being a successful result if it indicates that the trusted authenticating domain had previously stored, for the user identifier, a secured version of the identifying secret; and propagating, if the validation result is the successful result, the received user identifier and identifying secret from the PSA to a master registry over a third mutually-authenticated secure connection therebetween, such that the master registry can store, for the user identifier, a secured version of the identifying secret. - View Dependent Claims (32, 33, 34)
-
Specification