Proxy system
First Claim
Patent Images
1. A method for allowing proxies in an integrated Identity System and Access System, comprising the steps of:
- receiving from a user of the integrated Identity System and Access System a request for the user to be a proxy for an administrator of the integrated Identity System and Access System;
associating said user with one or more credentials of said administrator without authenticating said user as said administrator;
allowing said user to use said Identity System as said administrator based on said one or more credentials of said administrator; and
allowing said user to use said Access System to access resources as proxy for said administrator based on one or more credentials of said user but not the one or more credentials of said administrator, wherein said user has all rights and privileges of said administrator while acting as proxy for said administrator.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to technology for using a proxy in an Identity System. When a first entity is on vacation, on a business trip or otherwise unavailable to perform certain actions on an Identity System, a second entity can act as a proxy for the first entity. The Identity System will provide the second entity, acting as a proxy, with the privileges, access and rights of the first entity. In one embodiment, Identity System is part of an integrated Identity and Access System, and the second entity is a proxy in the Identity System but not in the Access System.
210 Citations
36 Claims
-
1. A method for allowing proxies in an integrated Identity System and Access System, comprising the steps of:
-
receiving from a user of the integrated Identity System and Access System a request for the user to be a proxy for an administrator of the integrated Identity System and Access System; associating said user with one or more credentials of said administrator without authenticating said user as said administrator; allowing said user to use said Identity System as said administrator based on said one or more credentials of said administrator; and allowing said user to use said Access System to access resources as proxy for said administrator based on one or more credentials of said user but not the one or more credentials of said administrator, wherein said user has all rights and privileges of said administrator while acting as proxy for said administrator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving from a user of an integrated Identity System and Access System a request for the user to be a proxy for an administrator of the integrated Identity System and Access System; associating said user with one or more credentials of said administrator without authenticating said user as said administrator; allowing said user to use said Identity System as said administrator based on said one or more credentials of said administrator; and allowing said user to use said Access System to access resources as proxy for said administrator based on one or more credentials of said user but not the one or more credentials of said administrator, wherein said user has all fights and privileges of said administrator while acting as proxy for said administrator. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. An apparatus comprising:
-
one or more communication interfaces; one or more storage devices; and one or more processors in communication with said one or more storage devices and said one or more communication interfaces, said processors adapted to provide an integrated Identity System and Access System and to perform a method comprising the steps of; receiving from a user of the integrated Identity System and Access System a request for the user to be a proxy for an administrator of the integrated Identity System and Access System, associating said user with one or more credentials of said administrator without authenticating said user as said administrator, allowing said user to use said Identity System as said administrator based on said one or more credentials of said administrator, and allowing said user to use said Access System to access resources as proxy for said administrator based on one or more credentials of said user but not the one or more credentials of said administrator, wherein said user has all rights and privileges of said administrator while acting as proxy for said administrator. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
Specification