Integrating legacy application/data access with single sign-on in a distributed computing environment
First Claim
1. A method of integrating legacy access with single sign-on in a distributed computing environment, comprising steps of:
- establishing a first secure session from a client on a user'"'"'s workstation to a server, wherein the secure session establishment authenticates the user'"'"'s identity from identifying information passed from the client;
storing the identifying information in a security token accessible to the server; and
using the identifying information stored in the security token to authenticate the user for access to a legacy host application or system, whereby the authentication occurs programmatically and does not require the user to re-enter his identifying information,wherein the step of using the identifying information further comprises the steps of;
requesting a legacy host access agent to generate a password substitute, based on the user'"'"'s identifying information from the security token and an identifier of the legacy host application or system;
passing the password substitute and a legacy host identifier of the user to the client on the user workstation;
establishing a second secure session between an emulator client operating on the user'"'"'s workstation and an emulator server on a host where the legacy host application or system will be accessible;
receiving a sign-on data stream from the legacy host application or system at the emulator client over the second secure session;
programmatically inserting the password substitute and the legacy host identifier into the sign-on data stream, creating a modified data stream;
returning the modified data stream from the emulator client to the emulator server, over the second secure session; and
sending, by the legacy host application or system, the password substitute and the legacy host identifier to the legacy host access agent for transparently authenticating the user.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modem distributed computing environment. A security token used for signing on to the modem computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modem computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.
108 Citations
10 Claims
-
1. A method of integrating legacy access with single sign-on in a distributed computing environment, comprising steps of:
-
establishing a first secure session from a client on a user'"'"'s workstation to a server, wherein the secure session establishment authenticates the user'"'"'s identity from identifying information passed from the client; storing the identifying information in a security token accessible to the server; and using the identifying information stored in the security token to authenticate the user for access to a legacy host application or system, whereby the authentication occurs programmatically and does not require the user to re-enter his identifying information, wherein the step of using the identifying information further comprises the steps of; requesting a legacy host access agent to generate a password substitute, based on the user'"'"'s identifying information from the security token and an identifier of the legacy host application or system; passing the password substitute and a legacy host identifier of the user to the client on the user workstation; establishing a second secure session between an emulator client operating on the user'"'"'s workstation and an emulator server on a host where the legacy host application or system will be accessible; receiving a sign-on data stream from the legacy host application or system at the emulator client over the second secure session; programmatically inserting the password substitute and the legacy host identifier into the sign-on data stream, creating a modified data stream; returning the modified data stream from the emulator client to the emulator server, over the second secure session; and sending, by the legacy host application or system, the password substitute and the legacy host identifier to the legacy host access agent for transparently authenticating the user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product for integrating legacy access with single sign-on in a distributed computing environment, the computer program product embodied on one or more computer-readable media and comprising:
-
computer-readable program code means for establishing a first secure session from a client on a user'"'"'s workstation to a server, wherein the secure session establishment authenticates the user'"'"'s identity from identifying information passed from the client; computer-readable program code means for storing the identifying information in a security token accessible to the server; and computer-readable program code means for using the identifying information stored in the security token to authenticate the user for access to a legacy host application or system, whereby the authentication occurs programmatically and does not require the user to re-enter his identifying information, wherein the computer-readable program code means for using the identifying information further comprises; computer-readable program code means for requesting a legacy host access agent to generate a password substitute, based on the user'"'"'s identifying information from the security token and an identifier of the legacy host application or system; computer-readable program code means for passing the password substitute and a legacy host identifier of the user to the client on the user workstation; computer-readable program code means for establishing a second secure session between an emulator client operating on the user'"'"'s workstation and an emulator server on a host where the legacy host application or system will be accessible; computer-readable program code means for receiving a sign-on data stream from the legacy host application or system at the emulator client over the second secure session; computer-readable program code means for programmatically inserting the password substitute and the legacy host identifier into the sign-on data stream, creating a modified data stream; computer-readable program code means for returning the modified data stream from the emulator client to the emulator server, over the second secure session; and computer-readable program code means for sending, by the legacy host application or system, the password substitute and the legacy host identifier to the legacy host access agent for transparently authenticating the user. - View Dependent Claims (7, 8, 9, 10)
-
Specification