×

Systems and methods for integration adapter security

  • US 7,546,462 B2
  • Filed: 10/15/2002
  • Issued: 06/09/2009
  • Est. Priority Date: 10/18/2001
  • Status: Active Grant
First Claim
Patent Images

1. A system for restricting access to an enterprise information system for a validated system user, comprising:

  • a computer including an application server running thereon;

    an intermediate abstraction layer at the application server, including an application view component that provides an interface between a client application and an enterprise information system, and allows the client application to communicate requests for resources to the enterprise information system;

    a security service in communication with the intermediate abstraction layer that, for each request from the client application for a particular resource at the enterprise information system, determines an entitlement and an initiating security principal for the request;

    a plurality of J2EE Connector Architecture (JCA) resource adapters within the intermediate abstraction layer, that are adapted to receive the requests from the application view component and to subsequently communicate the requests to the enterprise information system, wherein each of the plurality of resource adapters is associated with a specific resource offered by the enterprise information system, and wherein each resource uses its own resource appropriate principal, and wherein each of the plurality of resource adapters includes a security principal map that is used by the security service to map the initiating security principal used by the client application to the resource-appropriate security principal used by the enterprise information system for that resource; and

    wherein the application server upon receiving a request from a client application to access a resource at the enterprise information system, first validates the user using the security service, and then uses an appropriate adapter together with the security principal map of the appropriate adapter to map the initiating security principal to the resource-appropriate principal, before sending the request to the enterprise information and thereafter using the resource appropriate principal to access the resource,wherein the application view uses XML as a common language among client applications, and wherein XML-encoded service and event definitions are used to expose application capabilities, wherein XML schemas can be used to define the data for services and events between the client applications and the enterprise information system.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×