Identity management system and method
First Claim
1. A system for identity management comprising:
- an identity management data store configured to store identity-related information for a user of an application, the identity-related information mapped within the identity management data store to role information for the user of the application;
a human resources input configured to provision the identity management data store with the identity-related information;
an application registration component stored as a set of computer readable instructions on a computer readable medium and executable by a processor to facilitate the application to provision the identity management data store with the role information for the user of the application; and
a security component stored as a set of computer readable instructions on a computer readable medium and executable by a processor to authenticate the user and authorize the user for access to the application based on the identity-related information, the security component further configured to retrieve the role information mapped to the identity-related information and deliver the role information to the application.
6 Assignments
0 Petitions
Accused Products
Abstract
A system is for identity management is provided. The system includes an identity management data store, a human resources input, an application registration component, and a security component. The identity management data store stores identity-related information for a user of an application. The identity-related information is mapped within the identity management data store to role information for the user of the application. The human resources input provisions the identity management data store with the identity-related information. The application registration component facilitates the application to provision the identity management data store with the role information for the user of the application. The security component authenticates the user and authorizes the user for access to the application based on the identity-related information. The security component retrieves the role information mapped to the identity-related information and delivers the role information to the application.
147 Citations
20 Claims
-
1. A system for identity management comprising:
-
an identity management data store configured to store identity-related information for a user of an application, the identity-related information mapped within the identity management data store to role information for the user of the application; a human resources input configured to provision the identity management data store with the identity-related information; an application registration component stored as a set of computer readable instructions on a computer readable medium and executable by a processor to facilitate the application to provision the identity management data store with the role information for the user of the application; and a security component stored as a set of computer readable instructions on a computer readable medium and executable by a processor to authenticate the user and authorize the user for access to the application based on the identity-related information, the security component further configured to retrieve the role information mapped to the identity-related information and deliver the role information to the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for providing a user access to an application comprising:
-
registering role-related information via an application registration component stored as a set of computer readable instructions on a computer readable media and executed by a processor, by the application, wherein the application is stored as a set of computer readable instructions on a computer readable media that are executed by a processor; storing the role-related information in an identity management data store; provisioning the identity management data store with identity-related information for the user from a human resources system; mapping in the identity management data store the identity-related information to the role-related information; authenticating the user by an authentication interface, wherein the authentication interface is stored on a computer readable media and executed by a processor; consulting, using the authentication interface, the identity management data store to determine if the user is authorized to access the application; the user attempting to access the application through the authentication interface; retrieving with the authentication interface the role-related information from the identity management data store based on the mapping to the users'"'"' identity-related information; providing the role-related information related to the application for which the user attempts to access; the application associating the role-related information with rules related to access to the application by users; and the application using the rules associated with role-related information of the user to determine the user'"'"'s access to the application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification