×

Enterprise service-to-service trust framework

  • US 7,721,322 B2
  • Filed: 03/22/2006
  • Issued: 05/18/2010
  • Est. Priority Date: 11/22/2005
  • Status: Active Grant
First Claim
Patent Images

1. In an enterprise computing network, a system for providing authorization and authentication in response to a service request from a client computer, the system comprising:

  • a centralized policy server comprising a centralized policy repository, the centralized policy repository comprising;

    (a) an information store configured to store a plurality of sets of trust information, each of the plurality of sets of trust information comprising trust information about one of a plurality of services;

    (b) one or more authorization models, each of the one or more authorization models comprising information about a mode of interaction between two or more services, the one or more authorization models comprising a first authorization model defining a first mode of interaction between a first service on a first server computer and a second service on a second server computer, the mode of interaction defining an authentication or authorization technique to be used between the first service and the second service;

    (c) one or more authentication policies, each of the one or more authentication policies defining a set of authentication requirements for a particular service, the one or more authentication policies comprising a first authentication policy that defines an authentication requirement that the first service on the first server computer must meet in order to authenticate with the second service on the second server computer; and

    (d) one or more authorization policies, each of the one or more authentication policies defining a set of authorization requirements for a particular service, the one or more authorization policies comprising a first authorization policy that defines an authorization requirement for the first service to authorize with the second service;

    the first server computer comprising a first processor and a first set of instructions executable by the first processor, the first set of instructions comprising;

    (a) instructions to receive the first service the service request from the client computer;

    (b) instructions to ascertain that the service request requests an operation to be performed by the second service at the second server computer;

    (c) instructions to obtain from the centralized policy repository an identifier of the second service;

    (d) instructions to transmit an operation request for reception by the second server computer, the operation request comprising the identifier of the first service and requesting performance of the operation;

    the second server computer comprising a second processor and a second set of instructions executable by the second processor, the second set of instructions comprising;

    (a) instructions to receive, with the second service, the operation request from the first server computer;

    (b) instructions to transmit an authentication request for reception by the centralized policy server, the authentication request comprising the identifier;

    (c) instructions to transmit an authorization request for reception by the centralized policy server; and

    (d) instructions to provide the requested operation, based on an authentication status and an authorization status of the first server; and

    an application programming interface (“

    API”

    ) configured allow the first service and the second service to communicate with the centralized policy repository;

    wherein the centralized policy server further comprises a third processor and a third set of instructions executable by the third processor, the third set of instructions comprising;

    (a) instructions to receive the authentication request;

    (b) instructions to identify the first service, based on the identifier;

    (c) instructions to determine, based on the first authentication policy, a set of authentication information for the first service, the set of authentication information being sufficient to authenticate the first service;

    (d) instructions to provide the set of authentication information to the second server computer;

    (d) instructions to receive the authorization request;

    (e) instructions to determine, based on an authorization policy for the second service, a set of authorization information for the first service, the set of authorization information being sufficient to indicate whether the first service is authorized for the second service; and

    (f) instructions to provide the set of authorization information to the second server computer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×