×

Integrating legacy application/data access with single sign-on in a distributed computing environment

  • US 8,006,098 B2
  • Filed: 04/24/2008
  • Issued: 08/23/2011
  • Est. Priority Date: 11/14/2002
  • Status: Active Grant
First Claim
Patent Images

1. A system for integrating legacy access with single sign-on in a distributed computing environment, comprising:

  • a user workstation having a client and an emulator client operating thereon;

    a host where a legacy host application or system is accessible, the host including an emulator server; and

    a server having at least one processor configured toestablish a first secure session from the client to the server, wherein the secure session establishment authenticates the user'"'"'s identity from identifying information passed from the client;

    store the identifying information in a security token accessible to the server; and

    use the identifying information stored in the security token to authenticate the user for access to the legacy host application or system, whereby the authentication occurs programmatically and does not require the user to re-enter his identifying information,wherein the server further includes a legacy host access agent configured to;

    generate a password substitute, based on the user'"'"'s identifying information from the security token and an identifier of the legacy host application or system;

    pass the password substitute and a legacy host identifier of the user to the client on the user workstation; and

    establish a second secure session between the emulator client and the emulator server;

    wherein the user workstation is configured to;

    receive a sign-on data stream from the legacy host application or system at the emulator client over the second secure session;

    programmatically insert the password substitute and the legacy host identifier into the sign-on data stream, creating a modified data stream; and

    return the modified data stream from the emulator client to the emulator server, over the second secure session; and

    wherein the host is configured to;

    retrieve the password substitute and the legacy host identifier from the modified data stream and send them to the legacy host access agent for transparently authenticating the user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×