×

System, method, and apparatus for managing access to resources across a network

  • US 8,418,238 B2
  • Filed: 03/25/2009
  • Issued: 04/09/2013
  • Est. Priority Date: 03/30/2008
  • Status: Active Grant
First Claim
Patent Images

1. A system for managing access across a plurality of resources, comprising:

  • a user store connector configured to connect to one or more user stores to retrieve attributes;

    an authentication connector configured to communicate with at least one authentication subsystem to authenticate a user to at least one of the plurality of resources through the use of a keychain module, the keychain module being adapted to construct an authentication configuration for the at least one of the plurality of resources by,discovering one or more form elements on the plurality of remote domains whereindiscovering the use of at least one of a HTTP basic, HTTP Digest, NTLM, and SSL handler;

    enabling a single sign-on with a plurality of remote domains comprises,receiving a 401 “

    Unauthorized”

    code,turning off the use of the at least one of HTTP basic and HTTP Digest authentication handlers; and

    cycling through Spring registered authentication handlers and receiving an authentication configuration from at least one of the Spring registered authentication handlers;

    returning an authentication configuration from the plurality of remote domains;

    removing differences between at least one of the plurality of protocols and a plurality of APIs;

    communicating with the at least one of the plurality of resources to construct name/value pairs, andattempting a login on at least one of a plurality of remote domains, and at least one of,identifying in a response from the at least one of the plurality of resources what constitutes a failed login, andsaving to the authentication configuration a successful log-in ceremony with the at least one of the plurality of remote domains;

    a policy engine configured to retrieve attributes from the user store connector corresponding to the user and use the attributes to evaluate access policies, which are defined for protection of resources, to determine whether or not the user should be granted access to the resources;

    an admin component that is configured to enable the access policies to be defined relative to attributes and the resources; and

    a policy store configured to store the access policies.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×