×

Cross security-domain identity context projection within a computing environment

  • US 8,627,434 B2
  • Filed: 12/04/2009
  • Issued: 01/07/2014
  • Est. Priority Date: 12/04/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method of facilitating processing within a computing environment comprising a first system in a first security domain and a second system in a second security domain, the method comprising:

  • based on a local security manager of the first system in the first security domain determining that a local security context of a user of the first system in the first security domain is not acceptable to the second system in the second security domain, receiving at a local security manager of the second system from the local security manager of the first system a request that a runtime security context for the user be created in the second system, and that a reference to the runtime security context or a portable representation of the runtime security context be returned to the local security manager of the first system;

    based on receiving the request at the local security manager of the second system from the local security manager of the first system, creating by the local security manager of the second system the runtime security context in the second system for the user of the first system, the creating referencing, at least in part, security credentials of the user of the first system provided to the second system by the first system;

    providing by the local security manager of the second system to the local security manager of the first system at least one of a reference to the runtime security context for the user in the second system which is resolvable within the computing environment or a portable representation of the runtime security context for the user in the second system; and

    receiving by the second system work from the first system to be performed by the second system, the received work to be performed by the second system having associated therewith the at least one of the reference to the runtime security context for the user in the second system or the portable representation of the runtime security context for the user in the second system, thereby facilitating processing of the work by the second system.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×