×

Method and system for the storage of authentication credentials

  • US 8,719,948 B2
  • Filed: 04/30/2007
  • Issued: 05/06/2014
  • Est. Priority Date: 05/20/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, with an information processing system, of controlling access to host access credentials required to access a resource on a host computer system by a client process running on a client computer system, the information processing system being separate and distinct from the host computer system and the client computer system, the method comprising:

  • storing the host access credentials in a restricted access directory on the information processing system, wherein the host access credentials are separate and distinct from the resource on the host computer system;

    receiving directory access credentials from the client process;

    authenticating the received directory access credentials to designate an authenticated client process;

    receiving, after authenticating the received directory access credentials, a query for the host access credentials from the authenticated client process, the query comprising at least an identity of a user of the client computer system, a security realm identifier that is based on a security realm indication received by the authenticated client process from the host computer system, an address identifier associated with the resource;

    performing the query by searching the restricted access directory for the host access credentials using at least the identity of the user, the security realm identifier, and the address identifier;

    locating, based on performing the query, the host access credentials;

    determining, based on the locating, whether the user of the client computer system is authorized to access the host access credentials stored in the restricted access directory, and based on the user being authorized, the user is only authorized to access the host access credentials, and wherein this authorization is independent of the resource; and

    based on determining that the user of the client computer system is authorized to access the host access credentials, providing the host access credentials to the authenticated client process, wherein the host access credentials are configured to be provided to the host computer system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×