Generalized identity mediation and propagation
First Claim
Patent Images
1. A method of system independent mediation to provide secure access to a server application, comprising:
- retrieving, by an identity mapping module of a first enterprise service bus, an identity mapping policy for specifying direct and one-to-one correspondences between a first set of identities and a second set of identities, wherein the first set of identities correspond to a party and a client application, executed on a client computer, and the second set of identities correspond to the party and the server application, executed on a server computer;
retrieving, by an authentication module of the first enterprise service bus, an authentication policy for authenticating a first identity of the first set of identities and a second identity of the second set identities, wherein the first identity and the second identity are mapped to each other by the identity mapping module;
retrieving, by an authorization module of the first enterprise service bus, an authorization policy for authorizing the second identity for access to the server application; and
providing a service, corresponding to a service request, from the server application to the party based upon a mapping of the first identity to the second identity by the mapping module, an authentication of the first and second identities by the authentication module and an authorization of the second identity by the authorization module.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are techniques for providing security in a computing system with identity mediation policies that are enterprise service bus (EBS) independent. A mediator component performs service-level operation such as message brokering, identity mediation, and transformation to enhance interoperability among service consumers and service providers. A mediator component may also delegate identity related operations to a token service of handler. Identity mediation may include such operations as identity determination, or “identification,” authentication, authorization, identity transformation and security audit.
10 Citations
20 Claims
-
1. A method of system independent mediation to provide secure access to a server application, comprising:
-
retrieving, by an identity mapping module of a first enterprise service bus, an identity mapping policy for specifying direct and one-to-one correspondences between a first set of identities and a second set of identities, wherein the first set of identities correspond to a party and a client application, executed on a client computer, and the second set of identities correspond to the party and the server application, executed on a server computer; retrieving, by an authentication module of the first enterprise service bus, an authentication policy for authenticating a first identity of the first set of identities and a second identity of the second set identities, wherein the first identity and the second identity are mapped to each other by the identity mapping module; retrieving, by an authorization module of the first enterprise service bus, an authorization policy for authorizing the second identity for access to the server application; and providing a service, corresponding to a service request, from the server application to the party based upon a mapping of the first identity to the second identity by the mapping module, an authentication of the first and second identities by the authentication module and an authorization of the second identity by the authorization module. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of system independent mediation to provide secure access to a server application, comprising:
-
transmitting, to an identity mapping module of a first enterprise service bus, an identity mapping policy for specifying direct and one-to-one correspondences between a first set of identities and a second set of identities, wherein the first set of identities correspond to a party and a client application, executed on a client computer, and the second set of identities correspond to the party and the server application, executed on a server computer; transmitting, to an authentication module of the first enterprise service bus, an authentication policy for authenticating a first identity of the first set of identities and a second identity of the second set identities, wherein the first identity and the second identity are mapped to each other by the identity mapping module; transmitting, to an authorization module of the first enterprise service bus, an authorization policy for authorizing the second identity for access to the server application; and executing a service, corresponding to a service request and the server application, for the party based upon a mapping of the first identity to the second identity by the mapping module, an authentication of the first and second identities by the authentication module and an authorization of the second identity by the authorization module. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A apparatus for providing secure access to a server application, comprising:
-
a plurality of processors; a non-transitory, computer-readable storage medium coupled to the plurality of processors; and logic, stored on the computer-readable storage medium and executed on the plurality of processors, for retrieving, by an identity mapping module of a first enterprise service bus, an identity mapping policy for specifying direct and one-to-one correspondences between a first set of identities and a second set of identities, wherein the first set of identities correspond to a party and a client application, executed on a client computer, and the second set of identities correspond to the party and the server application, executed on a server computer; retrieving, by an authentication module of the first enterprise service bus, an authentication policy for authenticating a first identity of the first set of identities and a second identity of the second set identities, wherein the first identity and the second identity are mapped to each other by the identity mapping module; retrieving, by an authorization module of the first enterprise service bus, an authorization policy for authorizing the second identity for access to the server application; and providing a service, corresponding to a service request, from the server application to the party based upon a mapping of the first identity to the second identity by the mapping module, an authentication of the first and second identities by the authentication module and an authorization of the second identity by the authorization module. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer programming product comprising:
- a non-transitory computer-readable storage medium; and
logic, stored on the computer-readable storage medium for execution on a plurality of processors, for;retrieving, by an identity mapping module of a first enterprise service bus, an identity mapping policy for specifying direct and one-to-one correspondences between a first set of identities and a second set of identities, wherein the first set of identities correspond to a party and a client application, executed on a client computer, and the second set of identities correspond to the party and the server application, executed on a server computer; retrieving, by an authentication module of the first enterprise service bus, an authentication policy for authenticating a first identity of the first set of identities and a second identity of the second set of identities, wherein the first identity and the second identity are mapped to each other by the identity mapping module; retrieving, by an authorization module of the first enterprise service bus, an authorization policy for authorizing the second identity for access to the server application; and providing a service corresponding to a service request, from the server application to the party based upon a mapping of the first identity to the second identity by the mapping module, an authentication of the first and second identities by the authentication module and an authorization of the second identity by the authorization module. - View Dependent Claims (17, 18, 19)
- a non-transitory computer-readable storage medium; and
-
20. A method, comprising:
-
retrieving, by an identity mapping module of a first enterprise service bus, an identity mapping policy for specifying direct correspondences between a first set of identities and a second set of identities, wherein the first set of identities correspond to a party and a client application, executed on a client computer, and the second set of identities correspond to the party and the server application, executed on a server computer; retrieving, by an authentication module of the first enterprise service bus, an authentication policy for authenticating a first identity of the first set of identities and a second identity of the second set identities, wherein the first identity and the second identity are mapped to each other by the identity mapping module; retrieving, by an authorization module of the first enterprise service bus, an authorization policy for authorizing the second identity for access to the server application; providing a service, corresponding to a service request, from the server application to the party based upon a mapping of the first identity to the second identity by the mapping module, an authentication of the first and second identities by the authentication module and an authorization of the second identity by the authorization module; retrieving, by an audit module of the first enterprise service bus, and audit policy for auditing the mapping module, the authentication module and the authorization module to produce an audit trail; storing, on a computer-readable storage media, the audit trail; retrieving, by a second identity mapping module, a second authentication module and a second authorization module, each corresponding to a second enterprise service bus, the identity mapping policy, the authentication policy and the authorization policy, respectively, wherein the second enterprise service bus is a different type of enterprise service bus than the first enterprise service bus; providing the service from the server application to the party based upon a mapping of the first identity to the second identity by the second mapping module, an authentication of the first and second identities by the second authentication module and an authorization of the second identity by the second authorization module; retrieving by a transformation module of the first enterprise service bus, a transformation policy; and modifying, by the transformation module, the service request based upon the transformation policy.
-
Specification