×

Authentication policy usage for authenticating a user

  • US 8,839,393 B2
  • Filed: 07/16/2013
  • Issued: 09/16/2014
  • Est. Priority Date: 03/30/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a user, comprising:

  • a first server of a plurality of servers generating, by a computer processor, an authentication policy table, said generating the authentication policy table comprising (i) inserting into the authentication policy table an authentication policy of each server and (ii) setting a relative priority of each server in the authentication policy table of the first server in order of decreasing number of users registered in an authentication system of each server, wherein the authentication policy of each server is at least one rule of each server for authenticating users of a federated computing environment that comprises the plurality of servers;

    said first server storing, by the processor, the generated authentication policy table within the first server;

    after said generating and storing the authentication policy table, said first server receiving, by the processor, an access request from the user to access the federated computing environment;

    after said receiving the access request, said first server receiving, by the processor, input authentication information from the user; and

    said first server ascertaining, by the processor, that the user is authorized to access the federated computing environment, wherein said ascertaining comprises determining that the received input authentication information conforms to the at least one rule of the authentication policy of a second server having a highest relative priority among servers of the plurality of servers whose authentication policy'"'"'s at least one rule, in the authentication policy table of the first server, is conformed to by the received input authentication information.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×