Application integration
First Claim
Patent Images
1. A method comprising:
- editing a properties file of a first application to accept a login string provided by a second application, wherein the first application collects and provides performance information on network devices and the second application manages authorization permissions, wherein the authorization permissions comprise a time constraint to prevent access to a resource outside of a specified period and an IP address restriction to prevent access to the resource by a specific IP address;
modifying first authentication information in the properties file of the first application to match second authentication information provided by the second application;
configuring the second application so that the second authentication information provided by the second application is accepted by the first application for login of a user into the first application using a single sign-on interface provided by the second application, wherein the login of the user into the first application only requires authentication through the second application using the second authentication information in the single sign-on interface and a process of logging into the first application is superseded by login of the user using the single sign-on interface provided by the second application;
determining whether the resource is protected by the second application; and
in response to determining that the resource is protected by the second application, authenticating the user to determine if access to the resource is allowed based on the authorization permissions.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of a method of integrating software applications includes customizing properties of an InfoVista application to accept a format of login strings provided by a SiteMinder application; modifying authentication information in properties of the InfoVista application to match authentication information that is to be sent from the SiteMinder application; and customizing the SiteMinder application to pass authentication information needed by the InfoVista application for login of a user into the InfoVista application using a single sign-on interface provided by the SiteMinder application. Other methods and systems are also provided.
-
Citations
15 Claims
-
1. A method comprising:
-
editing a properties file of a first application to accept a login string provided by a second application, wherein the first application collects and provides performance information on network devices and the second application manages authorization permissions, wherein the authorization permissions comprise a time constraint to prevent access to a resource outside of a specified period and an IP address restriction to prevent access to the resource by a specific IP address; modifying first authentication information in the properties file of the first application to match second authentication information provided by the second application; configuring the second application so that the second authentication information provided by the second application is accepted by the first application for login of a user into the first application using a single sign-on interface provided by the second application, wherein the login of the user into the first application only requires authentication through the second application using the second authentication information in the single sign-on interface and a process of logging into the first application is superseded by login of the user using the single sign-on interface provided by the second application; determining whether the resource is protected by the second application; and in response to determining that the resource is protected by the second application, authenticating the user to determine if access to the resource is allowed based on the authorization permissions. - View Dependent Claims (2, 3, 12, 13, 14, 15)
-
-
4. A non-transitory computer readable medium storing instructions that, when executed by a computer comprising a processor, cause the processor to perform operations comprising:
-
editing a properties file of a first application to accept a login string provided by a second application, wherein the first application collects and provides performance information on network devices and the second application manages authorization permissions, wherein the authorization permissions comprise a time constraint to prevent access to a resource outside of a specified time period and an IP address restriction to prevent access to the resource by a specific IP address; modifying first authentication information in the properties file of the first application to match second authentication information provided by the second application; configuring the second application so that the second authentication information provided by the second application is accepted by the first application for login of a user into the first application using a single sign-on interface provided by the second application, wherein the login of the user into the first application only requires authentication through the second application using the second authentication information in the single sign-on interface and a process of logging into the first application is superseded by login of the user using the single sign-on interface provide by the second application; determining whether the resource is protected by the second application; and in response to determining that the resource is protected by the second application, authenticating the user to determine if access to the resource is allowed based on the authorization permissions. - View Dependent Claims (5, 6)
-
-
7. A system comprising:
-
a processor; and a memory storing instructions, that when executed by the processor, cause the processor to perform operations comprising; editing a properties file of a first application to accept a login string provided by a second application, wherein the first application collects and provides performance information on network devices and the second application manages authorization permissions, wherein the authorization permissions comprise a time constraint to prevent access to a resource outside of a specified period and an IP address restriction to prevent access to the resource by a specific IP address, modifying first authentication information in the properties file of the first application to match second authentication information provided by the second application, configuring the second application so that the second authentication information provided by the second application is accepted by the first application for login of a user into the first application using a single sign-on interface provided by the second application, wherein the login of the user into the first application only requires authentication through the second application using the second authentication information in the single sign-on interface and a process of logging into the first application is superseded by login of the user using the single sign-on interface provided by the second application, determining whether the resource is protected by the second application, and in response to determining that the resource is protected by the second application, authenticating the user to determine if access to the resource is allowed based on the authorization permissions. - View Dependent Claims (8, 9, 10, 11)
-
Specification