×

Relying party platform/framework for access management infrastructures

  • US 9,043,886 B2
  • Filed: 05/04/2012
  • Issued: 05/26/2015
  • Est. Priority Date: 09/29/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a processor;

    a non-transitory computer-readable storage medium;

    a mapping repository configured to store a mapping between applications and identity providers, wherein the mapping associates each application of a plurality of applications with one or more identity providers;

    identity management logic configured to use the mapping to determine that one or more first identity providers of a first plurality of identity providers can be used to perform authentication activities on behalf of a first application in response to receiving a first request associated with the first application;

    said non-transitory computer-readable storage medium storing instructions that cause said processor to;

    receive the first request specifying the first application;

    invoke a first identity provider of a plurality of identity providers to authenticate an entity associated with the first request based on a first mapping between the first application and the first identity provider;

    wherein the identity management logic is further configured to;

    determine that a first user of the first application has been authenticated using the first identity provider of the one or more first identity providers;

    determine, in response to a request from the first application to perform an action associated with a second application, that the first application is a trusted application with respect to the second application based at least in part on the determination that the first user of the first application has been authenticated using the first identity provider;

    generate a token that enables the first application to perform the action on the second application;

    receive a second request specifying a second application different from the first application; and

    invoke a second identity provider of the plurality of identity providers to authenticate an entity associated with the second request based on a second mapping between the second application and the second identity provider; and

    wherein the first identity provider differs from the second identity provider.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×