Authentication policy usage for authenticating a user
First Claim
1. A method for authenticating a user, comprising:
- a first server of a plurality of servers receiving, by a computer processor, input authentication information from the user; and
said first server ascertaining, by the processor, that the user is authorized to access a federated computing environment that comprises the plurality of servers, wherein said ascertaining comprises determining that the received input authentication information conforms to at least one rule of an authentication policy of a second server having a highest relative priority among servers of the plurality of servers whose authentication policy'"'"'s at least one rule, in an authentication policy table within the first server, is conformed to by the received input authentication information,wherein the authentication policy table within the first server comprises (i) an authentication policy of each server of the plurality of servers and (ii) a relative priority of each server in order of decreasing number of users registered in an authentication system of each server, wherein the authentication policy of each server is at least one rule of each server for authenticating users of the federated computing environment.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user. A first server of at least two servers receive input authentication information from the user. The first server ascertains that the user is authorized to access a federated computing environment that comprises at least two servers, which includes the first server determining that the received input authentication information conforms to at least one rule of an authentication policy of a second server having a highest relative priority among servers of the at least two servers whose authentication policy'"'"'s at least one rule, in an authentication policy table within the first server, is conformed to by the received input authentication information.
35 Citations
17 Claims
-
1. A method for authenticating a user, comprising:
-
a first server of a plurality of servers receiving, by a computer processor, input authentication information from the user; and said first server ascertaining, by the processor, that the user is authorized to access a federated computing environment that comprises the plurality of servers, wherein said ascertaining comprises determining that the received input authentication information conforms to at least one rule of an authentication policy of a second server having a highest relative priority among servers of the plurality of servers whose authentication policy'"'"'s at least one rule, in an authentication policy table within the first server, is conformed to by the received input authentication information, wherein the authentication policy table within the first server comprises (i) an authentication policy of each server of the plurality of servers and (ii) a relative priority of each server in order of decreasing number of users registered in an authentication system of each server, wherein the authentication policy of each server is at least one rule of each server for authenticating users of the federated computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system comprising a computer processor, a storage device coupled to the processor, and a computer readable memory unit coupled to the processor, said storage device containing program code configured to be executed by the processor via the memory unit to implement a method for authenticating a user, said method comprising:
-
a first server of a plurality of servers receiving, by the processor, input authentication information from the user; and said first server ascertaining, by the processor, that the user is authorized to access a federated computing environment that comprises the plurality of servers, wherein said ascertaining comprises determining that the received input authentication information conforms to at least one rule of an authentication policy of a second server having a highest relative priority among servers of the plurality of servers whose authentication policy'"'"'s at least one rule, in an authentication policy table within the first server, is conformed to by the received input authentication information, wherein the authentication policy table within the first server comprises (i) an authentication policy of each server of the plurality of servers and (ii) a relative priority of each server in order of decreasing number of users registered in an authentication system of each server, wherein the authentication policy of each server is at least one rule of each server for authenticating users of the federated computing environment. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product, comprising a computer readable storage device having program code stored therein, said program code configured to be executed by a computer processor to perform a method for authenticating a user, said method comprising:
-
a first server of a plurality of servers receiving, by the processor, input authentication information from the user; and said first server ascertaining, by the processor, that the user is authorized to access a federated computing environment that comprises the plurality of servers, wherein said ascertaining comprises determining that the received input authentication information conforms to at least one rule of an authentication policy of a second server having a highest relative priority among servers of the plurality of servers whose authentication policy'"'"'s at least one rule, in an authentication policy table within the first server, is conformed to by the received input authentication information, wherein the authentication policy table within the first server comprises (i) an authentication policy of each server of the plurality of servers and (ii) a relative priority of each server in order of decreasing number of users registered in an authentication system of each server, wherein the authentication policy of each server is at least one rule of each server for authenticating users of the federated computing environment. - View Dependent Claims (14, 15, 16, 17)
-
Specification