×

Single sign-on in multi-tenant environments

  • US 9,369,456 B2
  • Filed: 09/21/2012
  • Issued: 06/14/2016
  • Est. Priority Date: 09/21/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for authenticating a user in a hosted, multi-tenant computing environment, comprising:

  • receiving a request for access to a first resource from a user, wherein the user has an account with a first plurality of tenants in the multi-tenant computing environment;

    identifying a first tenant associated with the first request, wherein the first tenant is in the first plurality of tenants;

    obtaining an authentication policy of the first tenant;

    using an authentication mechanism associated with the authentication policy of the first tenant to authenticate the user;

    upon authenticating the user, providing a first security token for enabling access to the first resource by the user, wherein the first tenant provides access to the first resource;

    storing a representation of authenticating the user with respect to the first tenant;

    receiving a second request from the user for a second resource, wherein a second tenant provides access to the second resource, wherein the second tenant belongs to the first plurality of tenants, wherein the second tenant is different from the first tenant, and wherein the second tenant has an authentication policy that is different from the authentication policy of the first tenant;

    subsequent to receiving the second request from the user for the second resource from the second tenant, automatically detecting, by computer, that the user has been previously authenticated with respect to the first tenant by accessing the stored representation of the authentication of the user with respect to the first tenant;

    using the detected previous authentication of the user with respect to the first tenant to authenticate the user with respect to the authentication policy of the second tenant; and

    upon authenticating the user with respect to the authentication policy of the second tenant, providing, by the computer, a second security token for enabling access to the second resource by the user without requiring additional authentication credentials from the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×