Security token management service hosting in application server
First Claim
1. A method comprising:
- executing, by a processing device of an application server, a security token management service to manage disparate token services for a plurality of services provided by the application server to support a set of clients separate from the application server;
receiving, by the processing device executing the security token management service, a request for at least one token service of the disparate token services, the request received from a requesting service of the plurality of services;
validating the request for the at least one token service;
identifying a corresponding token provider for the at least one token service, wherein the corresponding token provider is selected from a plurality of token providers registered with the security token management service;
acquiring at least one token from the corresponding token provider for the at least one token service; and
deploying the at least one token service to the requesting service.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for a security token management service hosted in an application server. A set of services and/or associated applications can be served from an application server to one or more clients. The set of services may require one or more token services in order to deliver their intended functionalities, so that for instance an email client may require the use and presentation of a token or other object incorporating user ID, password, or other authentication information for the user to access and retrieve their email messages. Different served applications and/or services may require the installation of various different token types or services, conventionally requiring manually configuration. A centralized security token management service can be installed and configured in the application server itself, which interfaces to requesting services and automatically locates and acquires diverse token types and/or associated token services to support served applications or services.
-
Citations
18 Claims
-
1. A method comprising:
-
executing, by a processing device of an application server, a security token management service to manage disparate token services for a plurality of services provided by the application server to support a set of clients separate from the application server; receiving, by the processing device executing the security token management service, a request for at least one token service of the disparate token services, the request received from a requesting service of the plurality of services; validating the request for the at least one token service; identifying a corresponding token provider for the at least one token service, wherein the corresponding token provider is selected from a plurality of token providers registered with the security token management service; acquiring at least one token from the corresponding token provider for the at least one token service; and deploying the at least one token service to the requesting service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a memory; an interface to a set of clients, the interface communicably coupled to the memory; a processing device communicably coupled to the memory, the processing device to execute an application server from the memory and to communicate with the set of clients via the interface; and a security token management service executable from the memory by the processing device as part of the application server, the processing device to; manage disparate token services for a plurality of services provided by the application server to support the set of clients; receive a request for at least one token service of the disparate token services, the request received from a requesting service of the plurality of services; validate the request for the at least one token service; identify a corresponding token provider for the at least one token, wherein the corresponding token provider is selected from a plurality of token providers registered with the security token management service; acquire at least one token from the corresponding token provider for the at least one token service; and deploy the at least one token service to the requesting service. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification