×

Indirect user authentication

  • US 9,531,727 B1
  • Filed: 01/29/2016
  • Issued: 12/27/2016
  • Est. Priority Date: 07/08/2015
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method executed by one or more processors, the method comprising:

  • receiving, from one or more users, a request for access to a shared system, wherein the request comprises a shared system identifier that indicates the shared system for which access is being requested, a shared user identifier, and a user identifier and a user password corresponding to the one or more users;

    determining if the one or more users are authorized to access the shared system by confirming the user identifier of each of the one or more users includes at least the same level of authorization as the shared user identifier and one or more of;

    confirming the one or more users are included in an authorized user list, andconfirming the one or more users are a member of an authorized user group;

    responsive to determining that the one or more users are authorized to access the shared system, requesting, from an identity manager, the shared user identifier and a shared password corresponding to the shared system;

    receiving, from the identity manager, the shared user identifier and the shared password, and providing the shared user identifier to each of the one or more users, and automatically authenticating each of the one or more users on the shared system using the shared user identifier and the shared password;

    using the shared user identifier and the shared password of each of the one or more users to enable the one or more users to use the shared system, wherein the shared password is not provided to the any of the one or more users; and

    retaining details corresponding to the request for access to the shared system by the one or more users in one or more logs, analyzing the one or more logs to determine that a particular user of the shared system is accessing the shared system without following a required protocol to gain access, prohibiting access to the shared system by the particular user by terminating an active session of the particular user, and sending an alert to a security administrator, wherein the alert comprises one or more of login time of the particular user, connection client information corresponding to the particular user, and activity of the particular user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×