Authentication proxy agent
First Claim
Patent Images
1. A system including instructions stored on a non-transitory computer readable storage medium and executable by at least one processor, the system comprising:
- an authentication engine configured to cause the at least one processor toreceive, at a server, an authentication request and credentials from a client;
generate, at the server, a proxy agent;
send, from the proxy agent, the credentials to an identity provider to authenticate the client on behalf of the client, using the credentials;
receive, at the proxy agent, an assertion of authentication of the client from the identity provider; and
provide the assertion from the proxy agent to the server to satisfy the authentication request.
11 Assignments
0 Petitions
Accused Products
Abstract
An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a proxy agent configured to interact with an identity provider to authenticate the client on behalf of the client, using the credentials. In this way, the authentication engine may receive an assertion of authentication of the client from the identity provider, by way of the proxy agent.
-
Citations
20 Claims
-
1. A system including instructions stored on a non-transitory computer readable storage medium and executable by at least one processor, the system comprising:
an authentication engine configured to cause the at least one processor to receive, at a server, an authentication request and credentials from a client; generate, at the server, a proxy agent; send, from the proxy agent, the credentials to an identity provider to authenticate the client on behalf of the client, using the credentials; receive, at the proxy agent, an assertion of authentication of the client from the identity provider; and provide the assertion from the proxy agent to the server to satisfy the authentication request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method comprising:
-
receiving, at a server, an authentication request and credentials from a client; generating, at the server, a proxy agent; sending, from the proxy agent, the credentials to an identity provider to authenticate the client on behalf of the client, using the credentials; receiving, at the proxy agent, an assertion of authentication of the client from the identity provider; and providing the assertion from the proxy agent to the server to satisfy the authentication request. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer program product including instructions recorded on a non-transitory computer readable storage medium and configured to cause at least one processor to:
-
receive, at a server, an authentication request and credentials from a client; generate, at the server, a proxy agent; send, from the proxy agent, the credentials to an identity provider to authenticate the client on behalf of the client, using the credentials; receive, at the proxy agent, an assertion of authentication of the client from the identity provider; and provide the assertion from the proxy agent to the server to satisfy the authentication request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification