×

Secure configuration catalog of trusted identity providers

  • US 9,690,920 B2
  • Filed: 08/30/2012
  • Issued: 06/27/2017
  • Est. Priority Date: 08/30/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for enabling access to a protected resource by a client, comprising:

  • in association with a service provider, storing a private catalog of information about one or more identity providers that are trusted by a service provider, the private catalog of information comprising, for each identity provider, a trust document that comprises private configuration data describing how the service provider uses the identity provider, a specification of one or more websites serviced by the identity provider, and one or more cryptographic artifacts used by the identity provider for cryptographic operations, wherein the identity provider cryptographic artifact is a digital certificate associated with the identity provider, the private configuration data being inaccessible by the client while being stored, the service provider executing on a data processing machine having a hardware element;

    responsive to receipt of a request to access the protected resource by the client, the service provider using the private configuration data to redirect the client to an identity provider;

    while the request to access the protected resource by the client remains pending, the service provider receiving identity information representing a user that has authenticated to the identity provider to which the client was redirected based on the private configuration data;

    while the request to access the protected resource by the client remains pending, the service provider determining whether the identity provider is trusted to authenticate the user on the service provider'"'"'s behalf by evaluating the private configuration data in the trust document, wherein evaluating the private configuration data includes determining, based on the specification, whether a website associated with the service provider is authorized to use the identity provider to authenticate users, and determining, based on the one or more cryptographic artifacts, whether a binding between an identity provider identifier and at least one identity provider cryptographic artifact is valid for use by the service provider to cryptographically verify the identity information representing the user; and

    if the identity provider is trusted based on the determining operations, and as a response to the request to access, permitting the client to access the protected resource.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×