×

Access control using impersonization

  • US 9,906,564 B2
  • Filed: 06/29/2017
  • Issued: 02/27/2018
  • Est. Priority Date: 12/04/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • memory to store instructions that, if executed by one or more processors of the system, cause the system to;

    send a first request and an authentication response associated with the first request, the authentication response including information identifying a set of computing resource devices to be accessed;

    utilize the authentication response, based at least in part on fulfilling the first request, to send a second request;

    process the second request according to a policy determination, the policy determination is determined by at least evaluating a set of policies applicable to the second request based at least in part on the first request and the authentication response; and

    send a third request, the third request being processed according to a policy of the policy determination, processing the policy is based at least in part on a user profile associated with the authentication response that triggered the third request, including the first request and the second request.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×