METHODS AND SYSTEMS FOR USER IDENTITY MANAGEMENT IN CLOUD-BASED NETWORKS
First Claim
1. A method of managing identity in a cloud computing environment, comprising:
- receiving a request to provide identity management services;
initiating the identity management service in the cloud computing environment;
receiving identity information from at least one system linked to the identity management system; and
storing the identity information in the identity management system.
1 Assignment
0 Petitions
Accused Products
Abstract
An identity management system can reside within the cloud computing environment. The identity management system can be linked to systems, such as virtual machines, applications, and/or appliances, both inside and outside the cloud computing environment to provide identity management to those systems. In order to provide identity management, the identity management system can be configured to link to the systems in order to receive, store, maintain, and provide identity information. The information can identify items (users, devices, products, services) associated with the systems. The identity management system can be configured to store and maintain the information in records. The identity management system can also be configured to charge owners and operators of the systems for the identity management.
222 Citations
24 Claims
-
1. A method of managing identity in a cloud computing environment, comprising:
-
receiving a request to provide identity management services; initiating the identity management service in the cloud computing environment; receiving identity information from at least one system linked to the identity management system; and storing the identity information in the identity management system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for managing identity and located in a cloud computing environment, comprising:
-
a network interface to at least one system; and an identity management module, communicating with the network interface, the identity management module being configured to— receive a request to provide identity management services; initiate the identity management service in the cloud computing environment; receive identity information from at least one system linked to the identity management system; and store the identity information in the identity management system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A module for managing identity and located in a cloud computing environment, the module configured to cause a computer to perform the method comprising:
-
receiving a request to provide identity management services; initiating the identity management service in the cloud computing environment; receiving identity information from at least one system linked to the identity management system; and storing the identity information in the identity management system. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification