Connecting and Retrieving Security Tokens Based on Context
First Claim
Patent Images
1. A system comprising:
- a first cloud system hosting a first resource having a first extension, the first cloud system having a first identity system and first API layer used by the first resource and the first extension; and
the resource having a second extension loaded from a second cloud system having a second identity system and second API layer, wherein the first cloud system loads security tokens from the second identity system to allow the second extension to communicate using the second API layer.
1 Assignment
0 Petitions
Accused Products
Abstract
An application may be configured with two or more cloud contexts and one or more identity Systems. Using this information, the application has the ability to identify the remote cloud environment that a particular subsystem needs to interact with. The application communicates with the appropriate identity system to retrieve tokens dynamically for targeting that remote cloud.
5 Citations
20 Claims
-
1. A system comprising:
-
a first cloud system hosting a first resource having a first extension, the first cloud system having a first identity system and first API layer used by the first resource and the first extension; and the resource having a second extension loaded from a second cloud system having a second identity system and second API layer, wherein the first cloud system loads security tokens from the second identity system to allow the second extension to communicate using the second API layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for accessing resources across a plurality of distributed computing networks, comprising:
-
providing a resource on a first computing network, the resource comprising a first extension associated with a first identity system and a second extension associated with a second identity system, wherein the first identify system is hosted on the first computing network and the second identity system is hosted on a remote computing network; loading one or more first security tokens from the first identity system to allow a user on the first computing network to access the first extension; and loading one or more second security tokens from the remote computing network to allow the user on the first computing network to access the second extension. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a first distributed computing network hosting a resource having a first extension, the first distributed computing network having a first identity system used by the resource and the first extension; the resource having a second extension loaded from a second distributed computing network having a second identity system, wherein the first distributed computing network loads security tokens from the second identity system to allow users to access the second extension; and storage for maintaining a plurality of security tokens associated with a user, the group of tokens allowing the user to access extensions from a plurality of distributed computing networks. - View Dependent Claims (17, 18, 19, 20)
-
Specification