×

Integrated security roles

  • US 8,572,694 B2
  • Filed: 03/14/2008
  • Issued: 10/29/2013
  • Est. Priority Date: 03/27/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method of authorizing a client'"'"'s request at a first downstream application, said method comprising:

  • at runtime, prior to receiving the client'"'"'s request;

    identifying a role mapping requirement included in an upstream application, the role mapping requirement corresponding to an upstream security role; and

    in response to identifying the role mapping requirement, adding an upstream security role identifier corresponding to the upstream security role into a downstream authorization table;

    receiving, at the first downstream application, a first application request from the upstream application, wherein the first application request is derived from the client'"'"'s request and includes the upstream security role identifier that was determined by the upstream application;

    matching the upstream security role identifier included in the first application request with the upstream security role identifier included in the downstream authorization table; and

    authorizing the client'"'"'s request at the downstream application in response to the matching.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×