Techniques for virtual representational state transfer (REST) interfaces
First Claim
1. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
- configuring a proxy device to act as an intermediary between a client and a Representational State Transfer (REST) service executing on a server of the network, wherein the REST service is multiple REST services merged to act as one service;
intercepting, at the proxy device, a REST formatted request sent from the client to the REST service;
enforcing, at the proxy device, an enterprise policy against the REST formatted request, the enterprise policy is a set of conditions defined by an enterprise, the set of conditions are automatically evaluated and specific actions taken in response thereto, the actions including implementing enterprise-specific security, integrating different REST services, and auditing REST service interactions, wherein enforcement of the enterprise policy enables;
implementation of enterprise security independent of the REST service or other REST services, integration of the REST services, and auditing of REST service interactions, defining and validating REST requests without changes to or knowledge to the multiple REST services; and
providing, by the proxy device, the REST formatted request when the enterprise policy is satisfied to the REST service for processing on behalf of the client.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.
22 Citations
20 Claims
-
1. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
-
configuring a proxy device to act as an intermediary between a client and a Representational State Transfer (REST) service executing on a server of the network, wherein the REST service is multiple REST services merged to act as one service; intercepting, at the proxy device, a REST formatted request sent from the client to the REST service; enforcing, at the proxy device, an enterprise policy against the REST formatted request, the enterprise policy is a set of conditions defined by an enterprise, the set of conditions are automatically evaluated and specific actions taken in response thereto, the actions including implementing enterprise-specific security, integrating different REST services, and auditing REST service interactions, wherein enforcement of the enterprise policy enables;
implementation of enterprise security independent of the REST service or other REST services, integration of the REST services, and auditing of REST service interactions, defining and validating REST requests without changes to or knowledge to the multiple REST services; andproviding, by the proxy device, the REST formatted request when the enterprise policy is satisfied to the REST service for processing on behalf of the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
-
interposing a proxy between a Representational State Transfer (REST) service and a client of the network, wherein the REST service is multiple REST services merged to act as one service; enforcing security, at the proxy, between interactions of the REST service and the client and wherein enforcement of the security enables;
implementation of enterprise security independent of the REST service or other REST services, integration of the REST service, and auditing of REST service interactions;selectively modifying, at the proxy, the interactions between the REST service and the client and defining and validating REST requests without changes to or knowledge of the multiple REST services; and custom auditing, at the proxy, the interactions between the REST service and the client in an automated fashion. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A multiprocessor-implemented system, comprising:
-
one or more processors configured with a proxy service implemented in a non-transitory computer-readable storage medium and to execute on the one or more processors of a proxy of a network; the proxy service configured to act as an intermediary between clients of a network and Representational State Transfer (REST) servers to;
authenticate client requests, translate the requests, enforce enterprise policy against the requests, and custom audit interactions, and the proxy service configured to authenticate REST server responses, translate the responses and enforce the enterprise policy against the responses, wherein the enterprise policy is a set of conditions defined by an enterprise, the set of conditions are automatically evaluated and specific actions taken in response thereto, the actions including implementing enterprise-specific security independent of the REST service or other REST services, integrating different REST services, and auditing REST service interactions, wherein at least one REST service is multiple REST services merged to act as one service and the proxy service configured to define and validate REST requests without changes on or knowledge by the REST services.
-
Specification