发明名称 Authentication policy usage for authenticating a user
摘要 A method and system for authenticating a user. A first server of multiple servers generates an authentication policy table by inserting into the authentication policy table an authentication policy of each server and setting a relative priority of each server in the authentication policy table of the first server in order of decreasing number of users registered in an authentication system of each server. The authentication policy of each server is at least one rule of each server for authenticating users of a federated computing environment that includes the multiple servers. The first server receives an access request from the user to access the federated computing environment, receives input authentication information from the user, and determines from use of both the input authentication information and the at least one rule in the authentication policy table of the first server that the user is authorized to access the federated computing environment.
申请公布号 US8839393(B2) 申请公布日期 2014.09.16
申请号 US201313943138 申请日期 2013.07.16
申请人 International Business Machines Corporation 发明人 Takehi Masahiro
分类号 H04L29/06;G06F21/31 主分类号 H04L29/06
代理机构 Schmeiser, Olsen & Watts, LLP 代理人 Schmeiser, Olsen & Watts, LLP ;Pivnichny John
主权项 1. A method for authenticating a user, comprising: a first server of a plurality of servers generating, by a computer processor, an authentication policy table, said generating the authentication policy table comprising (i) inserting into the authentication policy table an authentication policy of each server and (ii) setting a relative priority of each server in the authentication policy table of the first server in order of decreasing number of users registered in an authentication system of each server, wherein the authentication policy of each server is at least one rule of each server for authenticating users of a federated computing environment that comprises the plurality of servers; said first server storing, by the processor, the generated authentication policy table within the first server; after said generating and storing the authentication policy table, said first server receiving, by the processor, an access request from the user to access the federated computing environment; after said receiving the access request, said first server receiving, by the processor, input authentication information from the user; and said first server ascertaining, by the processor, that the user is authorized to access the federated computing environment, wherein said ascertaining comprises determining that the received input authentication information conforms to the at least one rule of the authentication policy of a second server having a highest relative priority among servers of the plurality of servers whose authentication policy's at least one rule, in the authentication policy table of the first server, is conformed to by the received input authentication information.
地址 Armonk NY US