Claims
- 1. A method of maintaining synchronization between information encoded in first and second stores, the method comprising:
detecting change to an entry of the first store; and invalidating at least one entry of the second store corresponding to the changed entry of the first store, wherein the invalidating triggers information synchronization on a next attempt to authenticate against the invalidated entry.
- 2. The method, as recited in claim 1, wherein the detecting is based at least in part on a received notification of change from the first store.
- 3. The method, as recited in claim 1, wherein the detecting is based at least in part on access to a change log for the first store.
- 4. The method, as recited in claim 3, wherein the access is periodic.
- 5. The method, as recited in claim 4, wherein the period is programmable.
- 6. The method, as recited in claim 1, wherein the detecting is without reversing a protective transform of the entries.
- 7. The method, as recited in claim 1, wherein the detecting is based at least in part on an update sequence number.
- 8. The method, as recited in claim 1 wherein the detecting is limited to changes made to a subset of the second store entries.
- 9. The method, as recited in claim 1, wherein the synchronization includes receiving by the second store, an authentication request that includes a credential and which corresponds to the invalidated entry.
- 10. The method, as recited in claim 1, wherein the synchronization includes chaining an authentication request to the first store and, if successful, updating the previously invalidated entry of the second store with the credential.
- 11. The method, as recited in claim 1, further comprising:
registering with a change notification facility.
- 12. The method, as recited in claim 1, wherein the encoded information includes an encrypted credential.
- 13. The method, as recited in claim 1, wherein the encoded information includes user authentication information.
- 14. The method, as recited in claim 1, wherein the encodings of the first and second stores use dissimilar protective transforms.
- 15. The method, as recited in claim 1, wherein at least one of the first and second stores is embodied as a directory service.
- 16. The method, as recited in claim 1, wherein at least one of the first and second stores is embodied as an authentication or access control device.
- 17. The method, as recited in claim 1, wherein the entries are identified by one of an object guid and a distinguished name.
- 18. The method, as recited in claim 16, further comprising:
securing at least some communications between the first and second stores using a protective transform.
- 19. The method, as recited in claim 18, wherein the protective transform is in accordance with a secure sockets layer protocol.
- 20. The method of claim 1, embodied, at least in part, as a computer program product executable encoded in one or more computer readable media selected from the set of disk, tape, or other magnetic, optical, or electronic storage medium and a network, wireline, wireless, or other communication medium.
- 21. A computer program product executable for synchronizing information encoded in first and second stores wherein the executable detects change to an entry of the first store and invalidates a corresponding entry of the second store, the invalidation triggering the synchronization on a next attempt to authenticate against the invalidated entry.
- 22. The computer program product executable, as recited in claim 21, wherein the detecting is based at least in part on a received notification of changes from the first store.
- 23. The computer program product executable, as recited in claim 21, wherein the detecting is based at least in part on access to a change log for the first store.
- 24. The computer program product executable, as recited in claim 21, wherein the executable registers with a change notification facility.
- 25. The computer program product executable, as recited in claim 21, wherein the first and second stores contain information encoded using dissimilar protective transforms.
- 26. An entry invalidation facility comprising:
a detector of a changed entry of a first store; a translator that stores a change indicator in a second store, the change indicator triggering, on a next attempt to authenticate against the changed entry, synchronization of an entry of the second store to the changed entry of the first store.
- 27. The entry invalidation facility, as recited in claim 26 further comprising:
the second store.
- 28. An apparatus comprising:
means for detecting changes to an entry of a first store; and means for invalidating an entry of a second store corresponding to the changed entry of the first store and triggering entry synchronization on a next attempt to authenticate against the invalidated entry.
- 29. The apparatus, as recited in claim 28, wherein the detecting is without reversing a protective transform.
- 30. The apparatus, as recited in claim 28, wherein the first and second stores secure communication using a protective transform.
- 31. The apparatus, as recited in claim 28, wherein the entries of the first and second store are encoded using dissimilar protective transforms.
- 32. A computer system comprising:
an entry invalidation facility that detects change to a first store and, in response thereto, invalidates a corresponding entry of a second store, the invalidation triggering synchronization of a second store in a next attempt to authenticate against the invalidated entry.
- 33. A computer system, as recited in claim 32, further comprising:
the first store.
- 34. A computer system, as recited in claim 32, further comprising:
the second store.
- 35. A computer system, as recited in claim 32, wherein the entry invalidation facility is integrated with the first store.
- 36. A computer system, as recited in claim 32, wherein the entry invalidation facility is integrated with the second store.
- 37. A computer system, as recited in claim 32, further comprising:
a synchronization facility that updates an entry in the second store to correspond to the entry in the first store, triggered by the invalid entry of the second store.
- 38. The computer system, as recited in claim 32, wherein the detecting is without reversing a protective transform.
- 39. The computer system, as recited in claim 32, wherein the first and second stores secure communication using a protective transform.
CROSS-REFERENCE TO RELATED APPLICATION(S)
[0001] 11001 This application claims benefit under 35 U.S.C. § 119 of provisional application No. 60/432,829, filed Dec. 12, 2002, entitled “SYNCHRONIZATION FACILITY FOR INFORMATION DOMAINS EMPLOYING DISSIMILAR PROTECTIVE TRANSFORMS” naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors and second provisional application No. 60/438,386, filed Jan. 7, 2003, entitled “SYNCHRONIZATION FACILITY FOR INFORMATION DOMAINS EMPLOYING DISSIMILAR PROTECTIVE TRANSFORMS” naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors.
[0002] This application is related to co-pending application number entitled “SYNCHRONIZATION FACILITY FOR INFORMATION DOMAINS EMPLOYING REPLICAS” naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors, Attorney Docket No. 004-9365 and co-pending application number ______, entitled “SYNCRONIZATION FACILITY FOR INFORMATION DOMAINS EMPLOYING DISSIMILAR PROTECTIVE TRANSFORMATIONS” naming Robert Lavender, Mark Wahl, Duane Baldwin, Andrew Coulbeck, and Bertold Kolics as inventors Attorney Docket No. 004-9259 filed on even date herewith.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60432829 |
Dec 2002 |
US |
|
60438386 |
Jan 2003 |
US |