Method and system for identity management integration

Information

  • Patent Application
  • 20070209066
  • Publication Number
    20070209066
  • Date Filed
    March 03, 2006
    18 years ago
  • Date Published
    September 06, 2007
    17 years ago
Abstract
A method and system for a vendor-neutral method of integrating single sign on functionality with the features of a robust identity management application in a cost effective, reliable and timely manner is disclosed. A user accesses the system through a commercially-available single sign on application. When a user requests to be logged in to one or more applications, the request is not sent to a custom business logic layer as known in the art but, instead, is directed to an intermediary application which takes action depending on the nature of the user's login information. The intermediary application serves as the interface between the single sign on application and the identity management system. The intermediary application contains a work flow or business process engine and a method for mapping the business logic. Information flows seamlessly between the single sign on application and the identity management system without regard to either products' platform or vendor.
Description

BRIEF DESCRIPTION OF THE DRAWINGS

A better understanding of the system and method of the present invention may be had by reference to the drawings, wherein:



FIG. 1 shows a block diagram depicting the current state of the art;



FIG. 2 shows a block diagram depicting one embodiment of the present invention; and



FIG. 3 shows a flow diagram of one embodiment of the method of the present invention.


Claims
  • 1. A method for identity management integration comprising: directing a user's request to log onto a network through one or more single sign on applications to a vendor-neutral intermediary program, wherein said vendor-neutral intermediary program identifies the identity management system in use and directs said request to said identity management system.
  • 2. The method of claim 1 wherein said network is the Internet, a wide are network or a local area network.
  • 3. The method of claim 1 wherein said user is a human user or a software process configured to access said network.
  • 4. The method of claim 1 wherein said identity management system authenticates said user.
  • 5. The method of claim 1 wherein said identity management system verifies said user's password.
  • 6. The method of claim 1 wherein said single sign on application communicates with said intermediary application through an http or https interface.
  • 7. A system for identity management integration comprising: a single sign on application;a vendor-neutral intermediary application;an identity management application, wherein a user's request to login to a network is routed from said single sign on application to said vendor-neutral intermediary application which identifies the specific identity management system in use and directs said request to said identity management application.
  • 8. The system of claim 7 wherein said network is the Internet, a wide are network or a local area network.
  • 9. The system of claim 7 wherein said user is a human user or a software process configured to access said network.
  • 10. The system of claim 7 wherein said identity management application authenticates said user.
  • 11. The system of claim 7 wherein said identity management application verifies said user's password.
  • 12. The system of claim 7 wherein said single sign on application communicates with said intermediary application through an http or https interface.
  • 13. A method for authenticating users on a network comprising: accepting login information from a user;directing said information through a vendor-neutral intermediary application, said vendor-neutral intermediary application identifying the presence of an identity management application;verifying said user's login information through the use of said identity management application.
  • 14. The method of claim 13 wherein said network is the Internet, a wide are network or a local area network.
  • 15. The method of claim 13 wherein said user is a human user or a software process configured to access said network.
  • 16. The method of claim 13 wherein said identity management application authenticates said user.
  • 17. The method of claim 13 wherein said identity management application verifies said user's password.
  • 18. The method of claim 13 wherein said single sign on application communicates with said intermediary application through an http or https interface.
  • 19. A method for identity management integration comprising: means for directing a user's request to log onto a network through one or more single sign on applications to a vendor-neutral intermediary program, wherein said vendor-neutral intermediary program includes means for identifying the identity management system in use and means for directing said request to said identity management system.