Claims
- 1. A method for authenticating a user within a data processing system, the method comprising:
generating an authentication assertion for the user at a first trust proxy within a first domain; receiving at a system in a second domain a request from a client operated by the user to access a controlled resource within the second domain; sending the authentication assertion from the first domain to a second trust proxy in the second domain; and validating the authentication assertion at the second trust proxy in the second domain.
- 2. The method of claim 1 further comprising:
providing access to the controlled resource in response to a successful validation of the authentication assertion at the second trust proxy.
- 3. The method of claim 1 further comprising:
determining within the first domain to generate the authentication assertion for the user at the first trust proxy prior to receipt of the request for the controlled resource at the system in the second domain; and pushing the authentication assertion from the first domain to the second domain along with the request for the controlled resource.
- 4. The method of claim 1 further comprising:
pulling the authentication assertion from the second trust proxy from the first trust proxy after receipt of the request for the controlled resource at the system in the second domain.
- 5. The method of claim 1 further comprising:
establishing a trust relationship between the first trust proxy and the second trust proxy.
- 6. The method of claim 1 further comprising:
maintaining an indirect relationship between the first trust proxy and the second trust proxy through a trust broker.
- 7. An apparatus for authenticating a user within a data processing system, the apparatus comprising:
means for generating an authentication assertion for the user at a first trust proxy within a first domain; means for receiving at a system in a second domain a request from a client operated by the user to access a controlled resource within the second domain; means for sending the authentication assertion from the first domain to a second trust proxy in the second domain; and means for validating the authentication assertion at the second trust proxy in the second domain.
- 8. The apparatus of claim 7 further comprising:
means for providing access to the controlled resource in response to a successful validation of the authentication assertion at the second trust proxy.
- 9. The apparatus of claim 7 further comprising:
means for determining within the first domain to generate the authentication assertion for the user at the first trust proxy prior to receipt of the request for the controlled resource at the system in the second domain; and means for pushing the authentication assertion from the first domain to the second domain along with the request for the controlled resource.
- 10. The apparatus of claim 7 further comprising:
means for pulling the authentication assertion from the second trust proxy from the first trust proxy after receipt of the request for the controlled resource at the system in the second domain.
- 11. The apparatus of claim 7 further comprising:
means for establishing a trust relationship between the first trust proxy and the second trust proxy.
- 12. The apparatus of claim 7 further comprising:
means for maintaining an indirect relationship between the first trust proxy and the second trust proxy through a trust broker.
- 13. A computer program product in a computer readable medium for use in a data processing system for authenticating a user, the computer program product comprising:
means for generating an authentication assertion for the user at a first trust proxy within a first domain; means for receiving at a system in a second domain a request from a client operated by the user to access a controlled resource within the second domain; means for sending the authentication assertion from the first domain to a second trust proxy in the second domain; and means for validating the authentication assertion at the second trust proxy in the second domain.
- 14. The computer program product of claim 13 further comprising:
means for providing access to the controlled resource in response to a successful validation of the authentication assertion at the second trust proxy.
- 15. The computer program product of claim 13 further comprising:
means for determining within the first domain to generate the authentication assertion for the user at the first trust proxy prior to receipt of the request for the controlled resource at the system in the second domain; and means for pushing the authentication assertion from the first domain to the second domain along with the request for the controlled resource.
- 16. The computer program product of claim 13 further comprising:
means for pulling the authentication assertion from the second trust proxy from the first trust proxy after receipt of the request for the controlled resource at the system in the second domain.
- 17. The computer program product of claim 13 further comprising:
means for establishing a trust relationship between the first trust proxy and the second trust proxy.
- 18. The computer program product of claim 13 further comprising:
means for maintaining an indirect relationship between the first trust proxy and the second trust proxy through a trust broker.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] The present application is related to the following applications with a common assignee:
[0002] U.S. patent application Ser. No. ______ (Attorney Docket Number CH920020006), filed (TBD), titled “Efficient browser-based identity management providing personal control and anonymity”;
[0003] U.S. patent application Ser. No. ______ (Attorney Docket Number AUS920020410US1), filed ______, titled “Method and System for Proof-of-Possession Operations Associated with Authentication Assertions in a Heterogeneous Federated Environment”;
[0004] U.S. patent application Ser. No. ______ (Attorney Docket Number AUS920020411US1), filed ______, titled “Local Architecture for Federated Heterogeneous System”;
[0005] U.S. patent application Ser. No. ______ (Attorney Docket Number AUS920020412US1), filed ______, titled “Method and System for Attribute Exchange in a Heterogeneous Federated Environment”;
[0006] U.S. patent application Ser. No. ______ (Attorney Docket Number AUS920020413US1), filed ______, titled “Method and System for Authentication in a Heterogeneous Federated Environment”; and
[0007] U.S. patent application Ser. No. ______ (Attorney Docket Number AUS920020461US1), filed ______, titled “Method and System for Consolidated Sign-off in a Heterogeneous Federated Environment”.