Claims
- 1. A method for providing access control with regard to at least one computing resource, the method comprising:
receiving a unique identifier associated with a user that is to be provided access to said at least one computing resource, said unique identifier being associated with another computing resource that has authenticated the user; translating said unique identifier into a security identifier (SID); and determining if said SID matches at least one other SID provided by an access control mechanism associated with said at least one computing resource.
- 2. The method as recited in claim 1, wherein said unique identifier includes a pair wise unique identifier (PUID).
- 3. The method as recited in claim 2, wherein said PUID is associated with a Passport service.
- 4. The method as recited in claim 3, wherein translating said unique identifier into said SID further includes:
separating said PUID into at least one sub authority identifier portion and at least one member identifier portion.
- 5. The method as recited in claim 3, wherein translating said unique identifier into said SID further includes:
providing said PUID to an application programming interface (API); and in return, receiving said SID from said API.
- 6. The method as recited in claim 1, wherein receiving said unique identifier further includes:
receiving said unique identifier within a Kerberos-based message.
- 7. The method as recited in claim 6, wherein said unique identifier is provided in a PAC within said Kerberos-based message.
- 8. The method as recited in claim 6, wherein said Kerberos-based message is associated with an S4U2self process.
- 9. The method as recited in claim 6, wherein said Kerberos-based message is associated with an S4U2proxy process.
- 10. The method as recited in claim 1, wherein determining if said SID matches said at least one other SID provided by said access control mechanism further includes:
comparing said SID to said at least one other SID within an access control list (ACL) associated with said at least one computing resource.
- 11. The method as recited in claim 1, wherein receiving said unique identifier associated with the user that is to be provided access to said at least one computing resource further includes:
providing a default account for the user that is to be provided access to said at least one computing resource.
- 12. A method for establishing access control permissions with regard to at least one computing resource, the method comprising:
receiving at least one electronic mail (e-mail) address for at least one user that is to be granted at least limited access to said at least one computing resource; providing said e-mail address to at least one trusted service capable of outputting a unique identifier associated with said user based on said e-mail address; receiving said unique identifier output by said trusted service; and setting at least one user access control permission associated with said at least one computing resource based on said unique identifier.
- 13. The method as recited in claim 12, wherein setting said at least one user access control permission further includes:
translating said unique identifier into a security identifier (SID); and associating said SID with at least one access control list (ACL) for said at least one computing resource.
- 14. The method as recited in claim 12, wherein said unique identifier includes a pair wise unique identifier (PUID).
- 15. The method as recited in claim 14, wherein said PUID is associated with a Passport service.
- 16. The method as recited in claim 13, wherein said unique identifier includes a PUID and translating said unique identifier into said SID further includes:
separating said PUID into at least one sub authority identifier portion and at least one member identifier portion.
- 17. The method as recited in claim 14, wherein said unique identifier includes a PUID and translating said unique identifier into said SID further includes:
providing said PUID to an application programming interface (API); and subsequently receiving said SID back from said API.
- 18. The method as recited in claim 12, wherein receiving said unique identifier further includes:
receiving said unique identifier within a Kerberos-based message.
- 19. The method as recited in claim 18, wherein said unique identifier is provided in a PAC within said Kerberos-based message.
- 20. A computer-readable medium having computer-executable instructions for performing acts comprising:
accepting a unique identifier associated with a user that is to be provided controlled access to said at least one computing resource, said unique identifier being associated with another computing resource that has authenticated the user; converting said unique identifier into a security identifier (SID); and verifying if said SID matches at least one other SID provided by an access control mechanism associated with said at least one computing resource.
- 21. The computer-readable medium as recited in claim 20, wherein said unique identifier includes a pair wise unique identifier (PUID).
- 22. The computer-readable medium as recited in claim 21, wherein said PUID is associated with a Passport service.
- 23. The computer-readable medium as recited in claim 22, wherein converting said unique identifier into said SID further includes:
subdividing said PUID into at least one sub authority identifier portion and at least one member identifier portion.
- 24. The computer-readable medium as recited in claim 22, wherein translating said unique identifier into said SID further includes:
outputting said PUID to an application programming interface (API); and in return receiving said SID from said API.
- 25. The computer-readable medium as recited in claim 20, wherein receiving said unique identifier further includes:
receiving said unique identifier within a Kerberos-based message.
- 26. The computer-readable medium as recited in claim 25, wherein said unique identifier is provided in a PAC within said Kerberos-based message.
- 27. The computer-readable medium as recited in claim 25, wherein said Kerberos-based message is associated with an S4U2self process.
- 28. The computer-readable medium as recited in claim 25, wherein said Kerberos-based message is associated with an S4U2proxy process.
- 29. The computer-readable medium as recited in claim 20, wherein verifying if said SID matches said at least one other SID provided by said access control mechanism further includes:
comparing said SID to said at least one other SID within with an access control list (ACL) associated with said at least one computing resource.
- 30. The computer-readable medium as recited in claim 20, wherein accepting said unique identifier associated with the user that is to be provided controlled access to said at least one computing resource further includes:
providing a default account for the user that is to be provided access to said at least one computing resource.
- 31. A computer-readable medium having computer-executable instructions for performing acts comprising:
accepting at least one electronic mail (e-mail) address for at least one user that is to be granted at least limited access to said at least one computing resource; outputting said e-mail address to at least one trusted service capable of outputting a corresponding unique identifier associated with said user based on said e-mail address; receiving said unique identifier output by said trusted service; and establishing at least one user access control permission associated with said at least one computing resource based on said unique identifier.
- 32. The computer-readable medium as recited in claim 31, wherein setting said at least one user access control permission for the user based on said unique identifier further includes:
converting said unique identifier into a security identifier (SID); and assigning said SID to at least one access control list (ACL) for said computing resource.
- 33. The computer-readable medium as recited in claim 31, wherein said unique identifier includes a pair wise unique identifier (PUID).
- 34. The computer-readable medium as recited in claim 33, wherein said PUID is associated with a Passport service.
- 35. The computer-readable medium as recited in claim 34, wherein said unique identifier includes a PUID and translating said unique identifier into said SID further includes:
subdividing said PUID into at least one sub authority identifier portion and at least one member identifier portion.
- 36. The computer-readable medium as recited in claim 34, wherein said unique identifier includes a PUID and translating said unique identifier into said SID further includes:
providing said Passport unique identifier to an application programming interface (API); and subsequently receiving said SID from said API.
- 37. The computer-readable medium as recited in claim 31, wherein receiving said unique identifier further includes:
receiving said unique identifier within a Kerberos-based message.
- 38. The computer-readable medium as recited in claim 37, wherein said unique identifier is provided in a PAC within said Kerberos-based message.
- 39. A method for translating a pair wise unique identifier (PUID) into a corresponding security identifier (SID), the method comprising:
receiving said PUID; subdividing said PUID into at least one sub authority identifier portion and at least one member identifier portion; and arranging said at least one sub authority identifier portion and said at least one member identifier portion as said SID.
- 40. The method as recited in claim 39, wherein arranging said at least one sub authority identifier portion and said at least one member identifier portion as said SID further includes arranging said SID to have said sub authority identifier, a HIWORD(MemberIDHigh), a LOWORD(MemberIDHigh), and a MemberIDLow.
- 41. The method as recited in claim 39, further comprising outputting said SID.
- 42. A computer-readable medium having computer-executable instructions for performing acts comprising:
receiving a pair wise unique identifier (PUID); and translating said PUID into a corresponding security identifier (SID) by subdividing said PUID into at least one sub authority identifier portion and at least one member identifier portion, and arranging said at least one sub authority identifier portion and said at least one member identifier portion as said SID.
- 43. The computer-readable medium as recited in claim 42, wherein arranging said at least one sub authority identifier portion and said at least one member identifier portion as said SID further includes arranging said SID to have said sub authority identifier, a HIWORD(MemberIDHigh), a LOWORD(MemberIDHigh), and a MemberIDLow.
- 44. The computer-readable medium as recited in claim 42, further comprising outputting said SID.
- 45. A system for controlling access to at least one computing resource, the system comprising:
memory; and logic operatively coupled to said memory and configurable to receive a unique identifier associated with a user that is to be provided controlled access to said at least one computing resource, said unique identifier being associated with another computing resource that has authenticated the user, said logic being further operatively configured to translate said unique identifier into a security identifier (SID), and allowing said user to access said at least one computing resource if said SID matches at least one other SID that is stored in said memory and associated with said at least one computing resource.
- 46. The system as recited in claim 45, wherein said unique identifier includes a pair wise unique identifier (PUID).
- 47. The system as recited in claim 46, wherein said PUID is associated with a Passport service.
- 48. The system as recited in claim 47, wherein said logic is further configured to separate said Passport unique identifier into at least one sub authority identifier portion and at least one member identifier portion.
- 49. The system as recited in claim 45, wherein said logic is configurable to receive said unique identifier within a Kerberos-based message.
- 50. The system as recited in claim 49, wherein said unique identifier is provided in a PAC within said Kerberos-based message.
- 51. The system as recited in claim 49, wherein said Kerberos-based message is associated with an S4U2self process.
- 52. The system as recited in claim 50, wherein said Kerberos-based message is associated with an S4U2proxy process.
- 53. The system as recited in claim 45, wherein said at least one other SID that is stored in said memory is part of an access control list (ACL) associated with said at least one computing resource.
- 54. The system as recited in claim 45, wherein said logic is further configurable to provide an anonymous account capability to the user that is to be provided access control to said at least one computing resource.
- 55. A system for setting access control permissions for at least one computing resource, the system comprising:
a communication network; a first device operatively coupled to said network and configurable to accept at least one electronic mail (e-mail) address for at least one user that is to be granted at least limited access to said at least one computing resource, provide said e-mail address to said network, subsequently receive over said network a corresponding unique identifier associated with said e-mail address, and setting at least one access control permission associated with said at least one computing resource for the user based on said received unique identifier.
- 56. The system as recited in claim 55, further comprising:
at least one other device operatively coupled to said network and configured to provide at least one trustworthy service capable of receiving said at least one e-mail address from said network, convert said e-mail address to said unique identifier, and output said unique identifier to said network.
- 57. The system as recited in claim 56, wherein said first device is further configured to translate said unique identifier into a security identifier (SID) and associate said SID with at least one access control list (ACL) for said at least one computing resource.
- 58. The system as recited in claim 57, wherein said unique identifier includes a pair wise unique identifier (PUID).
- 59. The system as recited in claim 58, wherein said PUID is a Passport unique identifier.
- 60. The system as recited in claim 59, wherein said first device is further configured to separate said Passport unique identifier into at least one sub authority identifier portion and at least one member identifier portion during translation to a corresponding SID.
- 61. The system as recited in claim 55, wherein said first device is configured to receive said unique identifier within a Kerberos-based message.
- 62. The system as recited in claim 61, wherein said unique identifier is provided in a PAC within said Kerberos-based message.
RELATED PATENT APPLICATIONS
[0001] The present patent application is related to U.S. patent application Ser. No. 09/886,146, titled “Methods And Systems For Controlling The Scope Of Delegation Of Authentication Credentials”, filed Jun. 20, 2001, which is hereby incorporated by reference.