Claims
- 1. A method for matching a policy to a resource in an Access System, comprising the steps of:
receiving an HTTP POST request; and matching said policy to said resource using POST data referenced by said HTTP request.
- 2. The method of claim 1, wherein:
said step of matching comprises the steps of:
accessing required policy matching data; selecting a portion of said POST data; comparing said portion of POST data with said required data; repeating said steps of selecting and comparing for all portions of said POST data; and returning a successful match of said policy to said resource if all of said required data was matched to said POST data in said step of comparing.
- 3. The method of claim 2, further comprising the steps of:
receiving a flag, said flag indicating whether said HTTP request contains POST data; requesting said POST data if said HTTP request does not contain POST data; and receiving said POST data.
- 4. The method of claim 2, wherein:
said policy comprises a policy authentication rule specifying a challenge method for verifying user identities to authenticate users for resources matched to said policy.
- 5. The method of claim 2, wherein:
said policy comprises a policy authorization rule for granting user access to a subset of resources in said Access System.
- 6. The method of claim 2, wherein:
said policy comprises a policy auditing rule specifying a set of information logged in response to an access system event pertaining to resources matched to said policy.
- 7. A method for authorizing user access to a resource in an Access System, comprising the steps of:
receiving an HTTP POST request, said request containing POST data; retrieving an authorization rule; authorizing said resource using said POST data; and granting said user access to said resource if said step of authorizing is successful.
- 8. The method of claim 7, wherein:
said step of authorizing comprises the steps of:
selecting a portion of said POST data; determining whether said portion is of a data type defined in said authorization rule; matching said portion with data required by said authorization rule if said step of determining returns an affirmative answer; repeating said steps of selecting, determining, and matching until all portions of said POST data have been considered; and returning a successful authorization if all of said steps of matching are successful.
- 9. The method of claim 7, further comprising the step of:
performing authorization success actions if said step of authorizing is successful.
- 10. The method of claim 7, further comprising the step of:
performing authorization failure actions if said step of authorizing is unsuccessful.
- 11. The method of claim 7, wherein:
said step of retrieving retrieves said authorization rule from an LDAP Directory Server.
- 12. The method of claim 7, wherein:
said authorization rule is a first level authorization rule for granting user access to resources in said Access System.
- 13. The method of claim 7, wherein:
said authorization rule is a second level authorization rule for granting user access to a subset of resources in said Access System.
- 14. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
receiving an HTTP POST request; and matching said policy to said resource using POST data referenced by said HTTP request.
- 15. One or more processor readable storage devices according to claim 14, wherein:
said step of matching comprises the steps of:
accessing required policy matching data; selecting a portion of said POST data; comparing said portion of POST data with said required data; repeating said steps of selecting and comparing for all portions of said POST data; and returning a successful match of said policy to said resource if all of said required data was matched to said POST data in said step of comparing.
- 16. One or more processor readable storage devices according to claim 15, wherein said method further comprises the steps of:
receiving a flag, said flag indicating whether said HTTP request contains POST data; requesting said POST data if said HTTP request does not contain POST data; and receiving said POST data.
- 17. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
receiving an HTTP POST request, said request containing POST data; retrieving an authorization rule; authorizing said resource using said POST data; and granting said user access to said resource if said step of authorizing is successful.
- 18. One or more processor readable storage devices according to claim 17, wherein:
said step of authorizing comprises the steps of:
selecting a portion of said POST data; determining whether said portion is of a data type defined in said authorization rule; matching said portion with data required by said authorization rule if said step of determining returns an affirmative answer; repeating said steps of selecting, determining, and matching until all portions of said POST data have been considered; and returning a successful authorization if all of said steps of matching are successful.
- 19. An apparatus, comprising:
a communication interface; one or more storage devices; and one or more processors in communication with said one or more storage devices and said communication interface, said one or more processors programmed to preform a method comprising the steps of:
receiving an HTTP POST request, and matching said policy to said resource using POST data referenced by said HTTP request.
- 20. An apparatus according to claim 19, wherein:
said step of matching comprises the steps of:
accessing required policy matching data; selecting a portion of said POST data; comparing said portion of POST data with said required data; repeating said steps of selecting and comparing for all portions of said POST data; and returning a successful match of said policy to said resource if all of said required data was matched to said POST data in said step of comparing.
- 21. An apparatus according to claim 20, wherein said method further includes the steps of:
receiving a flag, said flag indicating whether said HTTP request contains POST data; requesting said POST data if said HTTP request does not contain POST data; and receiving said POST data.
- 22. An apparatus, comprising:
a communication interface; one or more storage devices; and one or more processors in communication with said one or more storage devices and said communication interface, said one or more processors programmed to preform a method comprising the steps of:
receiving an HTTP POST request, said request containing POST data, retrieving an authorization rule, authorizing said resource using said POST data, and granting said user access to said resource if said step of authorizing is successful.
- 23. An apparatus according to claim 22, wherein:
said step of authorizing comprises the steps of:
selecting a portion of said POST data; determining whether said portion is of a data type defined in said authorization rule; matching said portion with data required by said authorization rule if said step of determining returns an affirmative answer; repeating said steps of selecting, determining, and matching until all portions of said POST data have been considered; and returning a successful authorization if all of said steps of matching are successful.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application No. 60/216,955, Web Access Management, filed Jul. 10, 2000, incorporated herein by reference.
[0002] This Application is related to the following Applications:
[0003] Access Tester, by Christine Wai Han Chan, Attorney Docket No. OBLX-01011US0, filed the same day as the present application;
[0004] Cache Flushing, by Joshi, et al., Attorney Docket No. OBLX-01012US0, filed the same day as the present application;
[0005] User Authentication, by Martherus, et al., Attorney Docket No. OBLX-01014US0, filed the same day as the present application;
[0006] Localized Access, by Ramamurthy, et al., Attorney Docket No. OBLX-01015US0, filed the same day as the present application;
[0007] Query String Processing, by Crosbie, et al., Attorney Docket No. OBLX-01016US0, filed the same day as the present application;
[0008] Logging Access System Events, by Joshi, et al., Attorney Docket No. OBLX-01017US0, filed the same day as the present application;
[0009] Providing Data To Applications from an Access System, by Joshi, et al., Attorney Docket No. OBLX-01018US0, filed the same day as the present application; and
[0010] Intrusion Threat Detection, by Jeffrey D. Hodges, Attorney Docket No. OBLX-01020US0, filed the same day as the present application.
[0011] Each of these related Applications are incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60216955 |
Jul 2000 |
US |