Claims
- 1. A method for allowing proxies in an Identity System, comprising the steps of:
receiving a request for a first entity to be a proxy for a second entity; associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and allowing said first entity to use said Identity System as said second entity based on said one or more credentials of said second entity.
- 2. A method according to claim 1, wherein said step of receiving a request includes the steps of:
providing a notification to said first entity of an ability to be said proxy for said second entity; and receiving a request from said first entity to be said proxy for said second entity.
- 3. A method according to claim 2, wherein:
said notification includes an email.
- 4. A method according to claim 2, wherein:
said notification includes a display page for said Identity System.
- 5. A method according to claim 1, wherein said step of receiving a request includes the step of:
receiving an indication from said second entity that said first entity can be said proxy for a second entity.
- 6. A method according to claim 1, wherein said step of receiving a request includes the steps of:
providing a list of potential proxy candidates; providing a search mechanism to add more candidates to said list of potential proxy candidates; and receiving a selection of one or more of said potential proxy candidates, including a selection of said first entity.
- 7. A method according to claim 1, wherein:
said credentials includes a distinguished name for said second entity.
- 8. A method according to claim 1, wherein:
said credentials includes identity profile attributes for said second entity.
- 9. A method according to claim 1, wherein:
said step of associating includes storing an identification of said second entity in a data element used to identify said first entity.
- 10. A method according to claim 1, wherein:
said step of associating includes storing an identification of said second entity in a cookie for said first entity.
- 11. A method according to claim 1, wherein:
said step of associating includes using an identification of said second entity to identify said first entity.
- 12. A method according to claim 1, wherein said step of associating includes the steps of:
accessing an Identity System cookie for said first entity, said Identity System cookie stores an identification of said first entity; storing said identification of said first entity from said step of accessing in a second cookie; and storing an identification of said second entity in said an Identity System cookie for said first entity.
- 13. A method according to claim 12, further comprising the steps of:
receiving a request to terminate said first entity being a proxy for said second entity; accessing said identification of said first entity in said second cookie; and storing said identification of said first entity in said Identity System cookie for said first entity.
- 14. A method according to claim 12, further comprising the steps of:
receiving a request from said first entity to access said Identity System; determining whether said Identity System cookie for said first entity exists; providing access to said Identity System for said first entity if said Identity System cookie for said first entity exists; and authenticating said first entity and creating said Identity System cookie if said Identity System cookie for said first entity does not exist prior to said step of determining, said step of creating includes adding said identification of said first entity to said Identity System cookie.
- 15. A method according to claim 12, wherein said step of allowing includes the steps of:
receiving a request from said first entity to access a service in said Identity System; accessing said identification of said second entity in said Identity System cookie; accessing attributes for said second entity based on said identification of said second entity in said Identity System cookie; and providing access to said service in said Identity System based on said attributes for said second entity.
- 16. A method according to claim 1, wherein:
said steps of receiving, associating and allowing are performed without said first entity providing a password for said second entity.
- 17. A method according to claim 1, wherein:
said step of associating verifies that said second entity is a delegated administrator having a right to be proxied.
- 18. A method according to claim 1, further comprising the step of:
delegating a right to be proxied to said second entity, said step of associating verifies that said second entity has said right to be proxied.
- 19. A method according to claim 1, wherein:
said Identity System is part of an integrated Identity System and Access System.
- 20. A method according to claim 1, wherein:
said Identity System is part of an integrated Identity System and Access System; and said an integrated Identity System and Access System uses said credentials of said second entity to authorize said second entity to access resources.
- 21. A method according to claim 20, wherein:
said step of allowing does not include using said credentials of said second entity to authorize said first entity to access resources.
- 22. A method according to claim 1, wherein:
said Identity System is part of an integrated Identity System and Access System; and said steps of associating and allowing provide for said first entity to be said proxy for said second entity in said Identity System but does not provide for said first entity to be said proxy for said second entity in said Access System.
- 23. A method according to claim 1, wherein:
said Identity System is part of an integrated Identity System and Access System; said step of associating includes the steps of:
accessing an Identity System cookie for said first entity, said Identity System cookie stores an identification of said first entity, and storing an identification of said second entity in said an Identity System cookie for said first entity; said Access System uses a Access System cookie for said first entity, said Identity System cookie is separate from said Access System cookie; and said Access System cookie for said first entity does not store an indication of said second entity.
- 24. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
receiving a request for a first entity to be a proxy for a second entity; associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and allowing said first entity to use said Identity System as said second entity based on said one or more credentials of said second entity.
- 25. One or more processor readable storage devices according to claim 24, wherein:
said credentials includes identity profile attributes for said second entity.
- 26. One or more processor readable storage devices according to claim 24, wherein:
said step of associating includes storing an identification of said second entity in a data element used to identify said first entity.
- 27. One or more processor readable storage devices according to claim 24, wherein:
said step of associating includes the steps of:
accessing an Identity System cookie for said first entity, said Identity System cookie stores an identification of said first entity, storing said identification of said first entity from said step of accessing in a second cookie, and storing an identification of said second entity in said an Identity System cookie for said first entity; and said method further comprises the steps of:
receiving a request to terminate said first entity being a proxy for said second entity, accessing said identification of said first entity in said second cookie, and storing said identification of said first entity in said Identity System cookie for said first entity.
- 28. One or more processor readable storage devices according to claim 27, wherein said step of allowing includes the steps of:
receiving a request from said first entity to access a service in said Identity System; accessing said identification of said second entity in said Identity System cookie; accessing attributes for said second entity based on said identification of said second entity in said Identity System cookie; and providing access to said service in said Identity System based on said attributes for said second entity.
- 29. One or more processor readable storage devices according to claim 24, wherein:
said steps of receiving, associating and allowing are performed without said first entity providing a password for said second entity.
- 30. One or more processor readable storage devices according to claim 24, wherein:
said Identity System is part of an integrated Identity System and Access System; and said steps of associating and allowing provide for said first entity to be said proxy for said second entity in said Identity System but does not provide for said first entity to be said proxy for said second entity in said Access System.
- 31. One or more processor readable storage devices according to claim 24, wherein:
said Identity System is part of an integrated Identity System and Access System; said step of associating includes the steps of:
accessing an Identity System cookie for said first entity, said Identity System cookie stores an identification of said first entity, and storing an identification of said second entity in said an Identity System cookie for said first entity; said Access System uses a Access System cookie for said first entity, said Identity System cookie is separate from said Access System cookie; and said Access System cookie for said first entity does not store an indication of said second entity.
- 32. An apparatus that allows for proxies in an Identity System, comprising:
one or more communication interfaces; one or more storage devices; and one or more processors in communication with said one or more storage devices and said one or more communication interfaces, said processor performs a method comprising the steps of:
receiving a request for a first entity to be a proxy for a second entity, associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity, and allowing said first entity to use said Identity System as said second entity based on said one or more credentials of said second entity.
- 33. An apparatus according to claim 32, wherein:
said credentials includes identity profile attributes for said second entity.
- 34. An apparatus according to claim 32, wherein:
said step of associating includes storing an identification of said second entity in a data element used to identify said first entity.
- 35. An apparatus according to claim 32, wherein:
said step of associating includes the steps of:
accessing an Identity System cookie for said first entity, said Identity System cookie stores an identification of said first entity, storing said identification of said first entity from said step of accessing in a second cookie, and storing an identification of said second entity in said an Identity System cookie for said first entity; and said method further comprises the steps of:
receiving a request to terminate said first entity being a proxy for said second entity; accessing said identification of said first entity in said second cookie, and storing said identification of said first entity in said Identity System cookie for said first entity.
- 36. An apparatus according to claim 35, wherein said step of allowing includes the step of:
receiving a request from said first entity to access a service in said Identity System; accessing said identification of said second entity in said Identity System cookie; accessing attributes for said second entity based on said identification of said second entity in said Identity System cookie; and providing access to said service in said Identity System based on said attributes for said second entity.
- 37. An apparatus according to claim 32, wherein:
said steps of receiving, associating and allowing are performed without said first entity providing a password for said second entity.
- 38. An apparatus according to claim 32, wherein:
said Identity System is part of an integrated Identity System and Access System; and said steps of associating and allowing provide for said first entity to be said proxy for said second entity in said Identity System but does not provide for said first entity to be said proxy for said second entity in said Access System.
- 39. An apparatus according to claim 32, wherein:
said Identity System is part of an integrated Identity System and Access System; said step of associating includes the steps of:
accessing an Identity System cookie for said first entity, said Identity System cookie stores an identification of said first entity, and storing an identification of said second entity in said an Identity System cookie for said first entity; said Access System uses a Access System cookie for said first entity, said Identity System cookie is separate from said Access System cookie; and said Access System cookie for said first entity does not store an indication of said second entity.
- 40. A method for allowing proxies in a system, comprising the steps of:
receiving an indication that a first entity can be a proxy for a second entity, said indication is from said second entity; receiving an indication from said first entity to become said proxy for said second entity; associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and allowing said first entity to use said system as said second entity based on said one or more credentials of said second entity.
- 41. A method according to claim 40, wherein:
said step of associating includes storing an identification of said second entity in a data element used to identify said first entity.
- 42. A method according to claim 40, wherein:
said step of associating includes the steps of:
accessing a first cookie for said first entity, said first cookie stores an identification of said first entity, storing said identification of said first entity in a second cookie, and storing an identification of said second entity in said an first cookie for said first entity; and said method further comprises the steps of:
receiving a request to terminate said first entity being a proxy for said second entity, accessing said identification of said first entity in said second cookie, and storing said identification of said first entity in said first cookie for said first entity.
- 43. A method according to claim 42, wherein said step of allowing includes the steps of:
receiving a request from said first entity to access a service; accessing said identification of said second entity in said first cookie; accessing attributes for said second entity based on said identification of said second entity in said first cookie; and providing access to said service based on said attributes for said second entity.
- 44. A method according to claim 40, wherein:
said steps of receiving, associating and allowing are performed without said first entity providing a password for said second entity.
- 45. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
receiving an indication that a first entity can be a proxy for a second entity, said indication is from said second entity; receiving an indication from said first entity to become said proxy for said second entity; associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and allowing said first entity to use said system as said second entity based on said one or more credentials of said second entity.
- 46. One or more processor readable storage devices according to claim 45, wherein:
said step of associating includes storing an identification of said second entity in a data element used to identify said first entity.
- 47. One or more processor readable storage devices according to claim 45, wherein:
said step of associating includes the steps of:
accessing a first cookie for said first entity, said first cookie stores an identification of said first entity, storing said identification of said first entity in a second cookie, and storing an identification of said second entity in said an first cookie for said first entity; and said method further comprises the steps of:
receiving a request to terminate said first entity being a proxy for said second entity, accessing said identification of said first entity in said second cookie, and storing said identification of said first entity in said first cookie for said first entity.
- 48. One or more processor readable storage devices according to claim 47, wherein said step of allowing includes the steps of:
receiving a request from said first entity to access a service; accessing said identification of said second entity in said first cookie; accessing attributes for said second entity based on said identification of said second entity in said first cookie; and providing access to said service based on said attributes for said second entity.
- 49. One or more processor readable storage devices according to claim 45, wherein:
said steps of receiving, associating and allowing are performed without said first entity providing a password for said second entity.
COPYRIGHT NOTICE
[0001] This application claims the benefit of U.S. Provisional Application No. 60/258,087, “Integrated Identity and Access Management Systems With Group and Organization Managers,” filed on Dec. 22, 2000; and U.S. Provisional Application No. 60/285,524, “Integrated Identity and Access Management System,” filed on Apr. 20, 2001; both of which are incorporated herein by reference.
[0002] A portion of the disclosure of this patent document contains material, which is subject to copyright protection. The copyright owner has no objection to the reproduction by anyone of the patent document or the patent disclosure as it appears in the United States Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
[0003] This Application is related to the following Application:
[0004] “Impersonation in an Access System”, by Francisco J. Villavicencio, Attorney Docket No. OBLX-01027US0, filed the same day as the present application.
[0005] The related Application is incorporated herein by reference.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60258087 |
Dec 2000 |
US |
|
60285524 |
Apr 2001 |
US |