Scott Alan Isaacson - Woodland Hills UT, US Daniel Gene Fritch - Maple Valley WA, US Larry Hal Henderson - Orem UT, US Lynn Wells Crabb - Lindon UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 9/32 G06F 15/16 G06F 17/30 G06F 7/04
US Classification:
713168, 726 3, 726 4, 380255, 380259
Abstract:
A computer receives a request for authentication from a client. The computer forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer requests authentication and cache control information from the authentication source. The computer uses the authentication and cache control information to populate a user object stored in a container hierarchy and enable the computer to authenticate an authentication request without forwarding the authentication request to the authentication source.
Lynn Crabb - Lindon UT, US Stephen R. Carter - Spanish Fork UT, US David Kent Beus - Highland UT, US Thomas Becker - Toenisvorst, DE Jed Rampton - Lehi UT, US Kevin Marinus Boogert - Sandy UT, US Michael William Cook - Cedar Hills UT, US
International Classification:
G06F 17/30
US Classification:
707 3, 707 9, 707E17014
Abstract:
Mechanisms for identity enabled data level access control are provided. Data queries from principals are intercepted and access rights are assigned in response to identities associated with the principals. The access rights are enforced by modifying the queries and/or filtering results from the queries. The modified queries and/or filtered results are processed against a data store on behalf of the principals and returned to the principals.
Authentication On Demand In A Distributed Network Environment
Scott A. Isaacson - Woodland Hills UT, US Daniel G. Fritch - Orem UT, US Larry Hal Henderson - Orem UT, US Lynn W. Crabb - Lindon UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 9/32 H04L 9/00
US Classification:
726 4, 726 5, 726 1, 713183
Abstract:
A computer receives an authentication request from a client. The computer creates a temporary user object and populates it with identification information from the authentication request. The computer then forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer queries the authentication source for identification information, populates the temporary user object with the identification information, and makes the user object permanent.